Powered by Deep Web Technologies
Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: RSA Access Manager Server CVE-2011-0322 Update 0: RSA Access Manager Server CVE-2011-0322 Update T-640: RSA Access Manager Server CVE-2011-0322 Update June 7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server. PLATFORM: RSA Access Manager Server version 5.5.x, 6.0.x, and 6.1.x ABSTRACT: RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3

2

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Broader source: Energy.gov (indexed) [DOE]

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

3

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Broader source: Energy.gov (indexed) [DOE]

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

4

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers [EERE]

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

5

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Broader source: Energy.gov (indexed) [DOE]

SNMP, and HTTP plug-in proxy passwords. SOLUTION: The vendor has issued a fix (8.0 Patch 1 (P1)). Addthis Related Articles V-195: RSA Authentication Manager Lets Local Users...

6

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Broader source: Energy.gov (indexed) [DOE]

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

7

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

8

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Broader source: Energy.gov (indexed) [DOE]

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

9

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,  

Broader source: Energy.gov (indexed) [DOE]

84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer GRC version 5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: Security Alert: ESA-2013-002 SecurityTracker Alert ID: 1028073 CVE-2012-1064 CVE-2012-2292 CVE-2012-2293 CVE-2012-2294 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-1064]. The code will originate from the

10

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Broader source: Energy.gov (indexed) [DOE]

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

11

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Broader source: Energy.gov (indexed) [DOE]

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

12

T-642: RSA SecurID update to Customers | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

13

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Broader source: Energy.gov (indexed) [DOE]

can view the administrative account password SOLUTION: The vendor has issued a fix (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0...

14

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Broader source: Energy.gov (indexed) [DOE]

actions on the site acting as the target user. Solution: The vendor has issued a fix (Patch 14 (P14) for RSA Authentication Manager 7.1 SP4 and Appliance 3.0 SP4). Addthis...

15

T-659: Update support for RSA Authentication Manager | Department...  

Broader source: Energy.gov (indexed) [DOE]

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit...

16

Identity, Credential, and Access Management (ICAM)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and responsibilities for DOE identity, credential, and access management program.

2013-02-19T23:59:59.000Z

17

Instructions for Using Secure Email via Outlook Web Access | Department of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

18

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

19

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

20

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Broader source: Energy.gov (indexed) [DOE]

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

22

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Broader source: Energy.gov (indexed) [DOE]

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

23

Using Two-Factor RSA Token  

Broader source: Energy.gov (indexed) [DOE]

Using Two-Factor RSA Token Using Two-Factor RSA Token with VPN User Guide November 2013 Using Your RSA token with WebVPN 1. Establish a connection to the Internet and connect to https://connect.doe.gov 2. Users who are using their RSA Token for the first time should follow the steps below for PIN creation. Others who have already set up their PIN and used their RSA token previously should enter their six digit numeric username and passcode; this is the PIN + the RSA token code. The result of this successful login will be Step 8 below. 3. A login page similar to the picture below will be displayed. Enter your VPN Username (six-digit numeric ID) and your Password by typing your generated RSA Token code and then click the Login button. Example; your generated RSA token code is 032848 (from above). In the Password box, you will enter

24

Performance Modeling and Access Methods for Temporal Database Management Systems  

E-Print Network [OSTI]

implementation issues. Database systems with temporal support maintain history data on line together with current. Performance Modeling and Access Methods for Temporal Database Management Systems TR86-018 August. #12;Performance Modeling and Access Methods for Temporal Database Management Systems by Ilsoo Ahn

North Carolina at Chapel Hill, University of

25

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

26

T-581: Novell Access Manager Java Double Literal Denial of Service  

Broader source: Energy.gov (indexed) [DOE]

81: Novell Access Manager Java Double Literal Denial of Service 81: Novell Access Manager Java Double Literal Denial of Service Vulnerability T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability March 17, 2011 - 3:05pm Addthis PROBLEM: Novell has acknowledged a vulnerability in Novell Access Manager, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Novell Access Manager 3.1 Linux Access Gateway Novell Access Manager 3.1 Access Administration Novell Access Manager 3.1 SSLVPN Server Novell Access Manager 3.1 Windows Novell Identity Server Novell Access Manager 3.1 Linux Novell Identity Server Novell Access Manager 3.1 Java Agents ABSTRACT: Novell Access Manager Java Double Literal Denial of Service Vulnerability. reference LINKS: Secunia Advisory: SA43769 CVE-2010-4476

27

Idaho - Access Management: Standards and Procedures for Highway...  

Open Energy Info (EERE)

search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Idaho - Access Management: Standards and Procedures for Highway Right-of-Way...

28

Practice Note Managing woodland access and  

E-Print Network [OSTI]

during forest operations has never been more important. This is both to comply with health and safety clear steps to achieve this aim, including advice on early engagement with stakeholders and careful at this time to meet existing health and safety duties and to comply with forest managers' obligations under

29

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Broader source: Energy.gov (indexed) [DOE]

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

30

T-582: RSA systems has resulted in certain information being...  

Broader source: Energy.gov (indexed) [DOE]

certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely...

31

Web Service Access Management for Integration with Agent Systems  

E-Print Network [OSTI]

Web Service Access Management for Integration with Agent Systems B.J. Overeinder, P.D. Verkaik, from the perspective of agent systems (and not as is gen- erally the case by web service providers). Mediating between web service requests from (virtual) organizations of agents, the web ser- vice gateway

32

REMOTE ACCESS SERVICES | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES Access the information you need... Anywhere. Anytime. Different service providers within the Department offer remote access services based on your specific work requirements. If you need assistance, please contact your individual service provider. Energy IT Services (EITS) Remote Access Services Outlook Web Access RSA Token Login RSA Token Instructions HSPD-12 Login HSPD-12 Badge Instructions Virtual Private Network Instructions Citrix Workplace Instructions Energy Information Administration (EIA) Remote Access Services Outlook Web Access EIA VPN Office of Intelligence and Counterintelligence (IN) Remote Access Services Outlook Web Access Office of Science (SC) Remote Access Services Citrix Workplace Help for EITS Customers

33

T-582: RSA systems has resulted in certain information being extracted from  

Broader source: Energy.gov (indexed) [DOE]

2: RSA systems has resulted in certain information being 2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely sophisticated cyber attack in progress, targeting their RSA business unit. RSA took a variety of aggressive measures against the threat to protect their business and their customers, including further hardening of their IT infrastructure. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

34

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Broader source: Energy.gov (indexed) [DOE]

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

35

Request Access to the PARSIIe Project Management Lessons Learned (PMLL) Repository  

Broader source: Energy.gov [DOE]

The page identifies the process by which PARSIIe username/password is issued to Users who only require access to the PARSIIe Project Management Lessons Learned (PMLL) Repository.

36

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Broader source: Energy.gov (indexed) [DOE]

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

37

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Broader source: Energy.gov (indexed) [DOE]

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

38

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

39

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

40

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

MOTOR VEHICLE (Pursuant to RSA 260:14)  

E-Print Network [OSTI]

permitted pursuant to RSA 260:14, V (a ), other than for bulk distribution for surveys, marketing/I.D. #: _________________________________ Vehicle Identification #: _________________________________ Last Known Address/Town _______________________________ Other Identification Information: ________________________ ***Reverse Side Must Be Completed Before

New Hampshire, University of

42

U-090: RSA enVision Discloses Environment Variable Information...  

Broader source: Energy.gov (indexed) [DOE]

and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and enVision V4.0 Service Pack 4 Patch 5. Impact: Exposure of sensitive information...

43

Policy Flash 2013-33 Department of Energy Order 206.2 Identity, Credential and Access Managment (ICAM)  

Broader source: Energy.gov [DOE]

Attached is Policy Flash 2013-33 Department of Energy Order 206.2 Identity, Credential and Access Managment (ICAM)

44

Can I access your Data? Privacy Management in mHealth  

E-Print Network [OSTI]

Can I access your Data? Privacy Management in mHealth Aarathi Prasad Department of Computer Science Mobile health (mHealth) has become important in the field of healthcare information technology, as pa

Kotz, David

45

Title of Project: Scoping Data Access and Integration Needs to Facilitate Better Management of Research Innovation  

E-Print Network [OSTI]

Title of Project: Scoping Data Access and Integration Needs to Facilitate Better Management-Madison Participants: P.S. Sriraj, Paul Metaxatos, Piyushimita (Vonu) Thakuriah Status: Active Objective: This project of the intended use and value of these databases. 3. Identify existing access procedures to WisDOT databases

Illinois at Chicago, University of

46

Memory Accesses Management During High Level Gwenole Corre, Eric Senn, Pierre Bomel, Nathalie Julien, Eric Martin  

E-Print Network [OSTI]

Memory Accesses Management During High Level Synthesis Gwenol´e Corre, Eric Senn, Pierre Bomel architecture and the memory mapping in behavioral synthesis. We formalize the memory mapping as a set of constraints for the synthesis, and defined a Memory Con- straint Graph and an accessibility criterion

Paris-Sud XI, Université de

47

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Broader source: Energy.gov (indexed) [DOE]

Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

48

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Broader source: Energy.gov (indexed) [DOE]

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

49

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Broader source: Energy.gov (indexed) [DOE]

Agent Discloses Node Secret Encryption Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5...

50

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticate...  

Broader source: Energy.gov (indexed) [DOE]

A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with...

51

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

52

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

53

Remote Access to the BNL Network, Cyber Security, Information Technology  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

54

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

55

U-090: RSA enVision Discloses Environment Variable Information to Remote  

Broader source: Energy.gov (indexed) [DOE]

0: RSA enVision Discloses Environment Variable Information to 0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA enVision PLATFORM: Version(s): 4.0 prior to 4.0 SP4 P5, 4.1 prior to 4.1 P3 ABSTRACT: A remote user can view potentially sensitive data on the target system. reference LINKS: CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain environment variables containing web system setup information via the web interface. Further information about this resolution and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and

56

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Broader source: Energy.gov (indexed) [DOE]

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

57

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

58

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...  

Broader source: Energy.gov (indexed) [DOE]

Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can...

59

Percutaneous Transsplenic Access to the Portal Vein for Management of Vascular Complication in Patients with Chronic Liver Disease  

SciTech Connect (OSTI)

Purpose: To evaluate the safety and feasibility of percutaneous transsplenic access to the portal vein for management of vascular complication in patients with chronic liver diseases. Methods: Between Sept 2009 and April 2011, percutaneous transsplenic access to the portal vein was attempted in nine patients with chronic liver disease. Splenic vein puncture was performed under ultrasonographic guidance with a Chiba needle, followed by introduction of a 4 to 9F sheath. Four patients with hematemesis or hematochezia underwent variceal embolization. Another two patients underwent portosystemic shunt embolization in order to improve portal venous blood flow. Portal vein recanalization was attempted in three patients with a transplanted liver. The percutaneous transsplenic access site was closed using coils and glue. Results: Percutaneous transsplenic splenic vein catheterization was performed successfully in all patients. Gastric or jejunal varix embolization with glue and lipiodol mixture was performed successfully in four patients. In two patients with a massive portosystemic shunt, embolization of the shunting vessel with a vascular plug, microcoils, glue, and lipiodol mixture was achieved successfully. Portal vein recanalization was attempted in three patients with a transplanted liver; however, only one patient was treated successfully. Complete closure of the percutaneous transsplenic tract was achieved using coils and glue without bleeding complication in all patients. Conclusion: Percutaneous transsplenic access to the portal vein can be an alternative route for portography and further endovascular management in patients for whom conventional approaches are difficult or impossible.

Chu, Hee Ho; Kim, Hyo-Cheol, E-mail: angiointervention@gmail.com; Jae, Hwan Jun [Seoul National University College of Medicine, Seoul National University Medical Research Center, Seoul National University Hospital, Department of Radiology, Institute of Radiation Medicine, Clinical Research Institute (Korea, Republic of); Yi, Nam-Joon; Lee, Kwang-Woong; Suh, Kyung-Suk [Seoul National University College of Medicine and Seoul National University Hospital, Department of Surgery (Korea, Republic of); Chung, Jin Wook; Park, Jae Hyung [Seoul National University College of Medicine, Seoul National University Medical Research Center, Seoul National University Hospital, Department of Radiology, Institute of Radiation Medicine, Clinical Research Institute (Korea, Republic of)

2012-12-15T23:59:59.000Z

60

Mercury: An Example of Effective Software Reuse for Metadata Management, Data Discovery and Access  

SciTech Connect (OSTI)

Mercury is a federated metadata harvesting, data discovery and access tool based on both open source packages and custom developed software. Though originally developed for NASA, the Mercury development consortium now includes funding from NASA, USGS, and DOE. Mercury supports the reuse of metadata by enabling searching across a range of metadata specification and standards including XML, Z39.50, FGDC, Dublin-Core, Darwin-Core, EML, and ISO-19115. Mercury provides a single portal to information contained in distributed data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow the users to perform simple, fielded, spatial and temporal searches across these metadata sources. One of the major goals of the recent redesign of Mercury was to improve the software reusability across the 12 projects which currently fund the continuing development of Mercury. These projects span a range of land, atmosphere, and ocean ecological communities and have a number of common needs for metadata searches, but they also have a number of needs specific to one or a few projects. To balance these common and project-specific needs, Mercury's architecture has three major reusable components; a harvester engine, an indexing system and a user interface component. The harvester engine is responsible for harvesting metadata records from various distributed servers around the USA and around the world. The harvester software was packaged in such a way that all the Mercury projects will use the same harvester scripts but each project will be driven by a set of project specific configuration files. The harvested files are structured metadata records that are indexed against the search library API consistently, so that it can render various search capabilities such as simple, fielded, spatial and temporal. This backend component is supported by a very flexible, easy to use Graphical User Interface which is driven by cascading style sheets, which make it even simpler for reusable design implementation. The new Mercury system is based on a Service Oriented Architecture and effectively reuses components for various services such as Thesaurus Service, Gazetteer Web Service and UDDI Directory Services. The software also provides various search services including: RSS, Geo-RSS, OpenSearch, Web Services and Portlets, integrated shopping cart to order datasets from various data centers (ORNL DAAC, NSIDC) and integrated visualization tools. Other features include: Filtering and dynamic sorting of search results, book- markable search results, save, retrieve, and modify search criteria.

Devarakonda, Ranjeet [ORNL] [ORNL

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol  

E-Print Network [OSTI]

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol Xi in this paper. The proposed protocol is not only fair and optimistic, but also efficient and abuse the Internet. In such scenario, fairness is critical, because they may be potentially mistrusted. That is

62

Research Student Handbook www.leeds.ac.uk/rsa/handbooks.html  

E-Print Network [OSTI]

that the information contained in this Handbook is accurate it does not accept liability for any inaccuraciesResearch Student Handbook 2011-2012 www.leeds.ac.uk/rsa/handbooks.html This Handbook should be read;Research Student Handbook 2011-2012 Important This Handbook was published in August 2011. Whilst

Haase, Markus

63

STUDY PROTOCOL Open Access Improving the management of non-ST elevation  

E-Print Network [OSTI]

that evidence based treatments are under-utilised in this patient population, particularly in high-risk patients potential for improvement in the management and treatment of this patient population (risk stratification professionals and hospital managers. Trial registration: Clinicaltrials.gov NCT00716430 * Correspondence: m

Boyer, Edmond

64

Unified Link Layer API: A generic and open API to manage wireless media access  

Science Journals Connector (OSTI)

We present the Unified Link Layer API (ULLA) framework: an open and extensible API framework that incorporates a number of requirements related to a wide range of applications, including multi-mode and cross-layer optimisation scenarios. This work has been mainly motivated by the complexity and interoperability problems related to the large number of wireless \\{APIs\\} available today. ULLA provides database and object oriented service abstractions to applications through a generic query mechanism, a method to setup asynchronous notifications and a command interface. It encapsulates link level heterogeneity by defining a unified model for link technologies. We describe design details, various implementation options and discuss how the proposed ULLA design provides an extensible, scalable and platform independent framework, enabling seamless link access and control in various types of device platforms. Application programming using ULLA is illustrated using code examples. Numerous usage scenarios for ULLA are presented, highlighting unified access to heterogeneous link standards while encouraging application innovation.

Mahesh Sooriyabandara; Tim Farnham; Costas Efthymiou; Matthias Wellens; Janne Riihijrvi; Petri Mhnen; Alain Gefflaut; Jos Antonio Galache; Diego Melpignano; Arthur van Rooijen

2008-01-01T23:59:59.000Z

65

Physical Resource Management and Access Mediation Within the Cloud Computing Paradigm  

E-Print Network [OSTI]

by developing extensions to the existing cloud computing paradigm that a ord consumer-driven access requirements and integration of new physical hardware platforms. iv NOMENCLATURE API Application Programming Interface AWS Amazon Web Services SCADA... manner as virtualized components. For example, a supervisory control and data acquisition (SCADA) security training facility may want to integrate physical SCANDA components into a virtual private cloud envi- ronment. Unfortunately, commercial...

Betts, Hutson

2012-10-19T23:59:59.000Z

66

The application of hyperspectral image techniques on MODIS data for the detection of oil spills in the RSA1  

E-Print Network [OSTI]

The application of hyperspectral image techniques on MODIS data for the detection of oil spills Oceanography Centre, Empress Dock, Southampton, S014 3ZH, UK ABSTRACT Oil spills pose a serious threat to the sensitive marine ecosystem of the RSA. The study aims to detect and identify oil spills using remote sensing

Quartly, Graham

67

Data Access  

Science Journals Connector (OSTI)

Data access is access to collected and compiled data for the purposes of analysis and reporting. Data access can be allowed to different persons, ... depending on their nature: access to fundamental data for sta...

2008-01-01T23:59:59.000Z

68

Revised June 2014 Training Management System (TMS)  

E-Print Network [OSTI]

Revised June 2014 Training Management System (TMS) User Manual Contents Accessing the TMS.................................................................................................................15 #12;2 Accessing the TMS Before accessing the Training Management System you must know your Harvard...........................................................................................................................................2 Training Director, Training Manager, and Course Director Access

Heller, Eric

69

Open Access  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Communication » Communication » Open Access Open Access Open access (OA) is the practice of providing unrestricted access via the Internet to peer-reviewed scholarly journal articles. Learn more below... Questions? Open Access Email Open access publishing and publications have experienced substantial growth, expansion and uptake in recent years. What exactly is an open access publication? There are many definitions, but in a nutshell an open access publication is a publication that provides immediately free online access to all users worldwide. This may sound like a tall order, and yet there are to date over 4000 journal publications that fit this definition. The need for this type of access has been driven by the out-of-control costs for scholarly publications. Statistics kept by the Association for Research Libraries

70

Data Accessibility  

Science Journals Connector (OSTI)

Data accessibility is acriterion of data quality ..., and is met when authorized health professionals are provided with the means to find, obtain, or make use of ...

2008-01-01T23:59:59.000Z

71

MyRED Grant Parent/Guest Access Grant Parent/Guest Access  

E-Print Network [OSTI]

MyRED ­ Grant Parent/Guest Access Grant Parent/Guest Access Follow these steps if you need to grant a parent or guest access to your student information. 1) From your Student tab underRED. 12/1/2011 Page 1 #12;MyRED ­ Grant Parent/Guest Access 3) Select Manage

Farritor, Shane

72

ACCESS CONTROL  

Broader source: Energy.gov (indexed) [DOE]

TERMS/DEFINITIONS FROM DOE M 470.4-7 TERMS/DEFINITIONS FROM DOE M 470.4-7 ACCESS CONTROL. The process of permitting access or denying access to information, facilities, nuclear materials, resources, or designated security areas. ACCESS CONTROL MEASURES. Hardware and software features, physical controls, operating procedures, administrative procedures, and various combinations of these designed to detect or prevent unauthorized access to classified information; special nuclear materials; Government property; automated information systems, facilities, or materials; or areas containing the above and to enforce use of these measures to protect Departmental security and property interests. CRITICAL PATH SCENARIO. An adversary-based scenario that is generated during the conduct of a vulnerability assessment and accounts for adversary tactics that

73

Investment management accessible to all  

Science Journals Connector (OSTI)

William Sharpe, professor emeritus of finance, Stanford University; founder and chairman, Financial Engines; Nobel Laureate (1990), economic sciences.

Vanessa Spedding

2002-01-01T23:59:59.000Z

74

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

was reported in RSA Authentication Manager. July 8, 2013 V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host...

75

Environment/Health/Safety/Security (EHSS): Building Access  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Building Access Building Access Access Control - On-site access is controlled by either keys or by LBNL's automated access control system. LBNL's automated access control system is used for exterior perimeter doors to most buildings, as well as some individual labs, offices, and equipment. The access system is linked to the LBNL Human Resources PeopleSoft database and is updated with the employees' or affiliates' current appointment status at the Laboratory. . If your LBNL appointment end date has expired, then your access will be suspended. Security Access Managers (SAM) Administrators - LBNL's automated access control system is a decentralized access permission control structure managed by each Division or major program via Security Access Managers (SAM) Administrators and In-putters. Go here for the current

76

telecommunications access  

Science Journals Connector (OSTI)

In a system, such as a computer or data processing system, access for data transmission between (a) main storage or internal memory and (b) channel-attached terminals or link-attached terminals via telecommunications

2001-01-01T23:59:59.000Z

77

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc  

Broader source: Energy.gov (indexed) [DOE]

HQ OCIO Instructions for Using Secure Email (SMail) via HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy DOE HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Requirements SMail: 1. An Energy IT Services (EITS) provided Exchange email account. 1 2. An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server. 2 3. Appropriate access granted Active Directory group membership. 3 4. DOEnet or Internet access and a supported web browser. Login Procedure for SMail:

78

RESEARCH Open Access Probabilistic framework for opportunistic  

E-Print Network [OSTI]

approaches. Keywords: Cognitive radio networks, Opportunistic spectrum management, Medium access control 1 that the licensed spectrum is underutilized for 15 to 85% of the time depending on the spatial location [1]. ThusRESEARCH Open Access Probabilistic framework for opportunistic spectrum management in cognitive ad

Perkins, Dmitri

79

management  

National Nuclear Security Administration (NNSA)

5%2A en Management and Budget http:nnsa.energy.govaboutusouroperationsmanagementandbudget

P...

80

Supplement Analysis for the Transmission System Vegetation Management Program FEIS (DOE/EIS-0285/SA-111) - (Fairview-Brandon #1, Fairview-Brandon #2 and Fairview-Rogue #1access road, danger tree and structure clearing) 9/25/02  

Broader source: Energy.gov (indexed) [DOE]

25, 25, 2002 REPLY TO ATTN OF: KEPR-4 SUBJECT: Supplement Analysis for the Transmission System Vegetation Management Program FEIS (DOE/EIS-0285/SA-111) - (Fairview-Bandon #1, Fairview-Bandon #2 and Fairview-Rogue #1access road, danger tree and structure clearing) Benjamin Tilley Natural Resource Specialist Proposed Action: Vegetation Management for the Fairview-Bandon #1and #2 and Fairview- Rogue #1 transmission lines. Location: Throughout the Fairview-Bandon #1, Fairview-Bandon #2 and Fairview-Rogue #1 corridors located within Coos and Curry counties in Oregon. Proposed by: Bonneville Power Administration (BPA). Description of the Proposal: Tall-growing vegetation that is currently or will soon be a hazard to the line will be removed. Vegetation that will grow tall will be selectively eliminated before it reaches a height or density to begin competing with low-growing

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

(DOE/EIS-0285/SA-109): Supplement Analysis for the Transmission System Vegetation Management Program FEIS - (Santiam-Alvey # 1 #2 access road and structure clearing) 9/9/02  

Broader source: Energy.gov (indexed) [DOE]

9, 9, 2002 REPLY TO ATTN OF: KEPR-4 SUBJECT: Supplement Analysis for the Transmission System Vegetation Management Program FEIS (DOE/EIS-0285/SA-109) - (Santiam-Alvey # 1 and #2 access road and structure clearing) Benjamin Tilley Natural Resource Specialist Proposed Action: Vegetation Management for the Santiam-Alvey # 1 and #2 transmission line. Location: Throughout the Santiam-Alvey # 1 and #2 corridor located within Linn and Lane counties in Oregon. Proposed by: Bonneville Power Administration (BPA). Description of the Proposal: Tall-growing vegetation that is currently or will soon be a hazard to the line will be removed. Vegetation that will grow tall will be selectively eliminated before it reaches a height or density to begin competing with low-growing species. Cut-stump or follow- up herbicide treatments on re-sprouting-type species will be carried out to ensure

82

E-Print Network 3.0 - access to information Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to information Search Powered by Explorit Topic List Advanced Search Sample search results for: access to information Page: << < 1 2 3 4 5 > >> 1 Asset Management View Access...

83

Environment/Health/Safety/Security (EHSS): Site Access  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Site Access Office Site Access Office Contact Information | Feedback Most-viewed links: Badging Getting a badge - new, stolen, or replacement. Building Access On-site access, key requests, Security Access Managers. Visitor Access Visitor passes, general information. Parking at the Lab Permits, parking map, vehicles registration, parking policy. Other information: FAQ Frequently Asked Questions. Foreign National Access Information on access to DOE sites. Gate Information Information on the different Lab gates. Getting to the Lab Directions and options for getting to Berkeley Lab: buses, carpooling, rapid transit, biking. Guest House Guest House information. Lost and Found Lost and found information and contacts. Meeting and Conference Meeting and conference procedures and general information.

84

Abstracts of posters in Access in children  

Science Journals Connector (OSTI)

In paediatric hemodialysed patients it is often very difficult to realize a lasting vascular access with a balanced flow rate. To perform an effective surgical management without a serious injury to the vessel...

Gauke Kootstra MD; PhD; Paul J. G. Jrning MD; PhD

1983-01-01T23:59:59.000Z

85

PIA - Foreign Access Central Tracking System (FACTS) | Department...  

Broader source: Energy.gov (indexed) [DOE]

PIA - Foreign Access Central Tracking System (FACTS) More Documents & Publications PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL PeopleSoft - Human...

86

Guidelines for left-turn bays at unsignalized access locations on arterial roadways  

E-Print Network [OSTI]

It has long been recognized that effective access management along arterial streets can alleviate traffic congestion. A major goal within access management is to limit the speed differential between turning and through vehicles. Left-turn bays...

Hawley, Patrick Emmett

2012-06-07T23:59:59.000Z

87

A comparative study of specification models for autonomic access control of digital rights  

Science Journals Connector (OSTI)

One of the goals of Digital Rights Management Systems is the provision of a flexible access rights management system to specify and enforce digital rights. Policy-based access control is an important feature of flexible access management systems as it ...

K. Bhoopalam; K. Maly; R. Mukkamala; M. Zubair; D. Agrawal; D. Kaminsky

2005-10-01T23:59:59.000Z

88

A new approach to ensure successful implementation and sustainable DSM in RSA mines / Danil Francois le Roux.  

E-Print Network [OSTI]

??In this study a new tool was developed that made new approaches possible for the successful implementation of Demand Side Management (DSM) projects. The new (more)

Le Roux, Danil Francois

2005-01-01T23:59:59.000Z

89

PARS II User Account Access Guide  

Broader source: Energy.gov (indexed) [DOE]

Office of Management Office of Management Office of Engineering and Construction Management User Account Access Guide for PARS II Version 1.5 June 25, 2011 Submitted by: Energy Enterprise Solutions 20440 Century Blvd. Suite 150 Germantown, MD 20874 Phone 301-916-0050 Fax 301-916-0066 www.eesllc.net June 25, 2011 (V1.5) PARS II User Account Access Guide ii This page intentionally left blank. June 25, 2011 (V1.5) PARS II User Account Access Guide iii Title Page Document Name: User Account Access Guide for PARS II Version Number: V1.5 Publication Date: June 25, 2011 Contract Number: DE-AT01-06IM00102 Project Number: 1ME07 CLIN 4 Prepared by: Scott Burns, Energy Enterprise Solutions, LLC Reviewed by: Judith Bernsen, Energy Enterprise Solutions, LLC

90

Template Discontinuation Access  

Broader source: Energy.gov (indexed) [DOE]

FOR SUBJECT FOR SUBJECT FROM: Personnel Security Program Manager SUBJECT: Discontinuation of Access Eligibility Determination Reference is made to your Questionnaire for National Security Positions signed on [insert date], which was forwarded to this office in connection with a Department of Energy security clearance request. A review of that form disclosed recent use of illegal drugs. [Insert a brief description of the circumstances such as: Specifically, you listed marijuana use 1 time in 5/02; 1 time in 2/03; and 1 time in 3/07.] This office has discontinued the personnel security processing of your security clearance due to your illegal drug usage within twelve months of the signing of your security clearance application.

91

Capital Access Program (Vermont)  

Broader source: Energy.gov [DOE]

The Capital Access Program provides loan guarantees to small businesses seeking access to commercial credit. Premiums paid by the borrower and matched by Vermont Economic Development Authority fund...

92

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

91 - 18700 of 28,560 results. 91 - 18700 of 28,560 results. Article Energy Efficiency Hits from the Doors (and Windows) Our 1970's-vintage house always seemed a bit too welcoming when howling winter winds swept up Colorado's foothills. http://energy.gov/energysaver/articles/energy-efficiency-hits-doors-and-windows Article U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. http://energy.gov/cio/articles/u-205-rsa-access-manager-session-replay-flaw-lets-remote-users-access-system Article U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. http://energy.gov/cio/articles/u-125-cisco-asa-multiple-bugs-let-remote-users-deny-service

93

Remote Access Options  

Broader source: Energy.gov [DOE]

If access is required to DOE Headquarters internal network resources, such as messaging, productivity tools or network-stored files and folders while away from the DOE building, you can access them through a Virtual Private Network.

94

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

91 - 21200 of 26,764 results. 91 - 21200 of 26,764 results. Article T-672: Oracle Critical Patch Update Advisory- July 2011 Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. This Critical Patch Update contains 78 new security fixes across all product families. http://energy.gov/cio/articles/t-672-oracle-critical-patch-update-advisory-july-2011 Article T-640: RSA Access Manager Server CVE-2011-0322 Update RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support.

95

Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic Center: Email Security Compliance Patch Management Financial Services Health care RSA 2008 RSS | Login | Register  

E-Print Network [OSTI]

SEARCH Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic located the malicious files, mostly MP3 or AVI in format, on popular peer-to- peer (P2P) websites appear when users employ certain terms when searching for music and video, he said. Once the files

Gupta, Minaxi

96

Management Challenges at the Department of Energy ? Fiscal Year...  

Energy Savers [EERE]

Our testing revealed various weaknesses related to security reporting, access controls, patch management, system integrity, configuration management, segregation of duties and...

97

Access for All  

E-Print Network [OSTI]

..................................................................................... 6 Methodology................................................................................... 11 Entrance into Algebra I Pre-AP ...................................................... 14 Results... ...................................................................................... 27 III ACCESS TO ADVANCED CLASSES ............................................... 28 Introduction..................................................................................... 28 Methodology...

Stearns, Linda Lea Merenda

2012-07-16T23:59:59.000Z

98

Demystifying Open Access  

SciTech Connect (OSTI)

The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

Mele, Salvatore

2007-05-14T23:59:59.000Z

99

Mead-Liberty 345-kV Transmission Line Access Road Maintenance...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2 Mead-Liberty 345-kV Transmission Line Access Road Maintenance and Localized Vegetation Management Maricopa County, Arizona Categorical Exclusion Continuation Sheet Project...

100

Web Access to Supercomputing  

Science Journals Connector (OSTI)

Theoretically computational and data grids are the computing paradigm of choice but they will not gain wide acceptance until users have seamless access to them. The authors describe how to provide comfortable intuitive yet powerful Web access to supercomputing. A Web-based grid-enabled application that processes analyzes and delivers remote-sensing images provides an example of the technology at work.

Giovanni Aloisio; Massimo Cafaro; Carl Kesselman; Roy Williams

2001-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Accessing HPSS at NERSC  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Accessing HPSS Accessing HPSS Accessing HPSS Once you have successfully generated an HPSS token you can access NERSC's HPSS in the different ways listed below. HSI and HTAR are usually the best ways to transfer data in and out of HPSS but other methods are also included. Access Method When to use this method Features Limitations HSI When a full-featured unix-like interface is desired high performance (parallel); unix-like user interface; firewall mode client is specific to HPSS version and might not work at other sites; HTAR When you have large collections of smaller (~10MB or less) files high performance (parallel); creates a tar file directly in HPSS along with an index file; more efficient for large collections of file same client limitations as HSI; also does not have firewall mode so using on a remote site with a firewall will require modification of firewall rules

102

Public Key Cryptography and Key Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Information in this chapter of the directive has been consolidated into the Identity, Credential, and Access Management (ICAM) Program as defined in DOE O 206.2.

2013-06-11T23:59:59.000Z

103

Bonneville Power Administration Attachment P Oversupply Management...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transmission Provider will displace all such Generators on a pro-rata basis. Bonneville Power Administration Attachment P Oversupply Management Protocol Open Access Transmission...

104

Audit Report Management of Bonneville Power Administration's...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

a significant number of high-risk weaknesses in the areas of access controls, patch management and validation of user input; 2 * Operational security controls designed to...

105

TERRORISM TRUMPS INTERNET ACCESS  

Science Journals Connector (OSTI)

TERRORISM TRUMPS INTERNET ACCESS ... The regulation is in response to fears that terrorists will be able to punch into the Internet and gather theoretical accident information that the government requires for environmental purposes. ...

JEFF JOHNSON

2000-07-03T23:59:59.000Z

106

MetaData for Efficient, Secure and Extensible Access to Data in a Medical Grid  

E-Print Network [OSTI]

1 MetaData for Efficient, Secure and Extensible Access to Data in a Medical Grid Jean-Marc Pierson1 to access data and to secure the transactions. Keywords: metadata management, access control, medical grids imaging project grid. Metadata represent data about the data: In our case, the data are medical images

Paris-Sud XI, Université de

107

Burkina Faso Energy Access Project | Open Energy Information  

Open Energy Info (EERE)

Faso Energy Access Project Faso Energy Access Project Jump to: navigation, search Name of project Burkina Faso Energy Access Project Location of project Burkina Faso Year initiated 2007 Organization World Bank Website http://documents.worldbank.org Coordinates 12.238333°, -1.561593° References Document[1] Energy Access Project aims to support Burkina Faso's efforts to increase access to, and use of energy services to improve living conditions in selected rural, peri-urban, and urban areas. The project includes the following components : increasing access to electricity services in the urban, peri-urban and rural areas; woodfuels supply management and inter-fuel substitution initiatives; and institutional strengthening, capacity development, and harmonization. References ↑ "Document"

108

Visitor Hanford Computer Access Request - Hanford Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Visitor Hanford Computer Access Request Visitor Hanford Computer Access Request Visitor Hanford Computer Access Request Visitor Hanford Computer Access Request Email Email Page |...

109

Plan - Data Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Plan Plan Data Management for Data Providers Click an arrow to follow the data management path of a data set from planning to curation. plan Overview plan Plan manage Manage archive Archive curation DAAC Curation Data Management Overview Plan Manage Archive DAAC Curation Related Links DAAC Help Best Practices PDF Workshops DataONE ESIP Data Management Plans NASA's Terrestrial Ecology Program now requires that each proposal include a Data Management Plan (DMP) of up to two pages. A DMP for a proposal is a brief document that outlines what you will do with your data during and after your research, to ensure your data will be safe, documented, and accessible now and in the future. A DMP - developed early and used throughout the research project - will increase research efficiency by making the data understandable and usable in the future and

110

Utility Access Questionnaire | Utility Access Questionnaire  

Open Energy Info (EERE)

Questionnaire Questionnaire We are not currently accepting submissions. Thank you for your interest. Want to change your response? OMB Control Number: 1910-5164 Expiration Date: 9/30/2016 Public reporting burden for this collection of information is estimated to average 20 minutes per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Office of Management, Paperwork Reduction Project (1910-0400), U.S. Department of Energy, 1000 Independence Avenue, S.W., Washington, DC 20585; and to the Office of Management and Budget (OMB),

111

Quantum random access memory  

E-Print Network [OSTI]

A random access memory (RAM) uses n bits to randomly address N=2^n distinct memory cells. A quantum random access memory (qRAM) uses n qubits to address any quantum superposition of N memory cells. We present an architecture that exponentially reduces the requirements for a memory call: O(log N) switches need be thrown instead of the N used in conventional (classical or quantum) RAM designs. This yields a more robust qRAM algorithm, as it in general requires entanglement among exponentially less gates, and leads to an exponential decrease in the power needed for addressing. A quantum optical implementation is presented.

Vittorio Giovannetti; Seth Lloyd; Lorenzo Maccone

2007-08-14T23:59:59.000Z

112

Management Plan Management Plan  

E-Print Network [OSTI]

; and 5) consistency with the Endangered Species Act and Clean Water Act. In addition, the management plan Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have

113

Access Grid | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Access Grid Access Grid Access Grid The Access Grid is the ensemble of resources that can be used to support human interaction across the grid. It consists of multimedia display, presentation and interactive environments, interfaces to grid middleware, and interfaces to visualization environments. The Access Grid will support large-scale distributed meetings, collaborative work sessions, seminars, lectures, tutorials and training. The Access Grid design point is group-to-group communication (thus differentiating it from desktop to desktop based tools that focus on individual communication). The Access Grid environment must enable both formal and informal group interactions. Large-format displays integrated with intelligent or active meeting rooms are a central feature of the Access Grid nodes. Access Grid nodes are

114

DOE Hydrogen Analysis Repository: Stochastic Energy Source Access  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Stochastic Energy Source Access Management (SESAM) Stochastic Energy Source Access Management (SESAM) Project Summary Full Title: Stochastic Energy Source Access Management (SESAM): Infrastructure-integrative modular plant for hydrogen-electric co-generation Project ID: 140 Principal Investigator: Kai Strunz Purpose The model demonstrates a renewable power plant that is designed to seamlessly integrate with the given energy infrastructure while serving the dual purpose of generating electric power and hydrogen. A multilevel storage absorbs short-term shocks on the infrastructure while also compensating for intermittency of wind and solar energy conversion in the long term. The model supports in particular analysis and design of a hydrogen infrastructure with a high penetration of renewable energy. Performer

115

Information Access Router for Integrated Information Access System Koji Murakami  

E-Print Network [OSTI]

Information Access Router for Integrated Information Access System Koji Murakami Department System (IIAS) that accepts diverse kinds of questions and provides the requested information in the most suit- able format for the information need. We designed a set of 18 Information Access Types

116

Energy Consumption in Access Networks  

Science Journals Connector (OSTI)

We present a comparison of energy consumption of access networks. We consider passive optical networks, fiber to the node, point-to-point optical systems and WiMAX. Optical access...

Baliga, Jayant; Ayre, Robert; Sorin, Wayne V; Hinton, Kerry; Tucker, Rodney S

117

Open Access Week Planning Materials  

E-Print Network [OSTI]

TAMUemployees list TAMUemployees list KAMU-TV Magazine TAMU Landing-page for Open Access Week library.tamu.edu/oaweek Open Access Week (organized by SPARC) www.openaccessweek.org Digital Repository Disseminate your work... via the Texas A&M University Digital Repository and get ? ?more exposure universal access easier information discovery persistent access wide range of content? SPARC http://www.arl.org/sparc...

118

Accounts & Access | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Account Information Accounts and Access FAQ Connect & Log In Using CRYPTOCards SSH Keys on Surveyor Disk Space Quota Management Allocations Decommissioning of BG/P Systems and Resources Blue Gene/Q Versus Blue Gene/P Mira/Cetus/Vesta Intrepid/Challenger/Surveyor Tukey Eureka / Gadzooks Policies Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] Accounts & Access Account Information Account Information: All computing carried out on the ALCF systems is associated with a user "account." This account is used to log onto the login servers and run jobs on the resources. Using CRYPTOcards Using CRYPTOCards: Useful information to guide you in using and troubleshooting your CRYPTOcard.

119

National Radiobiology Archives distributed access programmer's guide  

SciTech Connect (OSTI)

The National Radiobiology Archives is a comprehensive effort to gather, organize, and catalog original data, representative specimens, and supporting materials related to significant radiobiology studies. This provides researchers with information for analyses which compare or combine results of these and other studies and with materials for analysis by advanced molecular biology techniques. This Programmer's Guide document describes the database access software, NRADEMO, and the subset loading script NRADEMO/MAINT/MAINTAIN, which comprise the National Laboratory Archives Distributed Access Package. The guide is intended for use by an experienced database management specialist. It contains information about the physical and logical organization of the software and data files. It also contains printouts of all the scripts and associated batch processing files. It is part of a suite of documents published by the National Radiobiology Archives.

Prather, J. C. [Linfield Coll., McMinnville, OR (United States); Smith, S. K.; Watson, C. R. [Pacific Northwest Lab., Richland, WA (United States)

1991-12-01T23:59:59.000Z

120

www.mcgill.ca/investment-management BCom Honours in Investment Management  

E-Print Network [OSTI]

www.mcgill.ca/investment-management BCom Honours in Investment Management The BCom Honours in Investment Management is the first to offer you training that combines rigorous academic groundwork with real-world experience in investment management, global internship opportunities, and access to the expertise

Barthelat, Francois

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

July 5, 2012 July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). June 29, 2012 U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. June 28, 2012 U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

122

A generic security API for symmetric key management on cryptographic devices  

Science Journals Connector (OSTI)

Abstract We present a new symmetric key management API for cryptographic devices intended to implement security protocols in distributed systems. Our API has a formal security policy and proofs of security in the symbolic model, under various threat scenarios. This sets it apart from previous \\{APIs\\} such as RSA PKCS#11, which are under-specified, lack a clear security policy and are often subject to attacks. Our design is based on the principle of explicitness: the security policy for a key must be given at creation time, and this policy is then included in any ciphertext containing the key. Our API also contains novel features such as the possibility of insisting on a freshness check before accepting an encrypted key for import. To show the applicability of our design, we give an algorithm for automatically instantiating the API commands for a given key management protocol and apply it on the ClarkJacob protocols suite.

Vronique Cortier; Graham Steel

2014-01-01T23:59:59.000Z

123

ACCESSING SUBCONTRACTOR EMPLOYMENT RECORDS | Department of Energy  

Office of Environmental Management (EM)

ACCESSING SUBCONTRACTOR EMPLOYMENT RECORDS ACCESSING SUBCONTRACTOR EMPLOYMENT RECORDS Federal officials, on occasion, may seek access to contractor or subcontractor employment and...

124

SLAC Management Systems Larry Dardzinski/Ops/x4794  

E-Print Network [OSTI]

SLAC Management Systems PPA Update 24 May 12 Larry Dardzinski/Ops/x4794 #12;Outline · Management · Discussion Page 2 #12;A simple definition of a Management System A management system is the means by which of Management Systems? · Allow your customers and users to efficiently and effectively access your services

Wechsler, Risa H.

125

A scalable and tiling multi-monitor aware window manager  

Science Journals Connector (OSTI)

The design of a prototypical scalable and tiling multi-monitor aware window manager is described that may overcome some of the layout management problems encountered with tiling window managers. The system also features a novel approach to monitor configuration ... Keywords: distal access, monitor configuration, multiple monitors, window management, window manager

Joona Antero Laukkanen

2011-05-01T23:59:59.000Z

126

VEHICLE ACCESS PORTALS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

East Jemez Road (Map 1) East Jemez Road (Map 1) VEHICLE ACCESS PORTALS Traffic Lane 1: Closed except for emergencies and maintenance operations. Traffic Lanes 2-7: Drivers required to stop and present LANL badges or other form of valid identification to Protective Force officers. Drivers may proceed upon direction of the officers. Note: Commercial delivery vehicle drivers must also pres- ent their inspection passes from Post 10. More Information: spp-questions@lanl.gov Non-work Hours Vehicles entering LANL at the East Jemez VAPs during non-work hours (between 7

127

Hospitality Management Hospitality Management  

E-Print Network [OSTI]

of the global hospitality industry. Academic Offerings HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR Students pursuing programs in other areas of study may choose a minor Lodging Management 3 HPM 309 Sports Arena Management 3 HPM 312* Cost Control in Food Services (Prereq

McConnell, Terry

128

PIA - EERE Infrastructure-EERE Reviewer Management System | Department...  

Office of Environmental Management (EM)

Safety Management Workshop Registration, PIA, Idaho National Laboratory PIA - HSPD-12 Physical and Logical Access System PIA - Bonneville Power Adminstration Ethics Helpline...

129

Tribal Energy Development Operation and Management Best Practices...  

Office of Environmental Management (EM)

hone and revise strategic energy plans, foster and grow management capabilities, create cloud services to store historical data and ensure that succeeding councils have access to...

130

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Energy Savers [EERE]

Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative...

131

Open Access Transmission Tariff  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transmission | OATT Transmission | OATT Skip Navigation Links Transmission Functions Infrastructure projects Interconnection OASIS OATT Western Open Access Transmission Service Tariff Revision Western Area Power Administration submitted its revised Open Access Transmission Service Tariff with the Federal Energy Regulatory Commission on Sept. 30, 2009. The tariff became effective on Dec. 1, 2009, as modified by Western's March 2, 2011 compliance filing. The revised tariff was developed to comply with FERC Order No. 890 and to be consistent with Western's statutory and regulatory requirements. It addresses changes in transmission services and planning. FERC issued an order on Dec. 2, 2010, granting Western's petition for a Declaratory Order approving the tariff as an acceptable reciprocity tariff, subject to Western making a compliance filing within 30 days to address items in Attachment C, Attachment P and Attachment Q. Western made its compliance filing on March 2, 2010, addressing FERC's Dec. 2, 2010, order. FERC accepted Western's March 2, 2011 compliance filing on April 25, 2011. Western has made several ministerial filings to its OATT as part of FERC's eTariff viewer system, the last of these was approved on March 29, 2013. Further detail can be found in the links below.Current OATT

132

Template for Discontinuation of Access Eligibility Determination  

Broader source: Energy.gov (indexed) [DOE]

MEMORANDUM FOR (SUBJECT'S NAME) MEMORANDUM FOR (SUBJECT'S NAME) FROM: Personnel Security Program Manager SUBJECT: Discontinuation of Access Eligibility Determination Reference is made to your Questionnaire for National Security Positions (QNSP) signed [insert date], which was forwarded to this office in connection with a Department of Energy security clearance request. Your case was submitted to the Office of Personnel Management (OPM) and an investigation dated [insert date] has been received. [Insert a brief description of the circumstances such as: A review of your case reveals that you listed marijuana use 5-10 times from 8/01 to 5/05 on your QNSP. During the personal subject interview with OPM, you stated that the end date for the marijuana use was incorrect and the last time

133

Access to UCNI | Department of Energy  

Office of Environmental Management (EM)

Access to UCNI Access to UCNI An authorized person see 1017.20(a) may grant routine access to UCNI to eligible individuals. In order to be eligible for routine access, the...

134

Hybrid Access Control Mechanism in Two-Tier Femtocell Networks  

E-Print Network [OSTI]

. . . . . . . . . . . . . . . . . . . . 5 B. Interference Management in Femtocell Networks . . . . . . 9 C. Access Control in Femtocell Networks . . . . . . . . . . . . . 11 D. Thesis Contribution . . . . . . . . . . . . . . . . . . . . . . 15 E. Organization of Thesis... . . . . . . . . . . . . . . . . . . . . 16 II STANDARD ITERATIVE POWER CONTROL ALGORITHMS 17 A. Distributed Power Control with Fixed SINR . . . . . . . . 20 B. Standard Interference Function . . . . . . . . . . . . . . . 23 C. Iterative Power Control in a Two-Tier Femtocell Network . 30...

Mantravadi, Sirisha 1987-

2012-08-21T23:59:59.000Z

135

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6, 2012 6, 2012 U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The

136

NSLS User Access | Training  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Training Training Training for New Users and Users with Expired Training and/or Badges: All new users and users with expired badges must complete or update the training modules shown below prior to access to the experimental floor. The training can be completed online prior to arrival at the NSLS and is strongly recommended to save considerable time during check-in at the Guest, User, Visitor (GUV) Center in Building 400. Please note each training module is followed by an exam which asks for your name and guest number. If you do not already have a guest number, leave this entry blank. All new users and users with expired badges MUST arrive on a weekday (no weekends or holidays) and check in at the GUV Center so that your training can be verified and to receive a photo ID badge (new or updated). The GUV

137

V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access  

Broader source: Energy.gov (indexed) [DOE]

39: Samsung and Dell printers Firmware Backdoor Unauthorized 39: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability December 4, 2012 - 2:00am Addthis PROBLEM: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability PLATFORM: The Samsung printer firmware before 20121031 ABSTRACT: Samsung (as well as some Dell printers manufactured by Samsung) issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. REFERENCE LINKS: Samsung Security Advisory Vulnerability Note VU#281284 Bugtraq ID: 56692 CVE-2012-4964 IMPACT ASSESSMENT: Medium DISCUSSION: Samsung and Dell printers are prone to an unauthorized-access vulnerability

138

V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access  

Broader source: Energy.gov (indexed) [DOE]

9: Samsung and Dell printers Firmware Backdoor Unauthorized 9: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability December 4, 2012 - 2:00am Addthis PROBLEM: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability PLATFORM: The Samsung printer firmware before 20121031 ABSTRACT: Samsung (as well as some Dell printers manufactured by Samsung) issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. REFERENCE LINKS: Samsung Security Advisory Vulnerability Note VU#281284 Bugtraq ID: 56692 CVE-2012-4964 IMPACT ASSESSMENT: Medium DISCUSSION: Samsung and Dell printers are prone to an unauthorized-access vulnerability

139

Laboratory Access | Sample Preparation Laboratories  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Access Access Planning Ahead Planning Ahead Please complete the Beam Time Request (BTR) and Support Request forms thourgh the User Portal. Thorough chemical and sample information must be included in your BTR. Support Request forms include a list of collaborators that require laboratory access and your group's laboratory equipment requests. Researcher safety is taken seriously at SLAC. Please remember that radioactive materials, nanomaterials, and biohazardous materials have additional safety requirements. Refer to the SSRL or LCLS Safety Offices for further guidance. Upon Arrival Upon Arrival Once you arrive you must complete training and access forms before accessing the Sample Preparation Laboratories (SPL). All Sample Prep Lab doors are locked with access key codes. Once your SPL

140

Microsoft Word - CX-CentraliaAreaAccessRoadsFY13_WEB.doc  

Broader source: Energy.gov (indexed) [DOE]

Darin Bowman Project Manager TELF-TPP-3 Proposed Action: Access Road maintenance on the Chehalis-Centralia No. 1, Chehalis-Covington No. 1, Paul-Allston No. 2, and Paul-Napavine...

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Vehicle barrier with access delay  

DOE Patents [OSTI]

An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

Swahlan, David J; Wilke, Jason

2013-09-03T23:59:59.000Z

142

Mobile Information Access M. Satyanarayanan  

E-Print Network [OSTI]

Carnegie Mellon University Pittsburgh, PA 15213 To appear in IEEE Personal Communications, Volume 3, No. 1, February 1996 Abstract The ability to access information on demand when mobile will be a criticalMobile Information Access M. Satyanarayanan January 1996 CMU­CS­96­107 School of Computer Science

143

Cough REVIEW Open Access  

E-Print Network [OSTI]

Cough in chronic obstructive pulmonary disease: is it important and what are the effects of treatment? Peter MA Calverley 1,2 Over the last 40 years the assessment and treatment of chronic obstructive pulmonary disease has focused primarily on airflow obstruction with little significance given to the problem of cough. The reasons for this include a view that cough arises simply from the direct irritant and inflammatory effect of cigarette smoke or the presence of excess mucus in the airways. Doubt that cough is of any consequence to patients or responsive to current therapies has reinforced this opinion. At odds with this is the emerging evidence that cough impacts adversely on patients health status and forms an important component of recently validated quality of life instruments. This article presents the arguments why the assessment and treatment of cough should have a more prominent place in the clinical management of COPD.

unknown authors

144

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

71 - 1880 of 28,905 results. 71 - 1880 of 28,905 results. Download EA-1388: Final Environmental Assessment Ground Water Compliance at the Shiprock Uranium Mill Tailings Site http://energy.gov/nepa/downloads/ea-1388-final-environmental-assessment Download Document Management & Control System (DMCS) http://energy.gov/cio/downloads/document-management-control-system-dmcs Article U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. http://energy.gov/cio/articles/u-129-rsa-envision-bugs-permit-cross-site-scripting-sql-injection-and-directory

145

Fleet Management | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Property Property » Fleet Management Fleet Management Fleet management includes commercial and agency owned motor vehicles such as cars, vans, trucks, and buses. Fleet (vehicle) management at the headquarters level includes a range of functions, such as vehicle data base management of the FAST, FMVRS, FedFMS, and UNICOR systems, annual motor vehicle utilization and budget forecast data, as well as the use and monitoring of GSA systems in their Fleet DriveThru data base. Fleet Briefings DOE Fleet Management Contact your Fleet manager for access to these systems Federal Automotive Statistical Tool (FAST): Supports EPAct of 1992 requirements , the Energy Conservation Reauthorization Act of 1998 (PL105-388), Executive Order 13149 Greening the Government Through Federal

146

Notices Accessible Format: Individuals with  

Broader source: Energy.gov (indexed) [DOE]

472 Federal Register 472 Federal Register / Vol. 77, No. 83 / Monday, April 30, 2012 / Notices Accessible Format: Individuals with disabilities can obtain this document in an accessible format (e.g., braille, large print, audiotape, or computer diskette) on request to the program contact person listed under FOR FURTHER INFORMATION CONTACT. Electronic Access to This Document: The official version of this document is the document published in the Federal Register. Free Internet access to the official edition of the Federal Register and the Code of Federal Regulations is available via the Federal Digital System at: www.gpo.gov/fdsys. At this site you can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document

147

Florida Capital Access Program (Florida)  

Broader source: Energy.gov [DOE]

The Florida Capital Access Program, run by the Florida Department of Economic Development, is a loan portfolio insurance program enabling lenders to make loans to credit-worthy small businesses. ...

148

Categorical Exclusion for Access Road  

Broader source: Energy.gov (indexed) [DOE]

Access Road Access Road Improvements along the Pinnacle Peak- Prescott 230-kV Transmission Line between Structures 16813 and 170/1 Yavapai County. Arizona * RECORD OF CATEGORICAL EXCLUSION DETERMINATION A. Proposed Action: Western proposes to improve access roads along a portion of the Pinnacle Peak to Prescott 230-kV Transmission Line (Structures 168/3 and 170/1). which are currently impassable. to maintain worker safety and the reliability of the bulk electric system. Western plans to blade and grade the existing access road where it enters and leaves three washes so that Western's maintenance vehicles can drive across the washes. We will remove dirt from the road prism by starting at wash edges and pulling dirt up slope in order to create ramps with grades suitable for our equipment.

149

2e Carbon Access | Open Energy Information  

Open Energy Info (EERE)

Access Jump to: navigation, search Name: 2e Carbon Access Place: New York, New York Zip: 10280 Sector: Carbon Product: 2E Carbon Access is an enterprise focused solely on bringing...

150

Globus Platform-as-a-Service for Federating Identity and Access  

E-Print Network [OSTI]

#12;Our Generous Sponsors U . S . D E P A R T M E N T O F ENERGY #12;Globus Platform-as-a-Service for Federating Identity and Access Management Vas Vasiliadis #12;Current State · Identity provider (federation root) · Basic profile management (tied to Globus

Tennessee, University of

151

Science Open Access Journals - Alerts Help  

Office of Scientific and Technical Information (OSTI)

SOAJ Alerts Fast Facts SOAJ Alerts Fast Facts You can easily create an alert right from the results page. Alerts run automatically, based on the schedule you choose. New relevantly ranked results are automatically sent to you through email or an individual or shared RSS/ATOM feed. There is no limit to the number of alerts you can create. Up to 6 previous sets of alert results may be accessed, with permanent links to the sources where possible. Selected results can be emailed, printed, or downloaded into a citation manager such as EndNote, RefWorks or Bib Tex. Alerts Help Alerts will make your recurring searches even easier by automating your search and sending you the results on a regular basis. To receive alerts on your topic(s) of interest, simply create an Alerts account, specify your

152

Improving Access to Foundational Energy Performance Data  

SciTech Connect (OSTI)

Access to foundational energy performance data is key to improving the efficiency of the built environment. However, stakeholders often lack access to what they perceive as credible energy performance data. Therefore, even if a stakeholder determines that a product would increase efficiency, they often have difficulty convincing their management to move forward. Even when credible data do exist, such data are not always sufficient to support detailed energy performance analyses, or the development of robust business cases. One reason for this is that the data parameters that are provided are generally based on the respective industry norms. Thus, for mature industries with extensive testing standards, the data made available are often quite detailed. But for emerging technologies, or for industries with less well-developed testing standards, available data are generally insufficient to support robust analysis. However, even for mature technologies, there is no guarantee that the data being supplied are the same data needed to accurately evaluate a product?s energy performance. To address these challenges, the U.S. Department of Energy funded development of a free, publically accessible Web-based portal, the Technology Performance Exchange(TM), to facilitate the transparent identification, storage, and sharing of foundational energy performance data. The Technology Performance Exchange identifies the intrinsic, technology-specific parameters necessary for a user to perform a credible energy analysis and includes a robust database to store these data. End users can leverage stored data to evaluate the site-specific performance of various technologies, support financial analyses with greater confidence, and make better informed procurement decisions.

Studer, D.; Livingood, W.; Torcellini, P.

2014-08-01T23:59:59.000Z

153

OpenEI:Utility data access questionnaire | Open Energy Information  

Open Energy Info (EERE)

data access questionnaire data access questionnaire Jump to: navigation, search Ret Jump to Navigation Utility Access Questionnaire We are not currently accepting submissions. Thank you for your interest. Want to change your response? OMB Control Number: 1910-5164 Expiration Date: 9/30/2016 Public reporting burden for this collection of information is estimated to average 20 minutes per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Office of Management, Paperwork Reduction Project (1910-0400), U.S. Department of Energy, 1000 Independence Avenue, S.W.,

154

A Survey on Dynamic Spectrum Access Techniques for Cognitive Radio  

E-Print Network [OSTI]

Cognitive radio (CR) is a new paradigm that utilizes the available spectrum band. The key characteristic of CR system is to sense the electromagnetic environment to adapt their operation and dynamically vary its radio operating parameters. The technique of dynamically accessing the unused spectrum band is known as Dynamic Spectrum Access (DSA). The dynamic spectrum access technology helps to minimize unused spectrum bands. In this paper, main functions of Cognitive Radio (CR) i.e. spectrum sensing, spectrum management, spectrum mobility and spectrum sharing are discussed. Then DSA models are discussed along with different methods of DSA such as Command and Control, Exclusive-Use, Shared Use of Primary Licensed User and Commons method. Game-theoretic approach using Bertrand game model, Markovian Queuing Model for spectrum allocation in centralized architecture and Fuzzy logic based method are also discussed and result are shown.

Garhwal, Anita

2012-01-01T23:59:59.000Z

155

SPS access control system a new user interface  

E-Print Network [OSTI]

This document describes the project to implement at CERN new trends in industrial control systems and integrate new requirements and functions requested by users. This project will be the testing ground for the specification of procedures in the Access Control and Machine Interlock of LHC. The last modification in the Access Control System to the primary beam areas was made in 1995, and this new project is to improve the fields of personal security, access security and the introduction of modern communication networks used in the industrial control systems. Inside the cycle model of project life, it is at the present time in the test phase in terms of security and exploitation inside the Accelerator Decelerator (AD) project. The presence of Authorization Management System (AMS) to guarantee the automatic information distribution of authorizations to controlled areas is in line with this project.

Riesco, T

1999-01-01T23:59:59.000Z

156

International Electricity Trade - Open Access | Department of...  

Broader source: Energy.gov (indexed) [DOE]

International Electricity Trade - Open Access International Electricity Trade - Open Access DOE has consistently expressed its policy that international electricity trade should be...

157

Chapter_12_Special_Access_Programs  

Office of Environmental Management (EM)

2 Special Access Programs This chapter describes the DOE Special Access Program (SAP) at DOE HQ and implements the requirements of: * Executive Order 13526, Classified National...

158

NBP RFI: Data Access | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access More Documents & Publications...

159

Remote Access to Brookhaven, Information Services Division (ISD),  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ISD Homepage ISD Homepage Site Details ISD Staff Remote Access Other Information BNL Site Index Can't View PDFs? Remote Access to Brookhaven External BNL users who need internet access to the internal ISD website which includes the Research Library, Records Management, Publications and Technical Editing must have a Virtual Private Network (VPN) account to connect to the BNL Internal Campus Network. This account can be setup by the Accounts Management Office. Available Options Remote Access Policy Broad-Band Connection: must use VPN with a CryptoCard Token Anti-Virus Procedures All Windows PCs should be running one of Brookhaven's official anti-virus software packages when connecting remotely to the BNL Internal Campus Network. Anti-Virus procedures are an important component of BNL's host-based security architecture. Anti-Virus software is the component of this architecture that provides a protection mechanism against malicious code. Malicious codes are programs, such as Trojan horses or viruses, that run on a host system without the authorization of the system user. These codes typically come from e-mail attachments, or can be downloaded along with programs from the Internet, or through an infected floppy disk. Properly installed anti-virus software can minimize these vulnerabilities.

160

ETTP Security Access Control System (ESACS) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Tri-party agreement databases, access mechanism and procedures. Revision 2  

SciTech Connect (OSTI)

This document contains the information required for the Washington State Department of Ecology (Ecology) and the U.S. Environmental Protection Agency (EPA) to access databases related to the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement). It identifies the procedure required to obtain access to the Hanford Site computer networks and the Tri-Party Agreement related databases. It addresses security requirements, access methods, database availability dates, database access procedures, and the minimum computer hardware and software configurations required to operate within the Hanford Site networks. This document supersedes any previous agreements including the Administrative Agreement to Provide Computer Access to U.S. Environmental Protection Agency (EPA) and the Administrative Agreement to Provide Computer Access to Washington State Department of Ecology (Ecology), agreements that were signed by the U.S. Department of Energy (DOE), Richland Operations Office (RL) in June 1990, Access approval to EPA and Ecology is extended by RL to include all Tri-Party Agreement relevant databases named in this document via the documented access method and date. Access to databases and systems not listed in this document will be granted as determined necessary and negotiated among Ecology, EPA, and RL through the Tri-Party Agreement Project Managers. The Tri-Party Agreement Project Managers are the primary points of contact for all activities to be carried out under the Tri-Party Agreement. Action Plan. Access to the Tri-Party Agreement related databases and systems does not provide or imply any ownership on behalf of Ecology or EPA whether public or private of either the database or the system. Access to identified systems and databases does not include access to network/system administrative control information, network maps, etc.

Brulotte, P.J.

1996-01-01T23:59:59.000Z

162

Bibliography on transmission access issues  

SciTech Connect (OSTI)

This paper presents a bibliography on issues related to transmission access in electric power systems. There are 233 citations referenced in this bibliography. This bibliography presents a collection of selected literature on issues related to transmission access. It does not contain all of the material available on this subject or the categories contained herein. Some readers may feel that citations within this bibliography should be strictly limited to transmission system issues and not include energy pricing or reliability issues. However, it was the decision of the Subcommittee of the IEEE Task Force on Transmission Access and Nonutility Generation that selected entries relating to reliability and energy pricing, most relevant to transmission access, should be included. This decision was made because certain issues relating to reliability, transmission and energy pricing are perceived by the industry to be critical in the discussion of transmission access. The bibliography has been divided into the following sections or sub-sections: 2.0 Operational (Engineering) Issues, 3.0 Planning, 4.0 Reliability, 5.1 Economics: Costing, 5.2(a) Economics: Location-Differentiated Pricing, 5.2(b) Economics: Time-Differentiated Pricing, 5.3 Economics: Brokering, Bidding, and Auctioning, 6.0 Regulatory, and 7.0 General. Although the content of many publications spanned two or more of these sections, the desire to limit document length required that all publications be placed in the single most appropriate section. Publications are sorted according to author or publication resource.

Lankford, C.B. [Oklahoma Gas and Electric Co., Oklahoma City, OK (United States)] [Oklahoma Gas and Electric Co., Oklahoma City, OK (United States); McCalley, J.D. [Iowa State Univ., Ames, IA (United States)] [Iowa State Univ., Ames, IA (United States); Saini, N.K. [Entergy Services Corp., Metairie, LA (United States)] [Entergy Services Corp., Metairie, LA (United States)

1996-02-01T23:59:59.000Z

163

Cough REVIEW Open Access Cough management: a practical approach  

E-Print Network [OSTI]

Cough is one of the most common symptoms for which patients seek medical attention from primary care physicians and pulmonologists. Cough is an important defensive reflex that enhances the clearance of secretions and particles from the airways and protects the lower airways from the aspiration of foreign materials. Therapeutic suppression of cough may be either disease-specific or symptom related. The potential benefits of an early treatment of cough could include the prevention of the vicious cycle of cough. There has been a long tradition in acute cough, which is frequently due to upper respiratory tract infections, to use symptom-related anti-tussives. Suppression of cough (during chronic cough) may be achieved by disease-specific therapies, but in many patients it is often necessary to use symptomatic anti-tussives, too. According to the current guidelines of the American College of Chest Physician on Cough Suppressants and Pharmacologic Protussive Therapy and additional clinical trials on the most frequent anti-tussive drugs, it should be possible to diagnose and treat cough successfully in a majority of cases. Among drugs used for the symptomatic treatment of cough, peripherally acting anti-tussives such as levodropropizine and moguisteine show the highest level of benefit and should be recommended especially in children. By improving our understanding of the specific effects of these anti-tussive agents, the therapeutic use of these drugs may be refined. The present review provides a summary of the most clinically relevant anti-tussive drugs in addition to their potential mechanism of action.

Francesco De Blasio; Johann C Virchow; Mario Polverino; Ro Zanasi; Panagiotis K Behrakis; Gunsely Kilin; Rossella Balsamo; Gianluca De Danieli; Luigi Lanata

164

A Mobile Access Gateway for Managing Intermittent Connectivity  

E-Print Network [OSTI]

air- ports, train stations, gas stations, and service areas are covered, i.e., places serving interaction, e.g., to (re)configure the WLAN 1Examples include Agip gas stations and MAXI service areas in Germany, Neste A24 gas stations in Estonia, Statoil in Norway, and Texaco service stations in the UK

Ott, Jörg

165

Access Control and Key Management for Mobile Volker Roth 1  

E-Print Network [OSTI]

Fraunhofer Institute for Computer Graphics, Rundeturmstr. 6, 64283 Darmstadt, Germany Abstract Security, computer code known as agents represent the next great wave of innovation and development across

Roth, Volker

166

Key Management with Policy-based Access Control Christian Cachin  

E-Print Network [OSTI]

at IBM Research - Zurich in collaboration with ETH Zurich. 1 #12; of the authorization mechanism and its integration with KMIP. IBM Research - Zurich, CH-8803 R¨uschlikon, Switzerland. {cca,gka}@zurich.ibm.com Adnovum Informatik AG, CH-8005 Zurich. divay.bansal@adnovum.ch. Work done

Cachin, Christian

167

Using Sleepers to Manage Batch Access to HPSS at NERSC  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

attempting to use HPSS to wait. Usually this causes no problems for these jobs which resume safely when sleepers are removed. However, users may wish to test for HPSS system...

168

Asset Management System (AMS) for Property Custodians Quick Reference Guide Page 1 of 31  

E-Print Network [OSTI]

Asset Management System (AMS) for Property Custodians ­ Quick Reference Guide Page 1 of 31 Accessing the Asset Management System (AMS) 1) Sign into MyLSU #12;Asset Management System (AMS Management" 3) When you see the SSO Welcome screen (above), click "OK". #12;Asset Management System (AMS

Stephens, Jacqueline

169

Mahima Neupane Access to land resources  

E-Print Network [OSTI]

information followed the sustainable livelihood #12;Mahima Neupane Access to land resources framework (SLF

Richner, Heinz

170

Abstract--This paper presents the Axel robotic rover which has been designed to provide robust and flexible access to  

E-Print Network [OSTI]

access steep slopes and negotiate relatively large obstacles due to its actively managed tether and novel of the Exploration Systems Mission Directorate and Solar Systems Exploration program: Dr. C. Moore, Dr. S. Khanna, Dr and volume, the energy

171

Shared access to quantum information  

Science Journals Connector (OSTI)

It is shown that quantum mechanics allows a qubit to be transferred so that it can be accessed symmetrically by two observers. These can then decide later which one is to take possession of the quantum information. The process is not fully successful, but a failed experiment may allow the retention of the quantum information for use in a subsequent operation.

Stig Stenholm and Erika Andersson

2000-09-11T23:59:59.000Z

172

Access to DOE Database of Oil and Natural Gas Research Results Expanded |  

Broader source: Energy.gov (indexed) [DOE]

Access to DOE Database of Oil and Natural Gas Research Results Access to DOE Database of Oil and Natural Gas Research Results Expanded Access to DOE Database of Oil and Natural Gas Research Results Expanded January 12, 2011 - 12:00pm Addthis Washington, DC - The results of nearly four decades of research supported by the U.S. Department of Energy (DOE) are now available through the OnePetro online document repository. TheOnePetro website now contains NETL's Oil & Gas Knowledge Management Database. DOE's Knowledge Management Database (KMD) provides access to content from dozens of CDs and DVDs related to oil and natural gas research that the Office of Fossil Energy's (FE) National Energy Technology Laboratory (NETL) has published over the years. It also provides links to reports, data sets, and project summaries from ongoing research supported

173

Transportation Demand Management (TDM) Encyclopedia | Open Energy  

Open Energy Info (EERE)

Transportation Demand Management (TDM) Encyclopedia Transportation Demand Management (TDM) Encyclopedia Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Transportation Demand Management (TDM) Encyclopedia Agency/Company /Organization: Victoria Transport Policy Institute Sector: Energy Focus Area: Transportation Topics: Implementation Resource Type: Guide/manual Website: www.vtpi.org/tdm/tdm12.htm Cost: Free Language: English References: Victoria Transport Policy Institute[1] "The Online TDM Encyclopedia is the world's most comprehensive information resource concerning innovative transportation management strategies. It describes dozens of Transportation Demand Management (TDM) strategies and contains information on TDM planning, evaluation and implementation. It has thousands of hyperlinks that provide instant access

174

Program Managers  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Managers Program Managers Enabling remarkable discoveries and tools that transform our understanding of energy and matter and advance national, economic, and energy...

175

SunShot Initiative: Access to Capital  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Access to Capital to someone by Access to Capital to someone by E-mail Share SunShot Initiative: Access to Capital on Facebook Tweet about SunShot Initiative: Access to Capital on Twitter Bookmark SunShot Initiative: Access to Capital on Google Bookmark SunShot Initiative: Access to Capital on Delicious Rank SunShot Initiative: Access to Capital on Digg Find More places to share SunShot Initiative: Access to Capital on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Balance of Systems Reducing Non-Hardware Costs Lowering Barriers Fostering Growth Access to Capital Photo of a room full of people seated in rows with a few standing in the background. Two hands in the crowd are holding up sheets of paper with 'Like'. Participants at the SunShot Summit breakout session "Big and Small Ideas:

176

V-194: Citrix XenServer Memory Management Error Lets Local Administrat...  

Broader source: Energy.gov (indexed) [DOE]

4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local...

177

Open-access databases as unprecedented resources and drivers of cultural change in fisheries science  

SciTech Connect (OSTI)

Open-access databases with utility in fisheries science have grown exponentially in quantity and scope over the past decade, with profound impacts to our discipline. The management, distillation, and sharing of an exponentially growing stream of open-access data represents several fundamental challenges in fisheries science. Many of the currently available open-access resources may not be universally known among fisheries scientists. We therefore introduce many national- and global-scale open-access databases with applications in fisheries science and provide an example of how they can be harnessed to perform valuable analyses without additional field efforts. We also discuss how the development, maintenance, and utilization of open-access data are likely to pose technical, financial, and educational challenges to fisheries scientists. Such cultural implications that will coincide with the rapidly increasing availability of free data should compel the American Fisheries Society to actively address these problems now to help ease the forthcoming cultural transition.

McManamay, Ryan A [ORNL; Utz, Ryan [National Ecological Observatory Network

2014-01-01T23:59:59.000Z

178

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

179

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

180

Subject Access to Your Information  

E-Print Network [OSTI]

Subject Access to Your Information Sandy Tucker Texas A&M University Libraries August 1, 2006 Second International Symposium on Transportation Technology Transfer Introduction You have packages ? books, pamphlets, files, electronic documents. You... have records of packages ? cards or an online database. Other? We?re talking about adding subject information to the records of packages. Specifically, we?ll talk about using a ?controlled vocabulary.? Controlled Vocabulary Using a fixed list...

Tucker, Sandra

2006-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Conference Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

1999-11-03T23:59:59.000Z

182

DOE Public Access Plan | Department of Energy  

Office of Environmental Management (EM)

DOE Public Access Plan DOE Public Access Plan On February 22, 2013, the Director of the White House Office of Science and Technology Policy (OSTP), Dr. John Holdren, issued a...

183

Metropolitan Accessibility and Transportation Sustainability:Sustainability  

E-Print Network [OSTI]

Metropolitan Accessibility and Transportation Sustainability:Sustainability: Comparative Reduce (fulfillment of)Promote Sustainability: Meet needs of (fulfillment of) needs present Institute SMART Sustainable Mobility and Accessibility Research andSMART Sustainable Mobility

Papalambros, Panos

184

Timing Attacks on software implementation of RSA  

E-Print Network [OSTI]

the amount of time required to perform private key operations (Decryptions etc.). Timing attacks are related to a class of attacks called side-channel attacks. Others include power analysis and attacks based decryption times are masked by many concurrent processes running on the system. It is also believed

185

College of Legacy Management | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Legacy Management Legacy Management College of Legacy Management College of Legacy Management Vision The College of Legacy Management (CLM) provides DOE program offices with access to the types of training that enables LM to execute its mission of protecting human health and the environment. CLM strives to: Encourage a high-quality workforce Ensure employees get the right skills, at the right time Empower employees to take charge of their own careers through accessible training Retain a best-in-class workforce by providing learning opportunities Maintain and share mission-critical knowledge Increase performance through the development of strong leaders Remain one of the best places to work in the Federal Government by investing in education CLM is a gateway to professional development opportunities including

186

Microsoft Word - CX-Ross-Lexington_access_road_WEB.doc  

Broader source: Energy.gov (indexed) [DOE]

Darin Bowman Darin Bowman Project Manager - TELF-TPP-3 Proposed Action: Access road repair including reconstructing, grading, and shaping of roads, placing and compacting of rock surfacing, installation of gates, installation and maintenance of erosion control and water drainage features, and restoration of disturbed areas. Budget Information: Work Order # 00259661 PP&A Project No.: 1738 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine maintenance activities...for...rights-of-way, infrastructures (e.g.. roads)...routine maintenance activities, corrective...are required to maintain and preserve infrastructures...in a condition suitable for the facility to be used for its designated purpose. Location: The project area is a Bonneville Power Administration (BPA) access road located on

187

Forests for People Access, recreation & tourism  

E-Print Network [OSTI]

Strategy Forests for People Access, recreation & tourism on the national forest estate #12;#12;Access, recreation and tourism on the national forest estate | 3 Forests for People Access, recreation suite of outdoor recreation infrastructure. The national forest estate is a place for all types

188

Revised Spring 2008 NIH Public Access Policy  

E-Print Network [OSTI]

Revised Spring 2008 NIH Public Access Policy Notice Number: NOT-OD-08-033 - (See Notice NOT-OD-08-161 (Consolidated Appropriations Act, 2008), the NIH voluntary Public Access Policy (NOT-OD-05-022) is now mandatory shall implement the public access policy in a manner consistent with copyright law. Specifics 1. The NIH

189

Human Resources Security Access Matrix Function Training  

E-Print Network [OSTI]

June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

Wu, Shin-Tson

190

Supporting accessibility in higher education information systems  

Science Journals Connector (OSTI)

Higher education institutions (HEI) and students are highly dependent of information systems, implemented as web applications. Students must be able to access this applications, thought accessible web interfaces, in order to perform their academic activities. ... Keywords: DSpace, W3C, accessibility, higher education institutions, moodle

Arsnio Reis; Joo Barroso; Ramiro Gonalves

2013-07-01T23:59:59.000Z

191

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS  

E-Print Network [OSTI]

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS is around 340m/s. #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS Homework Problem 2: Calculate

Kieu, Khanh

192

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS  

E-Print Network [OSTI]

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS multiplexing · Network topology #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS Communication Source

Kieu, Khanh

193

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS  

E-Print Network [OSTI]

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS Significant progress #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS What else can we multiplex

Kieu, Khanh

194

GEOSCIENCE INFORMATION: MAKING THE EARTH SCIENCES ACCESSIBLE FOR EVERYONE - Proceedings of the 42nd Meeting of the Geoscience Information Society  

E-Print Network [OSTI]

................................................................................................................ 5 DIGITIZATION OF GEOLOGY THESES AND DISSERTATIONS Deborah McCarthy and Tamsen Hert ........................................................................................................ 9 MANAGING AN OIL SHALE LEGACY COLLECTION Heather L... streamlined the process and improved access to this important collection. 13 MANAGING AN OIL SHALE LEGACY COLLECTION Heather L. Whitehead Arthur Lakes Library Colorado School of Mines Golden, CO 80401 hwhitehe@mines.edu Abstract...

GeoScience Information Society

2007-01-01T23:59:59.000Z

195

CULTURAL RESOURCES MANAGEMENT PLAN FOR THE NEVADA TEST SITE  

National Nuclear Security Administration (NNSA)

by the U.S. Department of Defense, U.S. Bureau of Land Management (BLM), and the U.S. Fish and Wildlife Service. Routine access to the facility is from U.S. Highway 95....

196

SIS - TMS: A Thesaurus Management System for Distributed Digital Collections  

Science Journals Connector (OSTI)

The availability of central reference information as thesauri is critical for correct intellectual access to ... There is a continuous raise in interest in thesauri, and several thesaurus management systems have ...

Martin Doerr; Irini Fundulaki

1998-01-01T23:59:59.000Z

197

Managing Threats to Web Databases and Cyber Systems  

Science Journals Connector (OSTI)

This chapter provides an overview of some of the cyber threats information systems as well as data management ... then discusses potential solutions and challenges. The threats include access control violations, ...

Bhavani Thuraisingham

2005-01-01T23:59:59.000Z

198

BPA's Vegetation Management Program - Fact Sheet - May 2006  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and encroachments that could hinder BPA's ability to access and maintain its lines. BPA manages the vegetation on and near its rights-of-way to keep people safe and the system...

199

Solar Access to Public Capital | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Solar Access to Public Capital Solar Access to Public Capital The Solar Access to Public Capital (SAPC) working group has developed standard residential lease and commercial power...

200

Solar access of residential rooftops in four California cities  

E-Print Network [OSTI]

rooftops in four California cities Solar access ofcomputed. Solar access violation California Public ResourcesSolar access of residential rooftops in four California

Levinson, Ronnen

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Accessible Energy in Quantum Systems  

Science Journals Connector (OSTI)

A quantum system in a mixed state can transfer only part of its energy to a quantum system in a pure state if we require that the final state of the second system is once again pure. We calculate this accessible energy by constructing the optimum unitary operator that connects the initial state of the combined system with its final state. We show that for large systems such as commonly considered in thermodynamics a simple entropy argument suffices but that this method of calculation may yield results that are too large for simpler systems owing to the constraint that the time development operator must be unitary.

Adriaan Walther

1971-01-01T23:59:59.000Z

202

Securely Managing Cryptographic Keys used within a Cloud Environment  

E-Print Network [OSTI]

to rapidly develop/host cloud applications Infrastructure as a Service (Iaas) - Networked access to processing power, storage Cloud Deployment Models Public Cloud Private Cloud Community Cloud Hybrid administers the Cloud Infrastructure? Who has access to my data? My activity history? Key Management Where

203

Utility Data Accessibility Map | Open Energy Information  

Open Energy Info (EERE)

Utility Data Accessibility Map Utility Data Accessibility Map Jump to: navigation, search Residential Commercial Benchmarking Energy Efficiency Delivery of Data Time Period Frequency of Data Access to Data Residential frequency of data access Ua Utility Data Access Map Having access to your electricity use data is a very important step in understanding your overall energy usage. Comparing historical data to your current usage is one way to see trends and determine ways for reducing electricity costs and improving overall efficiency. We asked all U.S. electric utility companies to tell us how accessible their electricity use data is for both residential and commercial customers. The results are updated live based on the responses we have to date. As more utilities provide information, the utility boundaries will be automatically colored

204

Chapter_12_Special_Access_Programs  

Broader source: Energy.gov (indexed) [DOE]

2 2 Special Access Programs This chapter describes the DOE Special Access Program (SAP) at DOE HQ and implements the requirements of: * Executive Order 13526, Classified National Security Information, Section 4.3, Special Access Programs, and Section 5.4, General Responsibilities, subparagraph (d). * DOE Order 471.5, Special Access Programs. A SAP is a program established for a specific class of classified information that imposes safeguarding and access requirements exceeding those normally required for information at the same classification level. Terms and activities such as Limited Access, Controlled Access, and Limited Distribution programs are not authorized. HQ Implementation Procedures SAP administration for both DOE and NNSA is handled through the Executive

205

Access Fund Partners LP | Open Energy Information  

Open Energy Info (EERE)

Access Fund Partners LP Access Fund Partners LP Jump to: navigation, search Name Access Fund Partners, LP Place San Juan Capistrano, California Zip 92675 Product Boutique investment banking and investment advisory firm with clean energy focus References Access Fund Partners, LP[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Access Fund Partners, LP is a company located in San Juan Capistrano, California . References ↑ "Access Fund Partners, LP" Retrieved from "http://en.openei.org/w/index.php?title=Access_Fund_Partners_LP&oldid=341703" Categories: Clean Energy Organizations Companies Organizations Stubs What links here Related changes Special pages Printable version

206

Training  Access Training  CHRIS Training Workflow  

Broader source: Energy.gov (indexed) [DOE]

Using ESS to register for PMCDP training Using ESS to register for PMCDP training Find the course CHRIS Code/Session # on the PMCDP Training Schedule located on PMCDP's website http://energy.gov/management/downloads/pmcdp-course-schedule Login into ESS using mis.doe.gov/ESS From the tabs at the top of the screen, select Training  Access Training  CHRIS Training Workflow  Select ...Connect to CHRIS... tab 2 On the CHRIS page, from the Menu (left column) select the following path CHRIS Workflow  Training  Training Requests  Create/Modify Training Request From the Training Request tab screen Select Create Request in upper right corner 

207

5 - Types of Access Controlled Portals  

Science Journals Connector (OSTI)

Publisher Summary This chapter introduces information about types of Access Control System Portals. A portal is the way through which a person must pass and an Access Control System Portal is a portal controlled by access control system devices. When an access control portal is confronted, one knows that he is moving from one access area into another. Depending on the security configuration of the portal, access authorization may be required to enter, to leave, or to enter and leave through the portal. In most cases, access can be granted to a single individual, but for some higher security zones, access may require the presence of two or more authorized persons. Access portals can be configured to work on a schedule so that access is free during some hours and requires authorization during others, or may be limited to certain individuals during certain hours. Pedestrian portals include standard doors, automatic doors, revolving doors, turnstiles, Man-Traps, and automated walls. Vehicle portals may include standard barrier gates, high-security barrier gates, and sally ports. An Access Portal is a passageway through which a person must pass to go from one access zone to another. When an access control portal is confronted, you know you are moving from one access area into another. Depending on the security configuration of the portal, access authorization may be required to enter, to leave, or to enter and leave through the portal. In most cases, access can be granted to a single individual, but for some higher security zones, access may require the presence of two or more authorized people. Access portals can be configured to work on a schedule so that access is free during some hours and requires authorization during others or may be limited to certain individuals during certain hours. Pedestrian portals include common doors, automatic doors, revolving doors, turnstiles, man-traps, and automated walls. Vehicle portals may include standard barrier gates, high-security barrier gates, and sally ports. Author Information: Thomas L. Norman, CPP, PSP, CSC, Executive Vice President, Protection Partners International

Thomas Norman

2012-01-01T23:59:59.000Z

208

Vibrations of raised access floors  

Science Journals Connector (OSTI)

Raised access floors play a critical role in modern cleanroom design. They have unique mechanical properties that make them respond to dynamic loading in a manner quite different from conventional floors. For example an unbraced floor is much more flexible horizontally than in the vertical direction. Horizontal vibration amplitudes with walker excitation may exceed 100??m/s in an unbraced floor exceeding the sensitivity of 1000 inspection microscopes by as much as an order of magnitude. Issues such as these become important when moderately vibration?sensitive instruments such as optical microscopes are supported on access floors typically the case in cleanrooms. This paper presents results of experimental studies involving a 3?m3?m segment of floor and a large floor installed in a cleanroom both of which were subjected to dynamic loads using a shaker. Both drive?point and propagation properties were examined. In addition data are presented for variations in bracing and bolting using the 3?m3?m segment.

2002-01-01T23:59:59.000Z

209

Solar access: it's the law  

SciTech Connect (OSTI)

The contents of the California Solar Rights Act and the California Solar Shade Control Act which may have an impact on the way in which development, particularly housing, is designed and constructed in California, are reviewed. The Solar Rights Act establishes the state government of California as supporting and encouraging solar energy implementation at the local level. The law sets parameters for establishing solar easements, amends the Solar Tax Credit to include costs of easements, prohibits ordinances and private covenants which restrict solar systems, and requires communities to consider passive solar and natural heating and cooling opportunities in new construction. The Solar Rights Act is binding on all charter cities, and is thus applicable to all California cities and counties. The Solar Shade Control Act prohibits the blockage of solar radiation by vegetation to solar collectors which meet certain specific qualifications. Owners of property with unlawful vegetation are subject to criminal charges and fines of up to $500 per day of continued infraction. However, cities and counties may elect to exempt themselves from provisions of the Solar Shade Control Act. This manuscript explains solar access concepts, interprets the legal language of the laws for lay readers, and offers specific planning and design guidelines for use by developers, planners, and government officials in reviewing or developing plans to ensure solar access to structures. Twenty-four illustrations, a glossary, and several practical appendices are offered to assist the reader in understanding and complying with the laws.

Thayer, R.L. Jr.

1981-01-01T23:59:59.000Z

210

Management Responsibilities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Management Responsibilities Management Responsibilities Depleted UF6 Management Responsibilities DOE has responsibility for safe and efficient management of approximately 700,000 metric tons of depleted UF6. Organizational Responsibilities In the United States, the U.S. Department of Energy is responsible for managing all the depleted uranium that has been generated by the government and has been declared surplus to national defense needs. In addition, as a result of two memoranda of agreement that have been signed between the DOE and USEC, the DOE has assumed management responsibility for approximately 145,000 metric tons of depleted UF6 that has been or will be generated by USEC. Any additional depleted UF6 that USEC generates will be USEC's responsibility to manage. DOE Management Responsibility

211

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Broader source: Energy.gov (indexed) [DOE]

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

212

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Broader source: Energy.gov (indexed) [DOE]

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

213

Federal Energy Management Program: Energy Management Guidance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Management Energy Management Guidance to someone by E-mail Share Federal Energy Management Program: Energy Management Guidance on Facebook Tweet about Federal Energy Management Program: Energy Management Guidance on Twitter Bookmark Federal Energy Management Program: Energy Management Guidance on Google Bookmark Federal Energy Management Program: Energy Management Guidance on Delicious Rank Federal Energy Management Program: Energy Management Guidance on Digg Find More places to share Federal Energy Management Program: Energy Management Guidance on AddThis.com... Requirements by Subject Requirements by Regulation Notices & Rules Guidance Facility Reporting Fleet Reporting Energy Management Guidance The Federal Energy Management Program (FEMP) provides guidance on Federal

214

Environmental Management Waste Management Facility (EMWMF) at...  

Office of Environmental Management (EM)

Environmental Management Waste Management Facility (EMWMF) at Oak Ridge Environmental Management Waste Management Facility (EMWMF) at Oak Ridge Full Document and Summary Versions...

215

SRS Seals Access to P and R Reactors, Marking End to Nearly 60-Years of  

Broader source: Energy.gov (indexed) [DOE]

Seals Access to P and R Reactors, Marking End to Nearly Seals Access to P and R Reactors, Marking End to Nearly 60-Years of History: American Recovery and Reinvestment Act Project Progress SRS Seals Access to P and R Reactors, Marking End to Nearly 60-Years of History: American Recovery and Reinvestment Act Project Progress June 28, 2011 - 12:00pm Addthis Marc Sharpe, who was a senior reactor operator at P Reactor in the mid-1980s, (left) and Dr. David Moody, U.S. Department of Energy-Savannah River Operation Office Manager, were the last people to leave P Reactor, just before the opening is welded shut. Marc Sharpe, who was a senior reactor operator at P Reactor in the mid-1980s, (left) and Dr. David Moody, U.S. Department of Energy-Savannah River Operation Office Manager, were the last people to leave P Reactor,

216

PROCEDURES FOR ACCESS TO AND CORRECTION OF INFORMATION Procedural Authority: University Secretary Effective Date: January, 2010  

E-Print Network [OSTI]

PROCEDURES FOR ACCESS TO AND CORRECTION OF INFORMATION Procedural Authority: University Secretary Effective Date: January, 2010 Procedural Officer: University Archivist Supersedes: New Last Editorial Change of these procedures is to set out how the university will manage: · freedom of information requests; · requests

Victoria, University of

217

Joint Distributed Access Point Selection and Power Allocation in Cognitive Radio Networks  

E-Print Network [OSTI]

of the cognitive radio network (CRN). Most of the current works dealing with spectrum management in the CRN focus) spectrum mobility, rules that require the CUs to leave the channel if licensed users are detected. Many1 Joint Distributed Access Point Selection and Power Allocation in Cognitive Radio Networks Mingyi

Garcia, Alfredo

218

A PolicyBased Access Control Mechanism for the Corporate Web  

E-Print Network [OSTI]

and Internet technologies have been used by companies or government agencies on private networks, or Intranets 08903 minsky@cs.rutgers.edu Abstract Current Web technologies use access control lists (ACLs causes management and security problems which have pre­ vented so far Intranets to achieve their full

Minsky, Naftaly

219

EA-1980: Spar Canyon-Round Valley Access Road System Improvements, Custer County, Idaho  

Broader source: Energy.gov [DOE]

Bonneville Power Administration is preparing an EA to assess potential environmental impacts of proposed improvements to the access road system for its existing Spar Canyon-Round Valley Transmission Line located on Bureau of Land Management land in Custer County, Idaho.

220

Office of Security and Emergency Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Security and Emergency Management Office of Security and Emergency Management The Security and Emergency Management page is designed to give newcomers and veterans alike an introduction and refresher about our activities. We hope you will find it useful. Much of this page's contents are oriented to reindustrialization and other managers of new DOE projects and programs. Feel free to contact the designated key personnel for assistance. Access Authorization Branch Using established guidelines and the "whole person concept," we evaluate and adjudicate informaton about those who need clearances which is developed during background investigations. The objective is to render access determinations that are in the best interest of national security. We also provide security education and awareness information, personnel security program support, and visitor control and foreign travel support to the Oak Ridge Office, the Paducah-Portsmouth Project Office, and the Thomas Jefferson National Accerelator Facility.

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

SLAC All Access: Laser Labs  

SciTech Connect (OSTI)

From supermarket checkouts to video game consoles, lasers are ubiquitous in our lives. Here at SLAC, high-power lasers are critical to the cutting-edge research conducted at the laboratory. But, despite what you might imagine, SLAC's research lasers bear little resemblance to the blasters and phasers of science fiction. In this edition of All Access we put on our safety goggles for a peek at what goes on inside some of SLAC's many laser labs. LCLS staff scientist Mike Minitti and SLAC laser safety officer Mike Woods detail how these lasers are used to study the behavior of subatomic particles, broaden our understanding of cosmic rays and even unlock the mysteries of photosynthesis.

Minitti, Mike; Woods Mike

2013-03-01T23:59:59.000Z

222

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

223

Pact to Ensure Uninterrupted Research Access | OSTI, US Dept of Energy,  

Office of Scientific and Technical Information (OSTI)

Pact to Ensure Uninterrupted Research Access Pact to Ensure Uninterrupted Research Access NEWS MEDIA CONTACT: Cathey Daniels, (865) 576-9539 FOR IMMEDIATE RELEASE June 28, 2007 Pact to Ensure Uninterrupted Research Access Oak Ridge, TN -One sure thing about the World Wide Web: Like the weather, it will change. Given this dynamic nature of the Web and the importance of preservation of scientific information in a digital environment, the U.S. Department of Energy (DOE) Office of Scientific and Technical Information (OSTI) recently partnered with Internet Archive to ensure uninterrupted access to more than 1 million online research papers from the E-print Network. This was achieved through the Internet Archive's Web archiving service, Archive-It, a Web-based application that enables partners to harvest, manage, search, and preserve collections of archived Web pages and

224

GRR/Section 3 - Land Access Process Overview | Open Energy Information  

Open Energy Info (EERE)

GRR/Section 3 - Land Access Process Overview GRR/Section 3 - Land Access Process Overview < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 3 - Land Access Process Overview 03LandAccessOverview (4).pdf Click to View Fullscreen Contact Agencies Bureau of Land Management United States Forest Service Bureau of Indian Affairs Fish and Wildlife Service Bureau of Reclamation United States Department of Energy United States Department of Defense Regulations & Policies National Environmental Policy Act (NEPA) Energy Policy Act of 2005 (EPAct) Energy Policy Act, Section 1835 - Split Estate Geothermal Steam Act of 1970 Federal Geothermal Leasing - 2007 Rules (43 CFR Part 3200) 43 C.F.R. 3203 Competitive Leasing 43 C.F.R. 3104 Performance Bond

225

INVESTMENT MANAGEMENT OFFICE MANAGEMENT OFFICE  

E-Print Network [OSTI]

INVESTMENT MANAGEMENT OFFICE INVESTMENT MANAGEMENT OFFICE THE UNIVERSITY OF UTAH University of Utah | Investment Management Office Quarterly Summary The Endowment Pool had a positive first quarter (ending March gain from investments of $7.8 million. The Endowment Pool unit value of $100 has grown to $175 in 10

226

SLAC Lightsource User Access Guidelines and Agreement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lightsource User Access Guidelines & Agreement Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC Lightsource User Access Guidelines and Agreement LCLS / SSRL User Research Administration approval (signature/date): LCLS Safety Office approval (signature/date): SSRL Safety Office approval (signature/date): XFO Operations approval (signature/date): Revision Record Revision Date Revised Section(s) Affected Description of Change R001 October 4 th , 2010 User Form Updated SLAC Lightsource User Access Agreement Form R000 Sept 14, 2009 Original Release SLAC Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC LIGHTSOURCE USER ACCESS GUIDELINES & AGREEMENT Introduction Welcome to SSRL and LCLS, SLAC's lightsource user facilities. We hope that your stay here will be

227

Content adaptivity in wireless web access  

Science Journals Connector (OSTI)

While the demand for wireless access to web-based systems increases, it becomes apparent that the design of most systems does not support the use of small screen end-devices such as PDAs or mobile phones. However, enabling wireless access should ... Keywords: adaptivity, cohesion preorder, conceptual modelling, content adaptation, internet, media types, mobile clients, mobile communications, proximity values, web-based systems, wireless access

Klaus-Dieter Schewe; Kinshuk; Tiong Goh

2004-09-01T23:59:59.000Z

228

Colorado - Access Permit Application File Review Checklist |...  

Open Energy Info (EERE)

Checklist Jump to: navigation, search OpenEI Reference LibraryAdd to library General: Colorado - Access Permit Application File Review Checklist Author Colorado Department of...

229

Open Access Week Celebration Announcement, Handouts, Poster  

E-Print Network [OSTI]

Announcement, posters, handouts with information on events hosted by KU Libraries' Center for Digital Scholarship in celebration of International Open Access Week, Oct. 18-22, 2010....

KU Libraries

2010-10-18T23:59:59.000Z

230

Better accessibility for Paramaribo / Paramaribo beter bereikbaar:.  

E-Print Network [OSTI]

??A quantitative study for increasing the accessibility of Paramaribo, the capital of Suriname. The analysis was done with the help of a traffic demand model (more)

Flu, M.E.

2012-01-01T23:59:59.000Z

231

WTB & Spectrum Access Overview | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

WTB & Spectrum Access Overview More Documents & Publications An Introduction to Spectrum Engineering NBP RFI: Communications Requirements Reply Comments of Southern Company...

232

Investment Optimization Planning for the Access Network  

Science Journals Connector (OSTI)

Verizon is nearing completion of its plan to deploy FTTP passed 18 million Wireline premises. This paper covers Verizons investment analysis of alternative access technologies...

Finn, Joseph

233

UNIVERSITY of CONNECTICUT LIBRARIES "Mandatory Open Access  

E-Print Network [OSTI]

UNIVERSITY of CONNECTICUT LIBRARIES "Mandatory Open Access: Friend or Foe?" IMPACT ON Peer Review. Sponsored by the University of Connecticut Libraries' Scholarly Communications and Forum Teams http

Holsinger, Kent

234

UH Parking Access & Mid-Pacific Institute  

E-Print Network [OSTI]

Pacific Ocean Science & Technology Kuykendall Annex Information Technology Center Krauss Hall Holmes HallStairs Pond UH Parking Access & Mid-Pacific Institute Exit Dole Street Offices Multipurpose

235

Design for an optical random access memory  

Science Journals Connector (OSTI)

Cascadable optically nonlinear arrays of logic devices interconnected with space invariant optical components are proposed for the core memory of a digital computer. Access time to any...

Murdocca, Miles J; Sugla, Binay

1989-01-01T23:59:59.000Z

236

Supporting Dynamic Spectrum Access in Heterogeneous LTE+ Networks  

SciTech Connect (OSTI)

As early as 2014, mobile network operators spectral capac- ity is expected to be overwhelmed by the demand brought on by new devices and applications. With Long Term Evo- lution Advanced (LTE+) networks likely as the future one world 4G standard, network operators may need to deploy a Dynamic Spectrum Access (DSA) overlay in Heterogeneous Networks (HetNets) to extend coverage, increase spectrum efficiency, and increase the capacity of these networks. In this paper, we propose three new management frameworks for DSA in an LTE+ HetNet: Spectrum Accountability Client, Cell Spectrum Management, and Domain Spectrum Man- agement. For these spectrum management frameworks, we define protocol interfaces and operational signaling scenar- ios to support cooperative sensing, spectrum lease manage- ment, and alarm scenarios for rule adjustment. We also quan- tify, through integer programs, the benefits of using DSA in an LTE+ HetNet, that can opportunistically reuse vacant TV and GSM spectrum. Using integer programs, we consider a topology using Geographic Information System data from the Blacksburg, VA metro area to assess the realistic benefits of DSA in an LTE+ HetNet.

Luiz A. DaSilva; Ryan E. Irwin; Mike Benonis

2012-08-01T23:59:59.000Z

237

Federal Energy Management Program: Computerized Maintenance Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Computerized Computerized Maintenance Management Systems to someone by E-mail Share Federal Energy Management Program: Computerized Maintenance Management Systems on Facebook Tweet about Federal Energy Management Program: Computerized Maintenance Management Systems on Twitter Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Google Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Delicious Rank Federal Energy Management Program: Computerized Maintenance Management Systems on Digg Find More places to share Federal Energy Management Program: Computerized Maintenance Management Systems on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

238

LRRB Pavement Management Systems Pavement Management Systems  

E-Print Network [OSTI]

LRRB Pavement Management Systems Pavement Management Systems Presented by: Michael Marti SRF for implementing and monitoring research results (RIC) #12;LRRB Pavement Management Systems LRRB Structure LRRB Current Pavement Management System Used ICON (Goodpointe) Year of Pavement Management System

Minnesota, University of

239

SUBCONTRACT MANAGEMENT  

Broader source: Energy.gov (indexed) [DOE]

-1 -1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish, document, and maintain adequate purchasing systems. 2. To ensure contractors flow down contract requirements to subcontractors. WHY IS SUBCONTRACT MANAGEMENT IMPORTANT? In many Department prime contracts a significant portion of the obligated dollars is spent on subcontract work. Due to the absence of a direct contractual relationship with the subcontractor, the Department must rely on the prime contractor to manage subcontract work. Subcontractors perform significant work efforts at sites and are an integral part of the site's success. Prime

240

Program Manager  

Broader source: Energy.gov [DOE]

A successful candidate in this position will participate in a wide spectrum of program and project management activities involving systems engineering and integration support for Defense Programs...

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Water Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Water Management This department applies multi-disciplinary science and technology-based modeling to assess complex environmental systems. It integrates ecology, anthropology, and...

242

Position Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

1992-06-23T23:59:59.000Z

243

MANAGEMENT (MNG)  

Broader source: Energy.gov (indexed) [DOE]

and recommendations is adequately implemented. (DOE Order 414.1A, Criterion 3; 10 CFR 830, Subpart A) Approach Record Review * Review the SWS issues management systems and...

244

NGNP Risk Management Database: A Model for Managing Risk  

SciTech Connect (OSTI)

To facilitate the implementation of the Risk Management Plan, the Next Generation Nuclear Plant (NGNP) Project has developed and employed an analytical software tool called the NGNP Risk Management System (RMS). A relational database developed in Microsoft Access, the RMS provides conventional database utility including data maintenance, archiving, configuration control, and query ability. Additionally, the tools design provides a number of unique capabilities specifically designed to facilitate the development and execution of activities outlined in the Risk Management Plan. Specifically, the RMS provides the capability to establish the risk baseline, document and analyze the risk reduction plan, track the current risk reduction status, organize risks by reference configuration system, subsystem, and component (SSC) and Area, and increase the level of NGNP decision making.

John Collins

2009-09-01T23:59:59.000Z

245

UNIVERSITY OF CONNECTICUT HEALTH CENTER CORRECTIONAL MANAGED HEALTH CARE  

E-Print Network [OSTI]

UNIVERSITY OF CONNECTICUT HEALTH CENTER CORRECTIONAL MANAGED HEALTH CARE POLICY AND PROCEDURES), Correctional Managed Health Care (CMHC) Health Services staff should access their CMHC e-mail daily when on HEALTH CARE POLICY AND PROCEDURES FOR USE WITHIN THE CONNECTICUT DEPARTMENT OF CORRECTION NUMBER: C 1

Oliver, Douglas L.

246

UNIVERSITY OF CONNECICUT HEALTH CENTER CORRECTIONAL MANAGED HEALTH CARE  

E-Print Network [OSTI]

UNIVERSITY OF CONNECICUT HEALTH CENTER CORRECTIONAL MANAGED HEALTH CARE POLICY AND PROCEDURES Managed Health Care (CMHC) shall ensure that newly admitted inmates to Connecticut Department include, but is not limited to, emergency health care, sick call, access to medication, dental and mental

Oliver, Douglas L.

247

Collection Policy: Policy Analysis & Management 1.0 The Department  

E-Print Network [OSTI]

The economics of the health care system: covering issues such as Medicare, Medicaid, managed care delivery systems, the organization and financing of #12;2 personal health services; the structure of health care health networks. o Access to, and quality of, health care services: covering issues such as managed care

Angenent, Lars T.

248

LEGACY MANAGEMENT REQUIRES INFORMATION  

SciTech Connect (OSTI)

''Legacy Management Requires Information'' describes the goal(s) of the US Department of Energy's Office of Legacy Management (LM) relative to maintaining critical records and the way those goals are being addressed at Hanford. The paper discusses the current practices for document control, as well as the use of modern databases for both storing and accessing the data to support cleanup decisions. In addition to the information goals of LM, the Hanford Federal Facility Agreement and Consent Order, known as the ''Tri-Party Agreement'' (TPA) is one of the main drivers in documentation and data management. The TPA, which specifies discrete milestones for cleaning up the Hanford Site, is a legally binding agreement among the US Department of Energy (DOE), the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The TPA requires that DOE provide the lead regulatory agency with the results of analytical laboratory and non-laboratory tests/readings to help guide them in making decisions. The Agreement also calls for each signatory to preserve--for at least ten years after the Agreement has ended--all of the records in its or its contractors, possession related to sampling, analysis, investigations, and monitoring conducted. The tools used at Hanford to meet TPA requirements are also the tools that can satisfy the needs of LM.

CONNELL, C.W.; HILDEBRAND, R.D.

2006-12-14T23:59:59.000Z

249

Towards a sustainable web accessibility Giorgio Brajnik  

E-Print Network [OSTI]

this is by focussing on sustainable accessibility, i.e. by shaping and establishing effective acces- sibility processes;processes that can be sustained mainly by their own return on investment and by minimal additional resourcesTowards a sustainable web accessibility Giorgio Brajnik Dip. di Matematica e Informatica Universit

Brajnik, Giorgio

250

National Radiobiology Archives Distributed Access user's manual  

SciTech Connect (OSTI)

This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

1991-11-01T23:59:59.000Z

251

Metering Schemes for General Access Structures  

E-Print Network [OSTI]

Metering Schemes for General Access Structures Barbara Masucci Dipartimento di Informatica ed, Canada E­mail: dstinson@cacr.math.uwaterloo.ca Abstract A metering scheme is a method by which an audit time frame. In this paper we construct metering schemes for more general access structures, which

Stinson, Douglas

252

RESEARCH & INNOVATION OFFICE EASY ACCESS IP  

E-Print Network [OSTI]

RESEARCH & INNOVATION OFFICE EASY ACCESS IP AN INTRODUCTION FOR INDUSTRY PARTNERS FEBRUARY 2014 #12 to economic, environmental and social benefits. We believe there are some significant benefits to Easy Access, design and innovation Simple template license agreements means no lengthy and expensive negotiations

University of Technology, Sydney

253

Locally accessible information and distillation of entanglement  

SciTech Connect (OSTI)

A different type of complementarity relation is found between locally accessible information and final average entanglement for a given ensemble. It is also shown that in some well-known distillation protocols, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

Ghosh, Sibasish [Department of Computer Science, University of York, Heslington, York, YO10 (United Kingdom); Joag, Pramod [Department of Physics, University of Pune, Ganeshkhind, Pune 411 007 (India); Kar, Guruprasad; Kunkri, Samir [Physics and Applied Mathematics Unit, Indian Statistical Institute, 203, B.T. Road, Kolkata 700 108 (India); Roy, Anirban [Institute of Mathematical Sciences, CIT Campus, Taramani, Chennai 600 113 (India)

2005-01-01T23:59:59.000Z

254

Access control models and security labelling  

Science Journals Connector (OSTI)

Security labels convey information that is utilised to perform access control decisions, specify protective measures, and aid in the determination of additional handling restrictions required by security policies. In discussing security labelling, one ... Keywords: access control, assurance, dynamic labelling model, open system, security label, security policy

Chuchang Liu; Angela Billard; Maris Ozols; Nikifor Jeremic

2007-01-01T23:59:59.000Z

255

Improving VPN Performance over Multiple Access Links  

E-Print Network [OSTI]

, cable modem) or suffer different or time-varying communication characteristics (e.g., available distinct innovations. First, we continuously measure the communication characteristics of the underlying the intranet), and reduced internet access throughput via the VPN (relative to direct internet access). One

Singh, Jaswinder Pal

256

Web Accessibility Office of Diversity and Inclusion  

E-Print Network [OSTI]

Web Accessibility Office of Diversity and Inclusion Applies to: Any website conducting university of the art digital and web based information delivery of information is increasingly central in carrying out constituencies. This policy establishes minimum standards for the accessibility of web based information

Jones, Michelle

257

Usability and Accessibility in Consumer Health Informatics  

E-Print Network [OSTI]

Usability and Accessibility in Consumer Health Informatics Current Trends and Future Challenges, for innovative eHealth systems to have true value and impact, they must first and foremost be usable challenges in the usability and accessibility of consumer health informatics will be described. Consumer

Shneiderman, Ben

258

Ethiopia Energy Access Project | Open Energy Information  

Open Energy Info (EERE)

Ethiopia Energy Access Project Ethiopia Energy Access Project Jump to: navigation, search Name of project Ethiopia Energy Access Project Location of project Ethiopia Energy Services Lighting, Cooking and water heating, Information and communications Year initiated 2005 Organization World Bank Website http://documents.worldbank.org Coordinates 9.145°, 40.489673° References The World Bank[1] The Energy Access Project for Ethiopia will establish a sustainable program for expanding the population's access to electricity and improving the quality and adequacy of electricity supply, reduce environmental degradation and improve energy end-use efficiency; reduce the barriers to the wide spread adoption of renewable energy technologies, and provide technical support for institutional and capacity building of key sector

259

3 - How Electronic Access Control Systems Work  

Science Journals Connector (OSTI)

Publisher Summary This chapter focuses on Electronic Access Control Systems concepts and how they work. These systems comprise electronic elements, physical elements, operational elements, and logical elements to create a complete working system that facilitates rapid and reliable access to authorized users in a facility at minimum long-term cost to the organization. They are digital networks that control access to security portals. A security portal is an entry into or out of a security boundary. Most Electronic Access Control Systems also function as an intrusion alarm system. From this point forward, it assumes that the systems have an alarm system element. Electronic Access Control Systems comprise field equipment, decision modules, a communications network, one or more databases, and one or more human interface terminals. The most obvious elements of an Electronic Access Control System are the Field Elements: Access Control System Portals (for pedestrians or vehicles), alarm sensors, and any controlled devices such as roll-up doors and lights. This chapter is about Electronic Access Control Systems concepts and how they work. It is important to read this chapter very carefully and be certain that you understand everything in it. Go over the Chapter Objectives and the Chapter Summary. Everything else you read in this book is based on the material in this chapter. Electronic Access Control Systems comprise electronic elements, physical elements, operational elements, and logical elements to create a complete working system that facilitates rapid and reliable access to authorized users in a facility at minimum long-term cost to the organization. This book is written in a hierarchical fashion; that is, the concepts are related first and then expanded on in greater detail later in the book. Accordingly, you will see repetition throughout the book, but that repetition is designed to instill learning in a layered fashion. Author Information: Thomas L. Norman, CPP, PSP, CSC, Executive Vice President, Protection Partners International

Thomas Norman

2012-01-01T23:59:59.000Z

260

DEACTIVATION MANAGEMENT  

Broader source: Energy.gov (indexed) [DOE]

MANAGEMENT MANAGEMENT The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project management approach, and as such is not addressed. The following specific topics are based on lessons learned during deactivation of DOE facilities.  The Deactivation Mission  The Stabilization/Deactivation "Customer"  Project Approach for a Complex Facility  Establishing the Overall End-State  Viewing Deactivation in Two Phases  Early Decisions  Early Deactivation Tasks  Facility-Specific Commitments  Hazard Reduction  Detailed End-Points  Set Up Method and Criteria  Post-Deactivation S&M Plan

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

BachelorofManagement InternationalManagement  

E-Print Network [OSTI]

on the official transcript (see Part 11 - Faculty of Management in the 2007/2008 Calendar). Program Planning Guide Management 3050/Political Science 3420 - Human Resource Management Management 3061 - Information Systems Environment Management 3640 - Cross-Cultural Management Practices Management 3660/Geography 3225 - Industrial

Seldin, Jonathan P.

262

Response to U. S. Department of Energy's NBP RFI: Data Access  

Broader source: Energy.gov (indexed) [DOE]

Response to U. S. Department of Energy's NBP RFI: Data Access DTE Energy Distribution Operations, SmartCurrents Standards 12 July 2010 I. Introduction The following is DTE Energy's response to the Department of Energy's (DOE) Request for Information on the subject of Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy, published in the Federal Register on 11 May 2010. DTE Energy is one of the nation's largest diversified energy companies. Headquartered in Detroit, Michigan, DTE Energy is involved in the development and management of energy-related

263

A Framework for Flexible Access Control in Digital Library Systems  

E-Print Network [OSTI]

to merely control access to documents local to the digital library. The access control policies are often called DACM (Document Access Control Methods). The basic idea is geared toward discretionary accessA Framework for Flexible Access Control in Digital Library Systems Indrajit Ray and Sudip

Ray, Indrajit

264

Long-Term Surveillance and Maintenance Records: Maintaining Access to the Knowledge - 13122  

SciTech Connect (OSTI)

The U.S. Department of Energy (DOE) Office of Legacy Management (LM) is an integral part of DOE's strategy to ensure that legacy liabilities of former nuclear weapons production sites are properly managed following the completion of environmental cleanup activities. In the area of environmental legacy management, records management is crucial to the protection of health, environmental, and legal interests of the Department and the public. LM is responsible for maintaining long-term surveillance and maintenance (LTS and M) records in performance of its mission. Maintaining access to the knowledge contained in these record collections is one of LM's primary responsibilities. To fulfill this responsibility, LM established a consolidated records management facility, the LM Business Center (LMBC), to house physical media records and electronic records. A new electronic record keeping system (ERKS) was needed to replace an obsolete system while helping to ensure LM is able to meet ongoing responsibilities to maintain access to knowledge and control the life cycle management of records. (authors)

Montgomery, John; Gueretta, Jeanie [U.S. Department of Energy Office of Legacy Management, 99 Research Park Road Morgantown, WV 26505 (United States)] [U.S. Department of Energy Office of Legacy Management, 99 Research Park Road Morgantown, WV 26505 (United States); McKinney, Ruth; Anglim, Cliff [Source One Management, Inc. (United States)] [Source One Management, Inc. (United States)

2013-07-01T23:59:59.000Z

265

Consumer access to utility billing envelopes  

SciTech Connect (OSTI)

Billing envelope inserts are a medium of advertising used by utilities for a variety of purposes, from encouraging conservation to expressing political opinions. Recently, consumer groups have begun to assert a right of access to the same medium. A constitutional right of reply has been advocated. Commissions have found regulatory authority to direct companies to provide access on the basis of several different theories. At least two states have passed legislation permitting consumer groups to use bill inserts to solicit members and contributions. When examined, these developments reveal a trend of granting organizations access to utility billing envelopes.

Anglin, M.K.

1984-09-13T23:59:59.000Z

266

Management Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Immobilization Research Immobilization Research Kurt Gerdes U.S. DOE, Office of Engineering and Technology John Vienna Pacific Northwest National Laboratory Environmental Management May 19, 2009 2009 Hanford - Idaho - Savannah River Technical Exchange 2 Objectives Perform research and development to advance the waste stabilization technology options by through closely- coupled theory, experimentation, and modeling Develop solutions for Hanford, Idaho, Savannah River, and Oak Ridge wastes challenges (along with facilitating management of future wastes) Environmental Management General Approach Balance between near-term incremental technology improvements and long-term transformational solutions Address the requirements for high risk waste streams - high-level tank waste (RPP, SRS)

267

Monitoring and Managing Water Quality in the San Francisco Estuary San Francisco Estuary Institute and the  

E-Print Network [OSTI]

Monitoring and Managing Water Quality in the San Francisco Estuary San Francisco Estuary Institute;Contribution 517 Monitoring and Managing Water Quality in the San Francisco Estuary San Francisco Estuary information generated each year on water quality in the Estu- ary accessible to water quality managers

268

ALLIANCE MANAGEMENT  

Science Journals Connector (OSTI)

In the last two decades, production and manufacturing management has rapidly adopted a range of new concepts: manufacturing strategy, focused factory, just-in-time manufacturing, concurrent engineering, total ...

2000-01-01T23:59:59.000Z

269

Operations Management is the art and science of ensuring that goods and services are created and delivered successfully to customers. This  

E-Print Network [OSTI]

(with Review Cards and Bind-In Printed Access Card) by David Alan Collier and James R. Evans | ISBN: 10 Management Complete all 10 courses in the Supply Management Training program to r

Saskatchewan, University of

270

Stormwater Management  

E-Print Network [OSTI]

management program must be developed that would meet the standard of reducing pollutants to the maximum extent practicable. Stormwater management programs for medium and large MS4s include measures to: ? Identify major outfalls and pollutant loadings... seeding: The vegetation used will be part of final landscaping, but during construction it prevents soil erosion. ? Mulching: Materials such as hay, grass, woodchips, gravel, or straw are placed on top of the soil to keep it from eroding. Structural...

Jaber, Fouad

2008-10-23T23:59:59.000Z

271

Decision Analysis of Dynamic Spectrum Access Rules  

SciTech Connect (OSTI)

A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

2011-12-01T23:59:59.000Z

272

Cognitive Medium Access: Exploration, Exploitation and Competition  

E-Print Network [OSTI]

1 Cognitive Medium Access: Exploration, Exploitation and Competition Lifeng Lai, Hesham El Gamal, Hai Jiang and H. Vincent Poor Abstract-- This paper establishes the equivalence between cognitive cognitive user wishes to opportunistically exploit the availability of empty fre- quency bands

El-Gamal, Hesham

273

Metadata Value Chain for Open Access Journals  

E-Print Network [OSTI]

In this session, Holly Mercer presented a case for finding global solutions to improve the metadata that is available for journals, particularly small, independent open access journals. She discussed the scholarly communication lifecycle...

Mercer, Holly; Dyas-Correia, Sharon

2011-01-01T23:59:59.000Z

274

JOBAID-ACCESSING AND MODIFYING TALENT PROFILE  

Broader source: Energy.gov [DOE]

The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile...

275

North Carolina Capital Access Program (North Carolina)  

Broader source: Energy.gov [DOE]

The North Carolina Capital Access Program provides matching reserve funds for business loans that are beyond the traditional lending means of a lenders usual standards. The average CAP loan is ...

276

BNL | Center for Functional Nanomaterials Data Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Data Management at CFN Data Management at CFN The Center for Functional Nanomaterials encourages Users to bring with them high capacity data storage drives (such as flash drives or portable hard-disk drives), which will allow them to manage their data on their own computers. The transfer of data is conducted consistently on secondary, data-retrieval computers. The CFN currently offers several resources for Users to manage their data: The CFN provides all onsite Users the opportunity to acquire an account on a CFN-dedicated computer server. This data server, which is managed by BNL's Information Technology Division (ITD), provides Users with a location to store data that was obtained at CFN, to which the Users may have access after departing CFN at the conclusion of an onsite visit.

277

Categorical Exclusion Determinations: Legacy Management | Department of  

Broader source: Energy.gov (indexed) [DOE]

Legacy Management Legacy Management Categorical Exclusion Determinations: Legacy Management Categorical Exclusion Determinations issued by Legacy Mangement. DOCUMENTS AVAILABLE FOR DOWNLOAD May 28, 2013 CX-010396: Categorical Exclusion Determination Bioremediation Injection and Related Activities at the Pinellas Site, Largo, Florida CX(s) Applied: B3.1, B6.1 Date: 05/28/2013 Location(s): Florida Offices(s): Legacy Management May 28, 2013 CX-010533: Categorical Exclusion Determination Road Maintenance on roads Used to Access Groundwater Monitoring Wells South of the Tuba City, Arizona, Uranium Mill Tailing Remedial Action Title I Site CX(s) Applied: B1.3, B3.3, B6.1 Date: 05/28/2013 Location(s): Arizona Offices(s): Legacy Management November 2, 2012 CX-009399: Categorical Exclusion Determination

278

General Guidance on Data Usage and Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

General Guidance on Data Usage and Management General Guidance on Data Usage and Management Summary Data Usage Credit Data Management and Documentation: Introduction Our philosophy Data management Record measured values Zero versus missing value Metadata Data documentation Define variables Specify units Provide citations For additional information Summary Ensure long-term preservation of, and full and open access to, high-quality data sets Give proper credit to the researchers providing the data Provide thorough, yet simple, documentation: how the data were produced, what they mean Generate ASCII data and documentation files; they ensure readibility by virtually all users Define variable names and units Point to, or provide, important publications that further document the data Data usage CDIAC fully supports the July 1991 Policy Statements on Data Management for

279

Property:EnergyAccessYearInitiated | Open Energy Information  

Open Energy Info (EERE)

EnergyAccessYearInitiated EnergyAccessYearInitiated Jump to: navigation, search Property Name EnergyAccessYearInitiated Property Type Date Description Year Initiated Pages using the property "EnergyAccessYearInitiated" Showing 10 pages using this property. B Benin: Increased Access to Modern Energy Project + 2009 + Burkina Faso Energy Access Project + 2007 + E Ethiopia Energy Access Project + 2005 + G Ghana Energy Development and Access Project (GEDAP) + 2007 + M Mongolia Renewable Energy and Rural Electricity Access Project + 2006 + P Papua New Guinea Improved Energy Access for Rural Communities + 2012 + R Republic of Yemen Energy Access Project + 2006 + S Sri Lanka Credit to Connect + 2011 + T Tanzania Energy Development and Access Expansion Project + 2007 + V Viet Nam Rural Electrification + 2009 +

280

Center for Nanoscale Materials User Access Program Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Materials User Access Program Overview Materials User Access Program Overview CNM User Access Program Overview 1. Objective ............................................................................................................................................... 1 2. Submission Guidelines .......................................................................................................................... 1 2.1 Proposal Content ............................................................................................................................ 1 3. Proposal Review Process ....................................................................................................................... 2 3.1 Proposal Evaluation Board .............................................................................................................. 2

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

282

Microsoft Word - CX-Boyer-Tillamook_access_road_WEB.doc  

Broader source: Energy.gov (indexed) [DOE]

James Semrau Project Manager - TELF-TPP-3 David Forward TELF-TPP-3 Proposed Action: Boyer-Tillamook No. 1 transmission line access road maintenance including grading and rocking of road surfaces and installation of water bars and cross drain culverts Budget Information: Work Order #00253279 PP&A Project No.: PP&A 1533 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine maintenance activities...for...rights-of-way...(e.g. roads)...required to maintain and preserve...infrastructures in a condition suitable for a facility to be used for its designated purpose. Location: Tillamook and Yamhill counties, Oregon. Proposed by: Bonneville Power Administration (BPA) Description of the Proposed Action:

283

Science Open Access Journals - Website Policies/Important Links  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any

284

Microsoft Word - CX-Ostrander-Troutdale-access_road_WEB.doc  

Broader source: Energy.gov (indexed) [DOE]

July 30, 2010 REPLY TO ATTN OF: KEP-4 SUBJECT: Environmental Clearance Memorandum Rick Ross Project Manager - TELF-TPP-3 Proposed Action: Ostrander-Troutdale No. 1 transmission line access road maintenance including grading and rocking of road surfaces and installation of water bars and cross drain culverts Budget Information: Work Order #: Unavailable PP&A Project No.: PP&A #1740 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine maintenance activities for rights-of-way, infrastructures (e.g. roads) routine maintenance activities corrective are required to maintain and preserve infrastructures in a condition suitable for the facility to be used for its designed purpose. Location: The proposed project is located within the Bonneville Power Administration (BPA)

285

GRR/Section 3-FD-c - Right-of-Way Access | Open Energy Information  

Open Energy Info (EERE)

GRR/Section 3-FD-c - Right-of-Way Access GRR/Section 3-FD-c - Right-of-Way Access < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 3-FD-c - Right-of-Way Access 03FDCRightOfWayROWAccess (2).pdf Click to View Fullscreen Contact Agencies Bureau of Land Management United States Forest Service United States Department of Transportation National Telecommunications and Information Administration Regulations & Policies NEPA Triggers None specified Click "Edit With Form" above to add content 03FDCRightOfWayROWAccess (2).pdf 03FDCRightOfWayROWAccess (2).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative This flow chart is intended to apply to lands on which a lease has not been

286

Microsoft Word - CX-LowerGranite-HatwaiAccessRoadImprovementFY13_WEB.doc  

Broader source: Energy.gov (indexed) [DOE]

9, 2012 9, 2012 REPLY TO ATTN OF: KEPR-Bell-1 SUBJECT: Environmental Clearance Memorandum Kristi Unholz Project Manager - TELF-TPP-3 Proposed Action: Improve the access road system in miles 4, 5, 16, 17, 18, and 30 of the Lower Granite-Hatwai transmission line PP&A Project No.: 2378 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine Maintenance. B1.13 Pathways, short access roads, and rail lines Location: As identified in table below: Lower Granite-Hatwai Access Road Project Location Township Range Section County, State mile 4 to mile 5 13N 43E 2 Whitman, WA mile 16 12N 45E 8 mile 17 12N 45E 17 mile 18 12N 45E 20 mile 30 36N 5W 19, 30 Nez Perce, ID Proposed by: Bonneville Power Administration (BPA)

287

Microsoft Word - CX-Ross-Lexington_access_road_addition_WEB.doc  

Broader source: Energy.gov (indexed) [DOE]

KEPR-4 KEPR-4 SUBJECT: Environmental Clearance Memorandum Dawneen Dostert Project Manager - TERR-LMT Proposed Action: New access road construction to include clearing, grading, and shaping of roads, placing and compacting of rock surfacing, installation of gates, installation and maintenance of erosion control and water drainage features, and restoration of disturbed areas Budget Information: Work Order # 00230995 PP&A Project No.: 1534 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.13 Construction/ acquisition/relocation of onsite pathways, short onsite access roads/railroads. Location: The project area is confined to the existing and proposed access roads around the right-of-way (ROW) corridor of Bonneville Power Administration's (BPA) Ross-Lexington

288

NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Use and Privacy- Comments of Use and Privacy- Comments of Utilities Telecom Council NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities Telecom Council The Utilities Telecom Council hereby comments in response to the Department of Energy (DOE) request for information on data access, third party use, and privacy. In summary, UTC submits that the innovative deployment by energy utilities of smart meters and smart control systems will create a smart energy grid that will unlock the value of what has been called the Energy Information Economy2. Smart energy grids will create an environment in which consumers will have greater abilities to manage their own energy usage and utilities will have new tools to affect grid-wide energy efficiencies never before possible. The key to all this is data. How to provide secure access to it

289

Public Roundtable- Data Access and Privacy Issues Related to...  

Office of Environmental Management (EM)

Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

290

National Geothermal Data Systems Data Acquisition and Access...  

Broader source: Energy.gov (indexed) [DOE]

National Geothermal Data Systems Data Acquisition and Access National Geothermal Data Systems Data Acquisition and Access Project objective: To support the acquisition of new and...

291

Overview of Access Authorization Process for Applicants, May...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

& Reports Security Overview of Access Authorization Process for Applicants, May, 2013 Overview of Access Authorization Process for Applicants, May, 2013 May, 2013 This...

292

Re~ Request for Information NBP RFI: Data Access | Department...  

Broader source: Energy.gov (indexed) [DOE]

for Information NBP RFI: Data Access Re Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight Midwestern...

293

Request for Information NBP RFI: Data Access | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Request for Information NBP RFI: Data Access Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight...

294

SBA Expands Access to Contracting Opportunities for Women-Owned...  

Office of Environmental Management (EM)

SBA Expands Access to Contracting Opportunities for Women-Owned Small Businesses SBA Expands Access to Contracting Opportunities for Women-Owned Small Businesses January 22, 2013 -...

295

Property:EnergyAccessImpactAreas | Open Energy Information  

Open Energy Info (EERE)

Name EnergyAccessImpactAreas Property Type String Description Impact Areas Retrieved from "http:en.openei.orgwindex.php?titleProperty:EnergyAccessImpactAreas&oldid421177...

296

Property:EnergyAccessPowerSource | Open Energy Information  

Open Energy Info (EERE)

Name EnergyAccessPowerSource Property Type String Description Power Source Retrieved from "http:en.openei.orgwindex.php?titleProperty:EnergyAccessPowerSource&oldid421179...

297

Pre-Packaged Commercial Property-Accessed Clean Energy Financing...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Packaged Commercial Property-Accessed Clean Energy Financing Solutions - 2014 BTO Peer Review Pre-Packaged Commercial Property-Accessed Clean Energy Financing Solutions - 2014 BTO...

298

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy Savers [EERE]

Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

299

Environmental Compliance Management System  

SciTech Connect (OSTI)

Argonne National Laboratory (ANL) is developing the Environmental Compliance Management System (ECMS) as a comprehensive, cost-effective tool to ensure (1) that the Laboratory complies with all applicable federal and state environmental laws and regulations, (2) that environmental issues and concerns are recognized and considered in the early phases of projects; and (3) that Laboratory personnel conduct Laboratory operations in the most environmentally acceptable manner. The ECMS is an expert computer system which is designed to allow project engineers to perform an environmental evaluation of their projects. The system includes a Master Program which collects basic project information, provide utility functions, and access the environmental expert modules, environmental expert system modules for each federal and state environmental law which allows the user to obtain specific information on how an individual law may affect his project; and site-specific databases which contain information necessary for effective management of the site under environmental regulations. The ECMS will have the capability to complete and print many of the necessary environmental forms required by federal and state agencies, including the Department of Energy.

Brownson, L.W.; Krsul, T.; Peralta, R.A. [Argonne National Lab., Idaho Falls, ID (United States); Knudson, D.A.; Rosignolo, C.L. [Argonne National Lab., IL (United States)

1992-09-01T23:59:59.000Z

300

NETL: News Release - Access to DOE Database of Oil and Natural Gas Research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2, 2011 2, 2011 Access to DOE Database of Oil and Natural Gas Research Results Expanded Washington, DC -The results of nearly four decades of research supported by the U.S. Department of Energy (DOE) are now available through the OnePetro online document repository. Click to link to the OnePetro website The OnePetro website now contains NETL's Oil & Gas Knowledge Management Database DOE's Knowledge Management Database (KMD) provides access to content from dozens of CDs and DVDs related to oil and natural gas research that the Office of Fossil Energy's (FE) National Energy Technology Laboratory (NETL) has published over the years. It also provides links to reports, data sets, and project summaries from ongoing research supported by FE's Oil and Natural Gas Program.

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

U.S. Department of Energy Office of Legacy Management  

Office of Legacy Management (LM)

U.S. Department of Energy Office of Legacy Management U.S. Department of Energy Office of Legacy Management LMS 3047FER Page 1 of 2 02/02/2010 Fernald Preserve Institutional Control Inspection Date Dec. 2011 Inspector SM Stoller Area Institutional Controls Type of Finding (See Definitions Page) Follow Up Institutional Control Signage Barrier Groundskeeping Other Description Photo? (File No.) Corrected Maintenance Req'd Cont. Observation Access Points South Access NO FINDINGS No North Access NO FINDINGS No Eco Park NO FINDINGS No Forest Demo NO FINDINGS No Perimeter Authorized Vehicle Access NO FINDINGS No Perimeter Signage NO FINDINGS No Fencing CAWWT X X Tree growing into chain link fence on north side. No X

302

Managing the Management: CORBAbased Instrumentation of Management Systems  

E-Print Network [OSTI]

Management Team Department of Computer Science, TU M? unchen Arcisstr. 21, D­80333 Munich, Germany akeller approach to this problem by defining a MIB for manage­ ment systems. It can be regarded as a step towardsManaging the Management: CORBA­based Instrumentation of Management Systems A. Keller Munich Network

303

Data Sharing, Year 1 Access to Data from Industry-Sponsored Clinical Trials  

Science Journals Connector (OSTI)

...The independent review panel was charged with accepting or rejecting proposals on the basis of their scientific rationale and relevance to medical science or patient care. The panel also considered the qualifications of the investigators, the existence and management of any potential conflicts of interest... There has been considerable interest of late in increasing the transparency of clinical trials, including increasing access to the raw data from trials sponsored by the pharmaceutical industry.1 Since May 2013, investigators have been able to request ...

2014-10-15T23:59:59.000Z

304

Managing Solutions  

E-Print Network [OSTI]

tx H2O | pg. 19 Texas Water Resources Institute (TWRI) project managers work together with scientists and educators as well as government funding agencies to address water quality and quantity issues in Texas. Each of TWRI?s five project... the funds.? Gregory began his role at TWRI in 2006 upon com- pletion of a master?s degree in water management and hydrological science at Texas A&M University. A former Mills Scholar, Gregory was familiar with TWRI. He saw that the institute...

Baker, Emily

2007-01-01T23:59:59.000Z

305

CONTROLLING ACCESS TO UNIVERSITY FACILITIES 1. It is the Policy of Syracuse University that all electronically secured University buildings will  

E-Print Network [OSTI]

that all electronically secured University buildings will have a single access control system for managing for any building will be at the discretion of the Cabinet Officer assigned responsibility for the building or area of a building. Approval will be coordinated through the Department of Public Safety (DPS

Mather, Patrick T.

306

Microsoft Word - Managing Your iSupplier Profile Job Aid R12 05092012.docx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Contents of Contents Summary of Your iSupplier Profile...........................................................................................................................2 Accessing Your Account for the First Time.............................................................................................................2 Navigating to Your Profile.........................................................................................................................................3 Company Information (a.k.a. Profile Management)............................................................................................4 Organization...............................................................................................................................................................5

307

Measuring the Potential to Adopt Self Governance for the Management of a Common Pool Resource  

E-Print Network [OSTI]

Self governance has proved to be a suitable instrument for the management of a common pool resource like fisheries. Under self governance, individuals organize themselves for the use of a resource, to deal with problems derived from the free access...

Colin Castillo, Sergio

2012-02-14T23:59:59.000Z

308

REQUIREMENTS FOR WEB ACCESS FOR HEARING IMPAIRED 1 Requirements for Maintaining Web Access for  

E-Print Network [OSTI]

REQUIREMENTS FOR WEB ACCESS FOR HEARING IMPAIRED 1 Requirements for Maintaining Web Access to computing, including the Web, is a dream come true for the hearing impaired. However, improved technology "Quality in Web Design for Visually Impaired Users" by Margaret Ross (Ross, 2002) describes the specifics

Berry, Daniel M.

309

Student On Line Access to Records Provides on-line, self service access to  

E-Print Network [OSTI]

SOLAR Student On Line Access to Records #12;Provides on-line, self service access to: Registrar Enrollment Appointments · Review Solar Messages Student Account/ Financial Aid: · View Support offered (available aid ­ i.e. Federal loans, scholarships, etc.) · Accept financial aid (i.e. loans, etc.) ­ loan

310

LTS Project Management - Hanford Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transition LTS Execution Project Management Planning Resource Management Reporting Interface Management Communications (InternalExternal) Information Management Records...

311

Microsoft Word - CX-Kalispell-KerrMile15-16AccessRoadImprovementFY12_WEB.doc  

Broader source: Energy.gov (indexed) [DOE]

2 2 REPLY TO ATTN OF: KEPR-Bell-1 SUBJECT: Environmental Clearance Memorandum Joe Johnson Project Manager - TELF-TPP-3 Proposed Action: Access road improvement for the Kalispell-Kerr #1, 115-kilovolt (kV) transmission line PP&A Project No.: 2474 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine Maintenance, B1.13 Pathways, short access roads, and rail lines Location: Township 26 North, Range 21 West, Section 13 and 24, Flathead County, MT. Proposed by: Bonneville Power Administration (BPA) Description of the Proposed Action: BPA proposes to perform access road maintenance on several segments of the access road for the Kalispell-Kerr #1, 115-kV transmission line. Work includes reconstruction and drainage enhancements on 5000 feet of road beginning at structure

312

Risk management  

SciTech Connect (OSTI)

In the autumn of 1993 an incident occurred with a diving support vessel, whereby a live pipeline from a NAM gas production platform, situated in the Dutch sector of the North Sea, was considerably displaced. Key element in the repair of the line was to identify potential hazards involved in various remedial scenarios and to manage the associated risks.

Visser, M. [Nederlandse Aardolie Maatschappij, Velsen (Netherlands)

1995-12-31T23:59:59.000Z

313

NBP RFI: Data Access | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

NBP RFI: Data Access NBP RFI: Data Access NBP RFI: Data Access The National Rural Electric Cooperative Association (NRECA) is the national service organization representing more than 900 not-for-profit, member-owned rural electric cooperatives ("Cooperatives"). Most of NRECA's members are distribution cooperatives, providing retail electric service to more than 42 million consumers in 47 states. NRECA members also include approximately 66 generation and transmission ("G&T") cooperatives that supply wholesale power to their distribution cooperative member-owners. Cooperatives provide service to approximately 75 percent of the nation's land mass, resulting in a consumer density of just seven consumers per mile of line, significantly less density than that of

314

Notices Electronic Access to This Document:  

Broader source: Energy.gov (indexed) [DOE]

805 Federal Register 805 Federal Register / Vol. 77, No. 67 / Friday, April 6, 2012 / Notices Electronic Access to This Document: The official version of this document is the document published in the Federal Register. Free Internet access to the official edition of the Federal Register and the Code of Federal Regulations is available via the Federal Digital System at: www.gpo.gov/fdsys. At this site you can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document Format (PDF). To use PDF you must have Adobe Acrobat Reader, which is available free at the site. You may also access documents of the Department published in the Federal Register by using the article search feature at: www.federalregister.gov.

315

Uniform Transboundary Pollution Reciprocal Access Act (Montana) |  

Broader source: Energy.gov (indexed) [DOE]

Uniform Transboundary Pollution Reciprocal Access Act (Montana) Uniform Transboundary Pollution Reciprocal Access Act (Montana) Uniform Transboundary Pollution Reciprocal Access Act (Montana) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Tribal Government Institutional Fuel Distributor Transportation Program Info State Montana Program Type Environmental Regulations This Act allows any entity in a Reciprocating Jurisdiction harmed by pollution originating in the state of Montana to bring an action or other proceeding against the source of that pollution in the state of Montana. Such an entity has the same rights in the state of Montana as they would if

316

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS December 4, 2012 V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. November 30, 2012 V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. November 27, 2012 V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws

317

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

318

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

319

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

320

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

322

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

323

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

324

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

325

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

326

Performance estimates for personnel access control systems  

SciTech Connect (OSTI)

Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

Bradley, R. G.

1980-10-01T23:59:59.000Z

327

Medicaid Payments and Access to Care  

Science Journals Connector (OSTI)

...impact on health insurance coverage, access to care, and the health of the poor has been substantial. But historically, Medicaid has faced a major challenge a relatively low rate of physician participation. In its March 2011 report to Congress, the Medicaid and CHIP (Children's Health Insurance Program... Medicaid has long faced relatively low physician participation, at least in part because of low payment rates. Some beneficiaries and providers have turned to litigation claiming inadequate access to care, but there may be no remedy in the courts.

Rosenbaum S.

2014-12-18T23:59:59.000Z

328

CA557 Information Access Cathal Gurrin (c) 2003-2005 C A 5 5 7 -I n f o r m a t I o n A c c e s s -  

E-Print Network [OSTI]

CA557 ­ Information Access Cathal Gurrin (c) 2003-2005 - - - 1 - CA557 C A 5 5 7 - I n f o r m a t I o n A c c e s s - Chapter 1 CA557 Information Access - 2 - CA557 C A 5 5 7 - I n f o r m a t I o n as much about managing it? #12;CA557 ­ Information Access Cathal Gurrin (c) 2003-2005 - - - 3 - CA557

Smeaton, Alan F.

329

ARM - Data Management and Documentation Plan  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

DocumentationData Management and Documentation Plan DocumentationData Management and Documentation Plan Policies, Plans, Descriptions Data Documentation Home Data Sharing and Distribution Policy Data Management and Documentation Plan Data Product Registration and Submission Reading netCDF and HDF Data Files Time in ARM netCDF Data Files Data Archive Documentation ARM Archive's Catalog of Data Streams (Updated monthly) Access to Historical ARM Data More on Understanding and Finding ARM Data Data Quality Problem Reporting Data Management and Documentation Plan Purpose This document describes datastream documentation requirements and standard formatting and naming protocols for both data users and the infrastructure who produce the data. Definitions Baseline Change Request (BCR): Used by the ARM Infrastructure as a process to provide configuration

330

Data Management Policy | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Data Management Policy Data Management Policy The data management resource information and data release policies below are provided to help researchers understand the data...

331

Object Management Systems  

E-Print Network [OSTI]

Object-Oriented Database Management Systems for EngineeringR. Cassel. Distribution Management Systems: Functions and8-PWR 1988. Network Management Systems 52 Subodh Bapat.

Gollu, Aleks Ohannes

1995-01-01T23:59:59.000Z

332

Environmental Management System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts...

333

Environmental Management System Plan  

E-Print Network [OSTI]

R-3 Environmental Management System Plan References 30.of Energy, Safety Management System Policy, DOE P 450.4 (E), Environmental Management Systems ? Requirements with

Fox, Robert

2009-01-01T23:59:59.000Z

334

Federal Energy Management Program: Best Management Practice: Cooling Tower  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cooling Tower Management to someone by E-mail Cooling Tower Management to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Google Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Delicious Rank Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

335

Federal Energy Management Program: Best Management Practice: Water  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Water Management Planning to someone by E-mail Water Management Planning to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water Management Planning on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Water Management Planning on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Google Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Delicious Rank Federal Energy Management Program: Best Management Practice: Water Management Planning on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Water Management Planning on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

336

Managing Critical Management Improvement Initiatives  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

2003-10-01T23:59:59.000Z

337

Cyber Security Requirements for Risk Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

338

Technology Access Deutsches Patent; Internationale Patentanmeldung (PCT)  

E-Print Network [OSTI]

Technology Access offered by Deutsches Patent; Internationale Patentanmeldung (PCT) TM 586 besitzt einen so gro?en Einfluss auf eine Vielzahl zellulä- in zahlreichen Signalwegen #12; Deutsches Störungen, Depression, Schizophrenie sowie Haarausfall und verringerte Spermienmotilität. #12; Deutsches

Haller-Dintelmann, Robert

339

RESEARCH & INNOVATION OFFICE EASY ACCESS IP  

E-Print Network [OSTI]

the barriers to internal investment in development by offering the IP for free and using quick and simple university and an international partner of the initiative for Australasia in December 2013. This new approach Access IP? Whilst we will still protect and commercialise some IP as before, we will offer some of our IP

University of Technology, Sydney

340

Improving School Governance | 3 Open access publishing  

E-Print Network [OSTI]

Access Article Processing Charges Bo-Christer Björk and David Solomon March 2014 #12;1 Developing, Finland and Haslett, Michigan, USA Bo-Christer Björk, Dr. Tech. David J Solomon, PhD Professor Professor.............................................................................................................................................................7 1.2 Methodology

Rambaut, Andrew

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

HARVARD LAW SCHOOL LIBRARY ACCESS SERVICES DEPARTMENT  

E-Print Network [OSTI]

Library material. Patrons assigned a carrel shelf are reserving only the upper shelf space more space than the assigned top shelf. Carrels containing too many books may be reshelved by libraryHARVARD LAW SCHOOL LIBRARY ACCESS SERVICES DEPARTMENT 2014 SUMMER CARREL SHELF INFORMATION To apply

342

Caf Systems Central Security Access Form  

E-Print Network [OSTI]

and Procurement Tracking Reports (Encumbrances, Delivery, Change Order History) SCH_SUPPLY_CHAIN Ad Hoc Query Runner Ability to run reports created by Ad Hoc Query Authors CAFE_NU_COGNOS_AD_HOC_VIEWERS Ad Hoc Query Author (Training Required) Access to Query Studio to create, build, and save reports CAFE_NU_COGNOS_AD_HOC

Shull, Kenneth R.

343

ACCESS TO INFORMATION MANUAL NATIONAL RESEARCH FOUNDATION  

E-Print Network [OSTI]

ACCESS TO INFORMATION MANUAL FOR THE NATIONAL RESEARCH FOUNDATION Manual in terms of section 14 ............................................................................................. 1 2.2 A SCHEMATIC DIARAM OF THE STRUCTURE OF THE NATIONAL RESEARCH FOUNDATION......... 2 2 BODIES #12;© National Research Foundation Malefyane Mogale i FOREWORD In order to present a balanced

Jarrett, Thomas H.

344

Information Access and Privacy Protection Office  

E-Print Network [OSTI]

Information Access and Privacy Protection Office I A P P Guidelines for Using Personal Information in Email and Faxes Memorial University employees are required to protect personal information (defined personal information ­ your own or someone else's. Email and faxes, in particular, pose challenges

deYoung, Brad

345

Accessing MDS with IDL February 1993  

E-Print Network [OSTI]

by the Massachusetts Institute of Technology. MIT assumes no responsibility for any errors that may appear and image display capabilities into a truly interactive system. Designed for scientists and engineers, IDL can now access MDS database items directly from within the IDL analysis environment and manipulate

California at San Diego, University of

346

Characterizing Open Access Publishing at Your Institution  

E-Print Network [OSTI]

access scholarly communication in Tanzanian public universities. 76th IFLA General Conference and Assembly, Gothenburg, Sweden. Retrieved March 3, 2014, from http://conference.ifla.org/past-wlic/2010/138-dulle-en.pdf. Gul, S., Shah, T. A., & Bhagwan, T. A...

Hubbard, David E.; Li, Yu

2014-11-03T23:59:59.000Z

347

UH Parking Access & Mid-Pacific Institute  

E-Print Network [OSTI]

Hall Keller Hall Physical Science Building Pacific Ocean Science & Technology Kuykendall AnnexStairs Pond UH Parking Access & Mid-Pacific Institute Exit M¯anoa Innovation Center and Kau Auxiliary Services Pacific Biomedical Warehouse Agricultural Science Shops Campus Security n Landscaping

348

Access Agreement Principal Contact for Enquiries  

E-Print Network [OSTI]

Access Agreement 2014/15 Contents 1) Introduction 3 2) Fees, Student Numbers and Fee Income 4 3, strong community spirit and excellent student life. Observing Keele's founding ethos of 'the pursuit of education for individuals, communities and society and equality of opportunity. 1.2 Our University Mission

Stell, John

349

OFC/NFOEC'11 Summary ---Access---  

E-Print Network [OSTI]

Systems · 10 GB/s PON Technology G. Kramer, Broadcom, US This paper discusses the current status of EPON Networks: NMD FTTX New Technologies NTuD 10 Gb/s PON Technology OWI Energy Efficient Networks NWD Worldwide FTTx Opportunities and Challenges OThB Energy Efficient Optical Access OThT High Speed PON OMP

California at Davis, University of

350

Can Information Systems facilitate the integration of New Public Management and Public Governance? Evidence from an Italian public organization  

Science Journals Connector (OSTI)

The paper aims to provide new insights concerning the role of Information Systems (IS) in the theoretical and practical debate on New Public Management (NPM) and Public Governance (PG) reforms. If NPM aims to increase efficiency in order to reduce costs ... Keywords: Information system, management by objectives, new public management, public governance, right of access, work practices

Marta Trotta; Danila Scarozza; Alessandro Hinna; Luca Gnan

2011-01-01T23:59:59.000Z

351

Environmental Management  

SciTech Connect (OSTI)

Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

None

2014-11-12T23:59:59.000Z

352

Environmental Management  

ScienceCinema (OSTI)

Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

None

2015-01-07T23:59:59.000Z

353

Best Management Practice #1: Water Management Planning  

Broader source: Energy.gov [DOE]

A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

354

Contract Management Certificate Program  

E-Print Network [OSTI]

Contract Management Certificate Program Accelerate Your Career BusinessandManagement extension bearing the UC seal signifies a well- known, uncompromising standard of academic excellence. #12;Contract Management Certificate Program UC Irvine Extension's Contract Management Certificate Program focuses on core

Rose, Michael R.

355

Your Records Management Responsibilities  

Broader source: Energy.gov (indexed) [DOE]

Your Records Management Your Records Management Responsibilities Table of Contents INTRODUCTION RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT RECORDS MANAGEMENT IN THE DEPARTMENT OF ENERGY IMPORTANCE OF RECORDS MANAGEMENT YOUR RECORDS MANAGEMENT RESPONSIBILITIES RECORDS MANAGEMENT LIFE CYCLE ELECTRONIC RECORDS & RECORDKEEPING LAW, REGULATION, AND POLICY ASSISTANCE RECORDS MANAGEMENT TERMS 2 INTRODUCTION If you are a government employee or contractor working for a federal agency, records management is part of your job. This pamphlet explains your responsibilities for federal records and provides the context for understanding records management in the federal government and in the Department of Energy. TOP RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT

356

Alternative Fuels Data Center: Access to State Alternative Fueling Stations  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Access to State Access to State Alternative Fueling Stations to someone by E-mail Share Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Facebook Tweet about Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Twitter Bookmark Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Google Bookmark Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Delicious Rank Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Digg Find More places to share Alternative Fuels Data Center: Access to State Alternative Fueling Stations on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Access to State Alternative Fueling Stations

357

Integrated Safety Management Policy  

Broader source: Energy.gov (indexed) [DOE]

INTEGRATED SAFETY INTEGRATED SAFETY MANAGEMENT SYSTEM DESCRIPTION U.S. DEPARTMENT OF ENERGY Office of Environmental Management Headquarters May 2008 Preparation: Braj K. sin& Occupational Safety and Health Manager Office of Safety Management Concurrence: Chuan-Fu wu Director, Offlce of Safety Management Deputy Assistant Secretary for safe& Management andoperations Operations Officer for 1 Environmental Management Approval: Date p/-g Date Environmental Management TABLE OF CONTENTS ACRONYMS................................................................................................................................................................v EXECUTIVE SUMMARY .........................................................................................................................................1

358

A Review on the Portuguese Enterprises Web Accessibility Levels A Website Accessibility High Level Improvement Proposal  

Science Journals Connector (OSTI)

Abstract The Web accessibility issue has been subject of study for a wide number of organizations all around the World. The current paper describes an accessibility evaluation that aimed to test the Portuguese enterprises websites. Has the presented results state, the evaluated websites accessibility levels are significantly bad, but the majority of the detected errors are not very complex from a technological point-of-view. With this is mind, our research team, in collaboration with a Portuguese enterprise named ANO and the support of its UTAD-ANOgov/PEPPOL research project, elaborated an improvement proposal, directed to the Web content developers, which aimed on helping these specialists to better understand and implement Web accessibility features.

Ramiro Gonalves; Jos Martins; Frederico Branco

2014-01-01T23:59:59.000Z

359

Energy management  

SciTech Connect (OSTI)

This paper is a review of the Department of Energy's (DOE) Contractor Purchasing System Review (CPSR) Program, which oversees the extensive subcontracting activities of the Department's management and operating (M and O) contractors. This review is part of a special GAO audit effort to help ensure that areas vulnerable to fraud, waste, abuse, and mismanagement are identified and that adequate corrective actions are taken. This effort focuses on 16 areas, one of which is DOE contractor oversight. This report describes the subcontracting deficiencies occurring at DOE, identifies shortcomings in DOE's CPSR Program, and discusses the corrective actions that DOE has committed to take in its CPSR Program in response to these findings.

Glenn, J.

1991-10-01T23:59:59.000Z

360

Access Venture Partners | Open Energy Information  

Open Energy Info (EERE)

Logo: Access Venture Partners Name Access Venture Partners Address 8787 Turnpike Drive, Suite 260 Place Westminster, Colorado Zip 80030 Region Rockies Area Product Venture Capital Number of employees 1-10 Year founded 1998 Phone number 303-426-8899 Website http://www.accessvp.com/ Coordinates 39.854298°, -105.052635° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.854298,"lon":-105.052635,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

NSLS User Access | Requesting Beam Time  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Requesting Beam Time Requesting Beam Time Use one of the following options depending on your research: General User Proposal General User proposals are peer reviewed for scientific merit by a Proposal Review Panel (PRP). General User proposals compete for beamtime with other General User Proposals based on scientific merit. Once the original proposal and beam time request is reviewed and rated in the PASS System, additional beam time requests can be submitted against the original proposal for its lifetime, a period of up to six cycles (two years). Data taken during experiments associated with a General User proposal is considered to be in the public domain. There is no charge for General User beamtime. Rapid Access Rapid Access proposals are a subset of General User proposals available for

362

Easy Access to Energy Improvement Funds  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

EASY ACCESS TO ENERGY IMPROVEMENT EASY ACCESS TO ENERGY IMPROVEMENT FUNDS IN THE PUBLIC SECTOR Are you postponing the installation of energy efficiency projects because the money is not in your current budget? Do you find yourself weighing the benefits of installing energy efficiency equipment today against the hassles and expense of requesting new or additional debt? Are energy efficiency projects being delayed because you are understaffed? If you answered "YES" to any of these questions, you will be happy to know there are several simple, fast, legal, and well-tested financing alternatives that may address your concerns. In the public sector, two of the most popular mechanisms for financing energy efficiency projects are performance contracts and tax- exempt lease-purchase agreements. A

363

Executive Order 12968 Access to Classified Information  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

40243 40243 Monday August 7, 1995 Part IV The President Executive Order 12968-Access to Classified Information Presidential Determination No. 95-32 of July 28, 1995 Presidential Determination No. 95-33 of July 31, 1995 Presidential Documents 40245 Federal Register Vol. 60, No. 151 Monday, August 7, 1995 Title 3- The President Executive Order 12968 of August 2, 1995 Access to Classified Information The national interest requires that certain information be maintained in confidence through a system of classification in order to protect our citizens, our democratic institutions, and our participation within the community of nations. The unauthorized disclosure of information classified in the national interest can cause irreparable damage to the national security and loss of human life.

364

Non-Markovianity through accessible information  

E-Print Network [OSTI]

The degree of non-Markovianity of quantum processes has been characterized in several different ways in the recent literature. However, the relationship between the non-Markovian behavior and the flow of information between the system and the environment through an entropic measure has not been yet established. We propose an entanglement-based measure of non-Markovianity by employing the concept of assisted knowledge, where the environment E, acquires information about a system S, by means of its measurement apparatus A. The assisted knowledge, based on the accessible information in terms of von-Neumann entropy, monotonically increases in time for all Markovian quantum processes. We demonstrate that the signatures of non-Markovianity can be captured by the nonmonotonic behaviour of the assisted knowledge. We explore this scenario for a two-level system undergoing a relaxation process, through an experimental implementation using an optical approach that allows full access to the state of the environment.

F. F. Fanchini; G. Karpat; B. akmak; L. K. Castelano; G. H. Aguilar; O. Jimnez Faras; S. P. Walborn; P. H. Souto Ribeiro; M. C. de Oliveira

2014-06-04T23:59:59.000Z

365

Channel Access Client Toolbox for Matlab  

SciTech Connect (OSTI)

This paper reports on MATLAB Channel Access (MCA) Toolbox--MATLAB [1] interface to EPICS Channel Access (CA) client library. We are developing the toolbox for SPEAR3 accelerator controls, but it is of general use for accelerator and experimental physics applications programming. It is packaged as a MATLAB toolbox to allow easy development of complex CA client applications entirely in MATLAB. The benefits include: the ability to calculate and display parameters that use EPICS process variables as inputs, availability of MATLAB graphics tools for user interface design, and integration with the MATLAB-based accelerator modeling software--Accelerator Toolbox [2-4]. Another purpose of this paper is to propose a feasible path to a synergy between accelerator control systems and accelerator simulation codes, the idea known as on-line accelerator model.

Terebilo, Andrei

2002-08-07T23:59:59.000Z

366

Open Access Transmission and Renewable Energy Technologies  

SciTech Connect (OSTI)

In April 1996, the Federal Regulatory Commission (PERC) approved Orders 888 and 889 and released a draft rule for public comment on capacity reservation tariffs (CRTs). Order No. 888 requires electric utilities to file transmission tariffs that would allow transmission access to third parties who want to conduct wholesale transactions, and Order No. 889 requires transmission-owning utilities to set up open access, same-time information systems (OASIS), using commercial software and Internet protocols. This paper discusses these Orders in detail, as well as some of the issues before FERC with implications for renewables, which include: transmission pricing; transmission terms and conditions; reassignment of transmission capacity; defining state and FERC jurisdiction over transmission and distribution; the pricing of ancillary services; and the adoption and implementation of independent system operators.

Porter, K.

1996-09-01T23:59:59.000Z

367

M E Environmental Management Environmental Management  

Broader source: Energy.gov (indexed) [DOE]

safety  performance  cleanup  closure safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management Office of Site Restoration, EM-10 Office of D&D and Facility Engineering, EM-13 Facility Deactivation & Decommissioning (D&D) D&D Program Map Addendum: Impact of American Recovery and Reinvestment Act (ARRA) on EM's D&D Program 2013 Edition U.S. Department Of Energy safety  performance  cleanup  closure M E Environmental Management Environmental Management safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management 3/13/2013 The American Recovery and Reinvestment Act of 2009

368

Reimplementing the EPICS static database access library.  

SciTech Connect (OSTI)

The Static Database Access library was first introduced in EPICS (Experimental Physics and Industrial Control System) Release 3.11 in 1994. It provides an application program interface (API) for database configuration tools written in C to manipulate database record definitions and is used for various tasks within the core EPICS software. This paper describes the structure of a replacement for the original library that adds a native C++ API and will make some future enhancements to EPICS significantly easier to implement.

Johnson, A. N.; Kraimer, M. R.

2001-11-13T23:59:59.000Z

369

Low latency memory access and synchronization  

DOE Patents [OSTI]

A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

2010-10-19T23:59:59.000Z

370

Low latency memory access and synchronization  

DOE Patents [OSTI]

A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

2007-02-06T23:59:59.000Z

371

Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Limited Speed Vehicle Limited Speed Vehicle Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Google Bookmark Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Delicious Rank Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Limited Speed Vehicle Access to Roadways A limited speed vehicle is defined as a vehicle that is capable of

372

Solar/Wind Access Policy | Open Energy Information  

Open Energy Info (EERE)

Solar/Wind Access Policy Solar/Wind Access Policy < Solar Jump to: navigation, search Solar and wind access laws are designed to establish a right to install and operate a solar or wind energy system at a home or other facility. Some solar access laws also ensure a system owner's access to sunlight. These laws may be implemented at both the state and local levels. In some states, access rights prohibit homeowners associations, neighborhood covenants and local ordinances from restricting a homeowner's right to use solar energy. Easements, the most common form of solar access law, allow for the rights to existing access to a renewable resource on the part of one property owner to be secured from an owner whose property could be developed in such a way as to restrict that resource. An easement is

373

Alternative Fuels Data Center: Public Access to State Compressed Natural  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Public Access to State Public Access to State Compressed Natural Gas (CNG) Fueling Stations to someone by E-mail Share Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Facebook Tweet about Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Twitter Bookmark Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Google Bookmark Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Delicious Rank Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Digg Find More places to share Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on

374

Auctions to gas transmission access : the British experience  

E-Print Network [OSTI]

When access to monopoly owned networks is constrained auctioning access rights can increase the efficiency of allocations relative to negotiation and grandfathering when there is sufficient competition among network users. ...

McDaniel, Tanga

2002-01-01T23:59:59.000Z

375

A New Grid Security Framework with Dynamic Access Control  

Science Journals Connector (OSTI)

In this paper, a new Grid security framework based on dynamic access control is introduced to address some security problem in Grid. Based on the dynamic evaluating results about ... levels to access rights. In o...

Bing Xie; Xiaolin Gui; Yinan Li; Depei Qian

2004-01-01T23:59:59.000Z

376

An access control system for multimedia content distribution  

Science Journals Connector (OSTI)

Multimedia content distribution has appeared as a new growth market offered by network providers, defining resource access infrastructures able to support both wired and wireless accesses. Although these infrastructures have been widely studied in the ...

Manuel Snchez; Gabriel Lpez; scar Cnovas; Juan A. Snchez; Antonio F. Gmez-Skarmeta

2006-06-01T23:59:59.000Z

377

T-703: Cisco Unified Communications Manager Open Query Interface Lets  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

703: Cisco Unified Communications Manager Open Query Interface 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5 ABSTRACT: A remote user can obtain database contents, including authentication credentials. reference LINKS: SecurityTracker Alert ID: 1025971 Cisco Document ID: 113190 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents. A remote user can access an open

378

Student Brand Manager and Related Vacancies Student Information  

E-Print Network [OSTI]

The Careers Service. Student Brand Manager and Related Vacancies Student Information Context and vacancy service to current students and recent graduates of the University. While recognising it also students and graduates. Students and graduates can expect to access a range of vacancy information

Stevenson, Mark

379

MORM: A Multi-objective Optimized Replication Management strategy for cloud storage cluster  

Science Journals Connector (OSTI)

Effective data management is an important issue for a large-scale distributed environment such as data cloud. This can be achieved by using file replication, which efficiently reduces file service time and access latency, increases file availability ... Keywords: Artificial immune algorithm, Cloud storage, Multi-objective optimization, Replication management

Sai-Qin Long; Yue-Long Zhao; Wei Chen

2014-02-01T23:59:59.000Z

380

Integrating Trust into Grid Resource Management Systems Farag Azzedin and Muthucumaru Maheswaran  

E-Print Network [OSTI]

for providing security in Grid systems including sandboxing, encryption, and other access control for Grid systems and show how the model can be used to incorporate the security implications computing, resource management system, security, trust. 1. Introduction Resource management in Grid systems

Manitoba, University of

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Inferring Meta-Models for Runtime System Data from the Clients of Management APIs  

E-Print Network [OSTI]

Inferring Meta-Models for Runtime System Data from the Clients of Management APIs Hui Song1 , Gang. To do this, users have to understand the different management APIs provided by different systems to inferring such meta-models by analyzing client code that accesses man- agement APIs. A set of experiments

Paris-Sud XI, Université de

382

G:\\library-management\\Policies\\Coll_Man_PolicySept08.doc 1 University of Sussex Library  

E-Print Network [OSTI]

G:\\library-management\\Policies\\Coll_Man_PolicySept08.doc 1 University of Sussex Library Collection Management Policy 1. Introduction The University of Sussex Library contains 800,000 books, to which about 15,000 new items are added each year. The Library also provides access to over 20,000 print and online

Sussex, University of

383

Briefing, For Persons With Access to UCNI- June 2014  

Broader source: Energy.gov [DOE]

Briefing provides information on Unclassified Controlled Nuclear Information (UCNI) and for persons who have access to UCNI.

384

ibm.com/redbooks iNotes Web Access  

E-Print Network [OSTI]

environment secure Plan for capacity Front cover #12;#12;iNotes Web Access Deployment and Administration

385

Energy management  

SciTech Connect (OSTI)

In January 1990 GAO began implementing a special audit effort to help ensure that areas vulnerable to fraud, waste, abuse, and mismanagement are identified and that appropriate corrective actions are taken. This effort focuses on 16 areas, one of which is the Department of Energy's (DOE) contracting practices. As part of this effort, the authors determined if contract audits for monitoring and overseeing DOE's contracting process were being performed and that we identify the impact or potential impact to the government when contract audits were not performed. Specifically, this paper discusses audit coverage of DOE's management and operating (M and O) contractors and DOE contracts, the problems that may occur when contract audit activity is not performed, and factors that have impeded contract audit coverage.

Dingell, J.D.

1991-10-01T23:59:59.000Z

386

Microsoft Word - TIA Reply Comments DOE NBP RFI Data Access.doc  

Broader source: Energy.gov (indexed) [DOE]

26, 2010 26, 2010 US Department of Energy Office of the General Counsel 1000 Independence Avenue, SW Room 6A245 Washington, DC 20585 Re: NBP RFI-Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use and Privacy Introduction Smart grid provides consumers with unprecedented access and control of their electricity usage, and it provides utilities with the ability to manage the electric grid with significantly greater efficiency. As the end-users, TIA believes consumers will ultimately determine how successful the smart grid can become. For utility-driven smart grid solutions, utilities can only do as much as voter-accountable regulators will allow. The success of consumer-driven smart grid solutions will rest entirely on consumer value and

387

Microsoft Word - CX-Cardwell-Cowlitz2011AccessRoad_WEB.doc  

Broader source: Energy.gov (indexed) [DOE]

KEP-4 KEP-4 SUBJECT: Environmental Clearance Memorandum Rick Ross Project Manager - TELF-TPP-3 Proposed Action: Access road maintenance on or leading to the Cardwell-Cowlitz No.1, 115-kilovolt (kV) transmission line. Budget Information: Work Order #00281014 PP&A Project No.: 2020 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine maintenance activities... for...rights-of-way, infrastructures (e.g.. roads)... routine maintenance activities, corrective...are required to maintain and preserve infrastructures...in a condition suitable for the facility to be used for its designated purpose. Location: The project area consists of Bonneville Power Administration (BPA) access roads located on or leading to the Cardwell-Cowlitz No. 1, 115-kV transmission line right-of-way.

388

Microsoft Word - CX-AccessRoads-KingCoWA-FY13_WEB.doc  

Broader source: Energy.gov (indexed) [DOE]

22, 2013 22, 2013 REPLY TO ATTN OF: KEPR-Covington SUBJECT: Environmental Clearance Memorandum Rick Ross Engineer - TELF-TPP-3 Proposed Action: Covington District Culvert Replacements Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): Appendix B1.3, Routine Maintenance Location: King County, WA Proposed by: Bonneville Power Administration (BPA) Description of the Proposed Action: BPA is proposing to replace existing culverts at 12 access road stream crossings that present barriers to fish passage. These improvements will be made on BPA easement access roads within DNR owned and managed lands. BPA will make these improvements by installing new fish friendly culverts and/or bridges at each stream crossing. The current stream crossings do not meet DNR fish passage standards that will be in

389

Microsoft Word - CX-GarrisonSubstationAccessRoadImprovementFY13_WEB.doc  

Broader source: Energy.gov (indexed) [DOE]

8, 2013 8, 2013 REPLY TO ATTN OF: KEPR-Bell-1 SUBJECT: Environmental Clearance Memorandum Jonathan Malmberg Project Manager - TETQ-TPP-3 Proposed Action: Maintenance along sections of the access road leading to Bonneville Power Administration's (BPA) Garrison Substation PP&A Project No.: 2609 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine Maintenance. B1.13 Pathways, short access roads, and rail lines. Location: As identified in table below: Township Range Section County 9N 11W 14, 13, 24 Powell 9N 10W 19, 30, 20 Powell Proposed by: BPA Description of the Proposed Action: BPA proposes repairing a corrugated metal pipe end; making minor asphalt repairs; and grading, shaping, compacting, and placing road aggregate on 20,005 linear feet

390

Microsoft Word - CX-McNary-SantiamAccessRoad_WEB.doc  

Broader source: Energy.gov (indexed) [DOE]

James Semrau Project Manager - TELF-TPP-3 Proposed Action: Access road maintenance along the McNary-Santiam 230-kV and Jones Canyon-Santiam 230-kV transmission line corridors. Budget Information: WO #00292092 PP&A Project No.: 2044 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine maintenance activities... for...rights-of-way, infrastructures (e.g.. roads)... routine maintenance activities, corrective...are required to maintain and preserve infrastructures...in a condition suitable for the facility to be used for its designated purpose. Location: The project area consists of Bonneville Power Administration (BPA) access roads located on the McNary-Santiam (structure 123/1) & Jones Canyon-Santiam (structure 75/1)

391

Sustainable Campus Transportation through Transit Partnership and Transportation Demand Management: A Case Study from the University of Florida  

E-Print Network [OSTI]

A. 2005. The impacts of transportation demand management andUnlimited access. Transportation 28 (3): 233267. Cervero,transit. Journal of Public Transportation 3 (4):1019. ???.

Bond, Alex; Steiner, Ruth

2006-01-01T23:59:59.000Z

392

Integrating HCI in a Web Accessibility Engineering Approach  

Science Journals Connector (OSTI)

The treatment of Web accessibility is not only following the Web Content Accessibility Guidelines (WCAG) to strictly comply with technical aspects. The development processes of web applications are very much centred in the architecture, which are normally ... Keywords: Human Computer Interaction (HCI), Inclusive Design, User Centred-Design (UCD), Web accessibility, Web engineering methods, usability

Lourdes Moreno; Paloma Martnez; Beln Ruiz-Mezcua

2009-07-01T23:59:59.000Z

393

Competitive Interference-aware Spectrum Access in Cognitive Radio Networks  

E-Print Network [OSTI]

Competitive Interference-aware Spectrum Access in Cognitive Radio Networks Jocelyne Elias, Fabio studies the spectrum access problem in cognitive radio networks from a game theoretical perspective. Finally, we provide numerical results of the proposed spectrum access game in several cognitive radio

Boyer, Edmond

394

Cooperation and Learning in Multiuser Opportunistic Spectrum Access  

E-Print Network [OSTI]

for the efficient utilization of the radio frequency spectrum is opportunistic spectrum access (OSA), whereCooperation and Learning in Multiuser Opportunistic Spectrum Access Hua Liu§ , Bhaskar spectrum access net- work where spectrum opportunities are time varying and spatially inhomogeneous

Islam, M. Saif

395

MAP: Multiauctioneer Progressive Auction for Dynamic Spectrum Access  

E-Print Network [OSTI]

to access the licensed spectrum, and dynamic spectrum access (DSA) is one of the fundamental functions of CR solution according to the length of step. Index Terms--Cognitive radio, dynamic spectrum access, auction from scarcity in spectrum resource and inefficiency in spectrum usage. Cognitive radio (CR) or dynamic

Wang, Xinbing

396

Measuring Accessibility by Automobile Report # 11 in the series  

E-Print Network [OSTI]

Measuring Accessibility by Automobile Report # 11 in the series Access to Destinations Study Report by Automobile March 2010 6. 7. Author(s) 8. Performing Organization Report No. David Levinson, Bernadette Marion measures for the Twin Cities region that measure accessibility by the automobile mode over the period from

Levinson, David M.

397

CREDIT MARKET ACCESS AND PROFITABILITY IN TUNISIAN AGRICULTURE  

E-Print Network [OSTI]

CREDIT MARKET ACCESS AND PROFITABILITY IN TUNISIAN AGRICULTURE Abstract This work develops an econometric model that links credit access with agricultural profitability and investment. Using data. Econometric estimates are run for agricultural investment and profitability as a function of credit access

Foltz, Jeremy D.

398

Accessibility at early stages: insights from the designer perspective  

Science Journals Connector (OSTI)

Usually, a huge number of tools and proposals help developers assess Accessibility of Web applications; however, looking from the designer perspective, there is no such a similar situation. It seems that creating accessible Web sites is more expensive ... Keywords: accessibility early design, aspect-oriented design, user interface models, web engineering

Adriana Martn; Alejandra Cechich; Gustavo Rossi

2011-03-01T23:59:59.000Z

399

TRBAC: A temporal role-based access control model  

Science Journals Connector (OSTI)

Role-based access control (RBAC) models are receiving increasing attention as a generalized approach to access control. Roles may be available to users at certain time periods, and unavailable at others. Moreover, there can be temporal dependencies among ... Keywords: Role triggers, role-based access control, temporal constraints

Elisa Bertino; Piero Andrea Bonatti; Elena Ferrari

2001-08-01T23:59:59.000Z

400

XML ACCESS CONTROL SYSTEMS: A COMPONENT-BASED APPROACH  

E-Print Network [OSTI]

the characteristics of XML documents, allowing the definition of access control policies that operate with a fine to the integration of the access control system with Web based systems. #12;The analysis contained in this paperCHAPTER 4 XML ACCESS CONTROL SYSTEMS: A COMPONENT-BASED APPROACH E. Damiani1 S. De Capitani di

Samarati, Pierangela

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Pipelined Memory Controllers for DSP Applications Handling Unpredictable Data Accesses  

E-Print Network [OSTI]

Pipelined Memory Controllers for DSP Applications Handling Unpredictable Data Accesses Bertrand Le pipelined memory access controllers can be generated improving the pipeline access mode to RAM. We focus as unpredictable ones (dynamic address computations) in a pipeline way. 1 Introduction Actual researches

Paris-Sud XI, Université de

402

JGI - Data Management Policy, Practices & Resources  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Data Management Policy, Practices & Resources Data Management Policy, Practices & Resources Data Management Policy In keeping with its role as a federally-funded User Facility, it is the DOE JGI's explicit policy to make the data it produces during the conduct of user projects (primarily but not exclusively its Community Sequencing Program, CSP) available to the broad scientific community as rapidly as possible and in accordance with DOE Office of Science policies. The DOE JGI serves raw and processed data to users through its individual genome project data portals (accessed through the Project List, http://genome.jgi.doe.gov/) as well as its several comparative genomics platforms (Phytozome, MycoCosm and IMG). The DOE JGI provides permanent local archiving of these data in addition to depositing raw data,

403

Overview - Data Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Help > Data Management Help > Data Management Data Management for Data Providers Click an arrow to follow the data management path of a data set from planning to curation. plan Overview plan Plan manage Manage archive Archive curation DAAC Curation Data Management Overview Plan Manage Archive DAAC Curation Related Links DAAC Help Best Practices PDF Workshops DataONE ESIP Data Management Overview Welcome to the data management pages for data providers to the ORNL Distributed Active Archive (DAAC). These pages provide an overview of data management planning and preparation and offer practical methods to successfully share and archive your data. Plan - write a short data management plan while preparing your research proposal, Manage - assign logical, descriptive file names, define the contents of your data files, and use consistent data values when preparing

404

FIRE MANAGEMENT PLAN MONTAGUE PLAIN  

E-Print Network [OSTI]

FIRE MANAGEMENT PLAN FOR MONTAGUE PLAIN WILDLIFE MANAGEMENT AREA #12;Fire Management Plan for Montague Plain Wildlife Management Area prepared for Massachusetts Dept. of Fisheries, Wildlife. 2003. Fire Management Plan for Montague Plain Wildlife Management Area. Department of Natural Resources

Schweik, Charles M.

405

AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND My signature on the "Mobile Technology Access and Payment Option Request"  

E-Print Network [OSTI]

AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

Oregon, University of

406

The Energy Access Situation in Developing Countries | Open Energy  

Open Energy Info (EERE)

Energy Access Situation in Developing Countries Energy Access Situation in Developing Countries Jump to: navigation, search Tool Summary Name: The Energy Access Situation in Developing Countries Agency/Company /Organization: World Health Organization (WHO), United Nations Development Programme (UNDP) Sector: Energy Focus Area: Renewable Energy, Biomass, Energy Efficiency Topics: Co-benefits assessment, - Energy Access, - Health Resource Type: Presentation, Technical report User Interface: Website Website: www.who.int/indoorair/publications/energyaccesssituation/en/index.html Cost: Free A Review focusing on the Least Developed Countries and Sub-Saharan Africa The "Energy Access Situation in Developing Countries - A Review focusing on the Least Developed Countries and Sub-Saharan Africa" report draws

407

Open Access: From Myth to Paradox  

ScienceCinema (OSTI)

True open access to scientific publications not only gives readers the possibility to read articles without paying subscription, but also makes the material available for automated ingestion and harvesting by 3rd parties. Once articles and associated data become universally treatable as computable objects, openly available to 3rd party aggregators and value-added services, what new services can we expect, and how will they change the way that researchers interact with their scholarly communications infrastructure? I will discuss straightforward applications of existing ideas and services, including citation analysis, collaborative filtering, external database linkages, interoperability, and other forms of automated markup, and speculate on the sociology of the next generation of users.

Paul Ginsparg

2010-01-08T23:59:59.000Z

408

Mozambique-Biofuels, Land Access and Rural Livelihoods | Open Energy  

Open Energy Info (EERE)

Biofuels, Land Access and Rural Livelihoods Biofuels, Land Access and Rural Livelihoods Jump to: navigation, search Name Mozambique-Biofuels, Land Access and Rural Livelihoods Agency/Company /Organization International Institute for Environment and Development Sector Energy, Land Focus Area Biomass, - Biofuels, Forestry, Agriculture Topics Implementation, Co-benefits assessment, - Energy Access, Resource assessment, Background analysis Resource Type Publications, Case studies/examples Website http://www.iied.org/pubs/pdfs/ Country Mozambique UN Region Eastern Africa References Mozambique-Biofuels, Land Access and Rural Livelihoods[1] Mozambique-Biofuels, Land Access and Rural Livelihoods Screenshot Background "This report documents how the spread of biofuels is affecting land access for poorer groups in Mozambique, and what actions are being taken,

409

Access to Climate Change Technology by Developing Countries | Open Energy  

Open Energy Info (EERE)

Access to Climate Change Technology by Developing Countries Access to Climate Change Technology by Developing Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Access to Climate Change Technology by Developing Countries Agency/Company /Organization: International Centre for Trade and Sustainable Development Sector: Energy, Land Focus Area: Renewable Energy Topics: Finance, Implementation Resource Type: Publications, Guide/manual Website: ictsd.org/downloads/2009/11/access-to-climate-change-technology-by-dev Access to Climate Change Technology by Developing Countries Screenshot References: Developing Country-Access to CC Tech[1] "The paper critically examines various approaches that have been suggested for achieving greater access to climate change technology by developing countries, including compulsory licensing, patent pools, patent databases

410

City of Boulder - Solar Access Ordinance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Access Ordinance Access Ordinance City of Boulder - Solar Access Ordinance < Back Eligibility Construction Residential Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Buying & Making Electricity Water Heating Program Info State Colorado Program Type Solar/Wind Access Policy Provider City of Boulder The City of Boulder's solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted shading by new construction. A solar access permit is available to those who have installed or who plan to install a solar energy system and need more protection than is provided by the ordinance. For new developments, all units which are not planned to

411

UN-Energy-Measuring Energy Access | Open Energy Information  

Open Energy Info (EERE)

UN-Energy-Measuring Energy Access UN-Energy-Measuring Energy Access Jump to: navigation, search Tool Summary LAUNCH TOOL Name: UN-Energy-Measuring Energy Access Agency/Company /Organization: United Nations Energy Knowledge Network (UN-Energy) Sector: Energy Focus Area: Renewable Energy, Non-renewable Energy Topics: Co-benefits assessment, - Energy Access Resource Type: Dataset, Maps Website: www.un-energy.org/measuring-energy-access Cost: Free Language: English UN-Energy-Measuring Energy Access Screenshot References: UN-Energy-Measuring Energy Access[1] "A reliable and comprehensive information base is necessary to inform target-setting and to monitor outcomes. Openly available and visually attractive information presentation can support the design of innovative policies and measures, and underpin detailed analysis. UN-Energy, the

412

Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Alternative Fuel Alternative Fuel Vehicle (AFV) Access to Tunnels to someone by E-mail Share Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Facebook Tweet about Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Twitter Bookmark Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Google Bookmark Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Delicious Rank Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Digg Find More places to share Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

413

Waste Management | Department of Energy  

Energy Savers [EERE]

Management Waste Management Oak Ridge has an onsite CERCLA disposal facility, the Environmental Management Waste Management Facility, that reduces cleanup and transportation costs....

414

Load Management for Industry  

E-Print Network [OSTI]

In the electric utility industry, load management provides the opportunity to control customer loads to beneficially alter a utility's load curve Load management alternatives are covered. Load management methods can be broadly classified into four...

Konsevick, W. J., Jr.

1982-01-01T23:59:59.000Z

415

Department of Energy Announces Funding to Help Consumers Better Manage  

Broader source: Energy.gov (indexed) [DOE]

Department of Energy Announces Funding to Help Consumers Better Department of Energy Announces Funding to Help Consumers Better Manage Their Energy Consumption Department of Energy Announces Funding to Help Consumers Better Manage Their Energy Consumption November 8, 2011 - 1:57pm Addthis Washington, D.C. - As part of the Administration's commitment to ensuring a clean energy future, U.S. Energy Secretary Steven Chu today announced that up to $8 million in funding will be made available to encourage utilities, local governments, and communities to create programs that empower consumers to better manage their electricity use through improved access to their own electricity consumption data. Under the "Smart Grid Data Access" Funding Opportunity Announcement (FOA), local communities will be able to partner with utilities and third-party

416

Department of Energy Announces Funding to Help Consumers Better Manage  

Broader source: Energy.gov (indexed) [DOE]

Department of Energy Announces Funding to Help Consumers Better Department of Energy Announces Funding to Help Consumers Better Manage Their Energy Consumption Department of Energy Announces Funding to Help Consumers Better Manage Their Energy Consumption November 8, 2011 - 1:57pm Addthis Washington, D.C. - As part of the Administration's commitment to ensuring a clean energy future, U.S. Energy Secretary Steven Chu today announced that up to $8 million in funding will be made available to encourage utilities, local governments, and communities to create programs that empower consumers to better manage their electricity use through improved access to their own electricity consumption data. Under the "Smart Grid Data Access" Funding Opportunity Announcement (FOA), local communities will be able to partner with utilities and third-party

417

Managing a manufacturing company in a wired world  

Science Journals Connector (OSTI)

Under new conditions of unlimited access to information technology, the management of a manufacturing company will be changed to take advantage of new capabilities based on internet, intranet and computing and simulation technologies. A conceptual model of management system, applicable in small and medium size manufacturing companies (SMEs), has been developed. It integrates physical, information and knowledge value chains. Based on this concept, a managerial ''dashboard'' is proposed as a tool allowing a manager to access information from sources inside and outside the company, to check financial/economic conditions and to simulate alternative courses of actions. The tool operates as a hypertext system and includes modules representing the internal operations of company and its interfaces with suppliers and knowledge providers. It also includes a microworlds simulation module and a module of return-on-investment analysis.

A.B. Jambekar; K.I. Pelc

2002-01-01T23:59:59.000Z

418

Disk Space Quota Management | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Account Information Accounts and Access FAQ Connect & Log In Using CRYPTOCards SSH Keys on Surveyor Disk Space Quota Management Allocations Decommissioning of BG/P Systems and Resources Blue Gene/Q Versus Blue Gene/P Mira/Cetus/Vesta Intrepid/Challenger/Surveyor Tukey Eureka / Gadzooks Policies Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] Disk Space Quota Management As you manage your project's disk space quota, it's important to remember that users you approve as to be added as project members are also added to the project's Unix Group. Unix Group members have the ability to write to the project directory and to access project data. You can manually add or remove Unix

419

Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

2004-02-19T23:59:59.000Z

420

The NORM technology connection web site : streamlined access to NORM-related service company and regulatory information.  

SciTech Connect (OSTI)

Argonne National Laboratory has developed an Internet web site providing access to critical information needed to support decisions on the management and disposal of wastes containing naturally occurring radioactive material (NORM). The NORM Technology Connection web site provides current information on (1) service companies that provide support on NORM issues (e.g., site characterization and remediation, sample analysis, radiation safety training, disposal) and (2) existing applicable NORM regulations and guidelines. A third element of the site is an electronic mail list that allows users to post or respond to questions about the management of NORM. Development of the NORM Technology Connection web site was funded by the U.S. Department of Energy, Office of Fossil Energy. It is hosted and maintained by the Interstate Oil and Gas Compact Commission. The web site is publicly available; access is free, as is participation by any of the service companies.

Smith, K. P.; Richmond, P.; LePoire, D. J.; Arnish, J. J.; Johnson, R.

2000-11-08T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Federal Energy Management Program: Operations and Maintenance Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Management Support to someone by E-mail Management Support to someone by E-mail Share Federal Energy Management Program: Operations and Maintenance Management Support on Facebook Tweet about Federal Energy Management Program: Operations and Maintenance Management Support on Twitter Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Google Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Delicious Rank Federal Energy Management Program: Operations and Maintenance Management Support on Digg Find More places to share Federal Energy Management Program: Operations and Maintenance Management Support on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

422

Records Management Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Records Management Specialist in the Richland Operations Office (RL), Assistant Manager for Mission Support (AMMS), Infrastructure, Services...

423

Renae Speck Commercialization Manager  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Manager Renae Speck, Ph.D is a Commercialization Manager in the Office of Technology Transfer in the Partnership Directorate at the United States Department of Energy's Oak...

424

Workforce Management Office  

Office of Energy Efficiency and Renewable Energy (EERE)

The Workforce Management Office provides leadership, policy guidance, and technical advice to Office of Energy Efficiency and Renewable Energy (EERE) managers, supervisors, and employees on a broad...

425

Contract/Project Management  

Energy Savers [EERE]

1 st Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

426

Contract/Project Management  

Broader source: Energy.gov (indexed) [DOE]

3 First Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2013 Target FY 2013 Final FY...

427

Project Management Methodology  

Broader source: Energy.gov [DOE]

The Project Management Coordination Office (PMCO) provides the tools and guidance necessary to ensure consistent and effective management oversight of performer performance and consolidated...

428

Project Management Coordination Office  

Broader source: Energy.gov [DOE]

The Project Management Coordination Office (PMCO) provides guidance, leadership, training, and tools to Office of Energy Efficiency and Renewable Energy (EERE) management and the field in the area...

429

Stormwater Management Program (Pennsylvania)  

Broader source: Energy.gov [DOE]

Stormwater Management program of the Department of Environmental Protection's Bureau of Conservation and Restoration administers the rules and regulations for stormwater management for Pennsylvania...

430

Management of Nuclear Materials  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

2009-08-17T23:59:59.000Z

431

PUBLIC ACCESS: 955 LEnfant Plaza North, SW, Suite 1500, Washington, DC  

Broader source: Energy.gov (indexed) [DOE]

th th Meeting Unconventional Resources Technology Advisory Committee July 14, 2009 1:00 p.m. EASTERN WebEx/Conference Call Meeting PUBLIC ACCESS: 955 L'Enfant Plaza North, SW, Suite 1500, Washington, DC AGENDA 12:30 Registration; Begin call in to 800-number and login to WebEx Members, Chair, Designated Federal Officer, and Committee Manager 1:00 Call to Order - Welcome Chris Hall, Committee Chair Member Roll Call and the presence of a quorum Elena Melchert Committee Manager Meeting purpose and review of the agenda; Insights regarding future funding and other pending legislation; Draft 2010 Annual Plan delivery, and pending meetings in September and October 2009 Guido DeHoratiis Designated Federal Officer 1:25 Report from the Standing Subcommittee and

432

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational services such as user authentication and access, central file  

E-Print Network [OSTI]

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational the university's NET domain. Domains provide user authentication, access, and management to resources divide the transition plan, and each phase has goals and a deadline. The overall goal is to continue

Wu, Shin-Tson

433

PROJECT MANAGEMENT PLANS Project Management Plans  

Broader source: Energy.gov (indexed) [DOE]

MANAGEMENT PLANS MANAGEMENT PLANS Project Management Plans  Overview  Project Management Plan Suggested Outline Subjects  Crosswalk between the Suggested PMP Outline Subjects and a Listing of Project Planning Elements  Elements of Deactivation Project Planning  Examples From Project Management Plans Overview The purpose here is to assist project managers and project planners in creating a project plan by providing examples and pointing to information that have been successfully used by others in the past. Section 4.2 of DOE Guide 430.1-3, DEACTIVATION IMPLEMENTATION GUIDE discusses the content and purpose of deactivation project management plans. It is presented as a suggested outline followed by other potential subjects. For the convenience of readers, that information is repeated below.

434

Federal Energy Management Program: Energy Management Requirements by Law  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Management Energy Management Requirements by Law and Regulation to someone by E-mail Share Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Facebook Tweet about Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Twitter Bookmark Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Google Bookmark Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Delicious Rank Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Digg Find More places to share Federal Energy Management Program: Energy Management Requirements by Law and Regulation on AddThis.com... Requirements by Subject Requirements by Regulation

435

Access Energy Coop | Open Energy Information  

Open Energy Info (EERE)

Coop Coop Jump to: navigation, search Name Access Energy Coop Place Iowa Utility Id 16611 Utility Location Yes Ownership C NERC Location SERC NERC SERC Yes ISO Other Yes Activity Distribution Yes Alt Fuel Vehicle Yes Alt Fuel Vehicle2 Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Interruptible Large Power Rate* Industrial Large Commercial Rate Commercial Large Power Rate Schedule Industrial Residential Single Phase Rate Residential Security Lights HPS 100 W Lighting Security Lights HPS 1000 W Lighting Security Lights HPS 250 W Lighting Security Lights HPS 400 W Lighting

436

Direct memory access transfer completion notification  

DOE Patents [OSTI]

Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN); Steinmacher-Burow, Burkhard D. (Esslingen, DE); Vranas, Pavlos (Danville, CA)

2010-07-27T23:59:59.000Z

437

Remote direct memory access over datagrams  

DOE Patents [OSTI]

A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

2014-12-02T23:59:59.000Z

438

EMPLOYEE FUEL ACCESS APPLICATION Use this application to request access for employees to use the campus service stations in conjunction with a fuel  

E-Print Network [OSTI]

EMPLOYEE FUEL ACCESS APPLICATION Use this application to request access for employees to use the campus service stations in conjunction with a fuel access device. In order to obtain fuel from for access. Employee access is not required for the U-M fleet vehicle equipped with an automated fuel device

Kirschner, Denise

439

Chemical Management Contacts  

Broader source: Energy.gov [DOE]

Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

440

telecommunications system management  

Science Journals Connector (OSTI)

Communications system management applied to telecommunications systems, facilities, equipment, and components. See communications system , comm...

2001-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Career Map: Engineering Manager  

Broader source: Energy.gov [DOE]

The Wind Program's Career Map provides job description information for Engineering Manager positions.

442

PRC Contract Management Plan  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contract Management Team Members, Including Roles and Responsibilities ... 3 Contracting Officer ......

443

Environmental Best Management Practices  

E-Print Network [OSTI]

Environmental Best Management Practices for Virginia's Golf Courses Prepared by Virginia Golf Course Superintendents Association #12;#12;EnvironmEntal BEst managEmEnt PracticEs for virginia's golf III I am pleased to endorse the Environmental Best Management Practices for Virginia's Golf Courses

Liskiewicz, Maciej

444

Adjudicative Guidelines for Determining Eligibility for Access to  

Broader source: Energy.gov (indexed) [DOE]

Adjudicative Guidelines for Determining Eligibility for Access to Adjudicative Guidelines for Determining Eligibility for Access to Classified Information Adjudicative Guidelines for Determining Eligibility for Access to Classified Information Introduction. The following adjudicative guidelines are established for all U.S. government civilian and military personnel, consultants, contractors, employees of contractors, licensees, certificate holders or grantees and their employees and other individuals who require access to classified information. They apply to persons being considered for initial or continued eligibility for access to classified information, to include sensitive compartmented information and special access programs, and are to be used by government departments and agencies in all final clearance determinations. Government departments and agencies may also choose to

445

Definition: Open Access Same Time Information Service | Open Energy  

Open Energy Info (EERE)

Access Same Time Information Service Access Same Time Information Service Jump to: navigation, search Dictionary.png Open Access Same Time Information Service An electronic posting system that the Transmission Service Provider maintains for transmission access data and that allows all transmission customers to view the data simultaneously.[1] View on Wikipedia Wikipedia Definition Also Known As Open Access Same-Time Information System (OASIS) Related Terms transmission lines, transmission Service Provider, system, electricity generation, transmission line References ↑ Glossary of Terms Used in Reliability Standards An inli LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ne Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Open_Access_Same_Time_Information_Service&oldid=480308"

446

Overview of Access Authorization Process for Applicants, May, 2013 |  

Broader source: Energy.gov (indexed) [DOE]

Overview of Access Authorization Process for Applicants, May, 2013 Overview of Access Authorization Process for Applicants, May, 2013 Overview of Access Authorization Process for Applicants, May, 2013 May, 2013 This overview will help individuals new to the process understand what it means to obtain and maintain a Department of Energy (DOE) security clearance or access authorization This overview will help individuals new to the process understand what it means to obtain and maintain a Department of Energy (DOE) security clearance or access authorization. You are a part of a select group of individuals who are being considered for access to classified information maintained by DOE. As you know, the protection of classified information is very important to our national security. Generally, classified information is official information or material that requires protection in

447

Using Microfinance to Expand Access to Energy Services | Open Energy  

Open Energy Info (EERE)

Using Microfinance to Expand Access to Energy Services Using Microfinance to Expand Access to Energy Services Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Using Microfinance to Expand Access to Energy Services Agency/Company /Organization: United States Agency for International Development Sector: Energy Focus Area: Renewable Energy Topics: Co-benefits assessment, - Energy Access, Finance Resource Type: Case studies/examples, Lessons learned/best practices, Publications Website: waterwiki.net/images/6/65/File_Energy_Summary_FINAL.pdf Language: English References: Using Microfinance to Expand Access to Energy Services[1] Logo: Using Microfinance to Expand Access to Energy Services "To carry out this research, SES and the SEEP Network invited MFIs in Africa, Asia, Latin America and the Caribbean (LAC) to participate in an

448

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix Access Gateway Unspecified Security Bypass 6: Citrix Access Gateway Unspecified Security Bypass Vulnerability V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway PLATFORM: Standard Edition 5.0.x prior to 5.0.4.223524. Versions 4.5.x and 4.6.x are not affected by this vulnerability ABSTRACT: A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA52479 Security Tracker Alert ID 1028255 com/id/1028255 CVE-2013-2263 Citrix Knowledge Center IMPACT ASSESSMENT: High DISCUSSION: The vulnerability could allow an unauthenticated user to gain access to network resources. IMPACT:

449

IEA-Electricity Access Database | Open Energy Information  

Open Energy Info (EERE)

IEA-Electricity Access Database IEA-Electricity Access Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: IEA-Electricity Access Database Agency/Company /Organization: International Energy Agency (IEA) Topics: Co-benefits assessment, - Energy Access Resource Type: Dataset Website: www.iea.org/weo/electricity.asp Language: English IEA-Electricity Access Database Screenshot References: Electricity Access Database[1] "In a continuing effort to improve our understanding of the electrification process, we have updated, for the fifth time, the database on electrification rates that we first built for WEO-2002. The database shows detailed data on urban and rural electrification collected from industry, national surveys and international sources. Based on this updated analysis,

450

Measuring Energy Access: Supporting a Global Target | Open Energy  

Open Energy Info (EERE)

Measuring Energy Access: Supporting a Global Target Measuring Energy Access: Supporting a Global Target Jump to: navigation, search Tool Summary Name: Measuring Energy Access: Supporting a Global Target Agency/Company /Organization: Columbia University Sector: Energy Focus Area: Renewable Energy, Non-renewable Energy Topics: Co-benefits assessment, - Energy Access Resource Type: Publications Website: www.unido.org/fileadmin/user_media/Services/Energy_and_Climate_Change/ Cost: Free Language: English References: Measuring Energy Access: Supporting a Global Target[1] "This paper first describes the relevant context, definitions, data, and links to national policies and energy planning. Section 2 reviews relevant development and energy metrics. Several options for measuring energy access are then presented in section 3. Finally, Section 4 offers thoughts on

451

OpenEI:Utility data access map | Open Energy Information  

Open Energy Info (EERE)

Utility data access map Utility data access map Jump to: navigation, search Ret Utility Data Access Map Having access to your electricity use data is a very important step in understanding your overall energy usage. Comparing historical data to your current usage is one way to see trends and determine ways for reducing electricity costs and improving overall efficiency. We asked all U.S. electric utility companies to tell us how accessible their electricity use data is for both residential and commercial customers. The results are updated live based on the responses we have to date. As more utilities provide information, the utility boundaries will be automatically colored and the overall map will become more complete. Try searching for your utility company to see your electricity data access options.

452

Automotive Accessibility and Efficiency Meet in the Innovative MV-1 |  

Broader source: Energy.gov (indexed) [DOE]

Automotive Accessibility and Efficiency Meet in the Innovative MV-1 Automotive Accessibility and Efficiency Meet in the Innovative MV-1 Automotive Accessibility and Efficiency Meet in the Innovative MV-1 March 11, 2011 - 4:03pm Addthis The MV-1, a new wheelchair accessible, fuel-efficient vehicle | Photo Courtesy of Vehicle Production Group The MV-1, a new wheelchair accessible, fuel-efficient vehicle | Photo Courtesy of Vehicle Production Group Daniel B. Poneman Daniel B. Poneman Deputy Secretary of Energy Yesterday, the Department of Energy announced that we've now finalized a loan for nearly $50 million to the Vehicle Production Group - or VPG. The project will support the development and manufacturing of a new wheelchair accessible, fuel-efficient car, the MV-1, that will run on compressed natural gas instead of gasoline, produce low emissions, and create 900 jobs

453

LPP Risk Management Plan  

Broader source: Energy.gov (indexed) [DOE]

History and Process History and Process Slide 2 M E Environmental Management Environmental Management History ◦ Current Baseline Process Overview ◦ Identification ◦ Simulation ◦ Management Successes & Challenges Slide 3 M E Environmental Management Environmental Management Current Baseline Risks ◦ 1 Week Risk Summit held week of August 4 th , 2008 Broad representation from all levels of Isotek, DOE, PTC, and outside consultants Focused on risk and opportunity identification Included risk description, assumptions, and triggers No quantification or analysis No restrictions, constraints, or filtering HQ provided facilitator Prescribed format and capture methodology Slide 4 M E Environmental Management Environmental Management Current Baseline Risks ◦ Risk Summit Results

454

Environmental Management System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Management System Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts of those activities, prioritizing improvements, and measuring results. May 30, 2012 The continuous improvement cycle Our Environmental Management System encourages continuous improvement of our environmental performance. Contact Environmental Communication & Public Involvement P.O. Box 1663 MS M996 Los Alamos, NM 87545 (505) 667-0216 Email Managing our effects on the environment We are committed to protecting the environment while conducting our national security and energy-related missions. Laboratory Environmental Governing Policy What is the Environmental Management System? It covers every program in the Laboratory

455

Office of Resource Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Resource Management Resource Management Home Sub Offices › Business Operations › Information Management › Human Resources and Administration Mission and Functions HSS Standard Operating Practices (For Internal Users Only) HSS Subject Matter Experts and Functional Points of Contacts Contact Us HSS Logo Office of Resource Management Direct Report to the Chief Health, Safety and Security Officer Mission and Functions Mission The Office of Resource Management supports the infrastructure of the Office of Health, Safety and Security (HSS) by providing balanced, unbiased, technically competent, and customer focused services in the areas of: (1) Financial Management, including budget formulation and execution; (2) Procurement Management, including contract and credit card programs; (3) Information Management, including technology-based solutions and programs; (4) Quality Assurance; (5) Human Resources, including recruitment and retention programs; (6) Administrative Services, including property management, travel, and work space management; and; (7) Strategic and Program Planning including performance and efficiency measures.

456

Symmetrical Multilevel Diversity Coding with an All-Access Encoder  

E-Print Network [OSTI]

and L randomly accessible en- coders 1 to L. A total of L + 1 independent discrete memoryless sources (S0, S1, . . . , SL) are to be encoded at the encoders. The decoder, which has access to encoder 0 and a subset U of the ran- domly accessible... with polyhedral cone being the first quadrant and L + 2 faces. . . . . . . . . . . . . . 24 3 An illustration of the sliding windows of length ? when the in- tegers 1, . . . , L are circularly placed (clockwise) based on their natural order...

Marukala, Neeharika

2012-07-16T23:59:59.000Z

457

DOE Announces Nearly $3.2 Million to Help Consumers Better Manage Their  

Broader source: Energy.gov (indexed) [DOE]

DOE Announces Nearly $3.2 Million to Help Consumers Better Manage DOE Announces Nearly $3.2 Million to Help Consumers Better Manage Their Energy Consumption DOE Announces Nearly $3.2 Million to Help Consumers Better Manage Their Energy Consumption May 22, 2012 - 2:12pm Addthis Department of Energy Announces Nearly $3.2 Million to Help Consumers Better Manage Their Energy Consumption Smart Grid Data Access Awards Will Demonstrate How Consumers and Communities Can Benefit from Better Energy Information The Department of Energy announced phase I awards totaling nearly $3.2 million that will encourage utilities, local governments, and communities to create programs that empower consumers to better manage their electricity use through improved access to their own electricity consumption data. These projects will complement the Apps for Energy

458

DOE Announces Nearly $3.2 Million to Help Consumers Better Manage Their  

Broader source: Energy.gov (indexed) [DOE]

DOE Announces Nearly $3.2 Million to Help Consumers Better Manage DOE Announces Nearly $3.2 Million to Help Consumers Better Manage Their Energy Consumption DOE Announces Nearly $3.2 Million to Help Consumers Better Manage Their Energy Consumption May 22, 2012 - 2:12pm Addthis Department of Energy Announces Nearly $3.2 Million to Help Consumers Better Manage Their Energy Consumption Smart Grid Data Access Awards Will Demonstrate How Consumers and Communities Can Benefit from Better Energy Information The Department of Energy announced phase I awards totaling nearly $3.2 million that will encourage utilities, local governments, and communities to create programs that empower consumers to better manage their electricity use through improved access to their own electricity consumption data. These projects will complement the Apps for Energy

459

Adjudicative Guidelines for Determining Eligibility for Access to Classified Information  

Broader source: Energy.gov (indexed) [DOE]

Adjudicative Guidelines for Determining Eligibility for Adjudicative Guidelines for Determining Eligibility for Access to Classified Information 1. Introduction. The following adjudicative guidelines are established for all U.S. government civilian and military personnel, consultants, contractors, employees of contractors, licensees, certificate holders or grantees and their employees and other individuals who require access to classified information. They apply to persons being considered for initial or continued eligibility for access to classified information, to include sensitive compartmented information and special access programs, and are to be used by government departments and agencies in all final clearance determinations. Government departments and agencies may also choose to apply these

460

Phase II Smart Grid Data Access Funding Opportunity Winner Announced  

Broader source: Energy.gov [DOE]

The Energy Department announced on December 19 that San Diego Gas & Electric has won the second phase of the Smart Grid Data Access funding opportunity.

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Colorado - Access Permit Pre-Design Checklist | Open Energy Informatio...  

Open Energy Info (EERE)

Checklist Jump to: navigation, search OpenEI Reference LibraryAdd to library General: Colorado - Access Permit Pre-Design Checklist Author Colorado Department of Transportation...

462

Republic of Yemen Energy Access Project | Open Energy Information  

Open Energy Info (EERE)

of Yemen Energy Access Project Location of project Yemen Year initiated 2006 Organization World Bank Website http:documents.worldbank.org Coordinates 15.552727, 48.516388...

463

RAPID/BulkTransmission/Land Access | Open Energy Information  

Open Energy Info (EERE)

Information Desktop Toolkit BETA RAPID Toolkit About Bulk Transmission Geothermal Solar Tools Contribute Contact Us RAPID Bulk Transmission Land Access Regulatory...

464

Health care access, utilization and barriers among injection drug users.  

E-Print Network [OSTI]

?? Background: To curb the transmission of HIV/AIDS and other infectious diseases several studies indicate the need for improved access to medical care for injection (more)

Oche, Ishaka

2015-01-01T23:59:59.000Z

465

CDOT - State Highway Access Permit Application | Open Energy...  

Open Energy Info (EERE)

CDOT - State Highway Access Permit Application Author Colorado Department of Transportation Published Colorado Department of Transportation, 2010 DOI Not Provided Check for...

466

Montana - Access Road Easement Policy | Open Energy Information  

Open Energy Info (EERE)

General: Montana - Access Road Easement Policy Author Montana Department of Transportation Published Montana Department of Transportation, 2006 DOI Not Provided Check for...

467

RAPID/Solar/Land Access | Open Energy Information  

Open Energy Info (EERE)

RAPIDSolarLand Access < RAPID | Solar(Redirected from RAPIDSolarLeasing) Jump to: navigation, search RAPID Regulatory and Permitting Information Desktop Toolkit BETA RAPID...

468

NBP RFI: Data Access Honeywell Responses To Request for Information...  

Broader source: Energy.gov (indexed) [DOE]

Access Honeywell Responses To Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid:...

469

Accessing Low-Cost Capital Through Securitization (Poster), NREL...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cost, time to access capital 3 Yr. DOE Award: Advanced Financing to Achieve SunShot Promote adoption by developers, financiers, law firms, etc. Organize the industry...

470

Private research and public access must go together, says Mayor  

Science Journals Connector (OSTI)

... this month will be how to defend public access to scientific knowledge while benefiting from private investment in research, says Federico Mayor, the director-general of Unesco. ...

1999-06-17T23:59:59.000Z

471

Effect of memory access and caching on high performance computing.  

E-Print Network [OSTI]

??High-performance computing is often limited by memory access. As speeds increase, processors are often waiting on data transfers to and from memory. Classic memory controllers (more)

Groening, James

2012-01-01T23:59:59.000Z

472

Tri-Party Agreement databases, access mechanism and procedures  

SciTech Connect (OSTI)

This document contains the information required for the Washington State Department of Ecology (Ecology) and the US Environmental Protection Agency (EPA) to access databases related to the Hanford Federal Facility Agreement and Consent Order [also known as the Tri-Party Agreement (TPA)] (Ecology et al. 1992). It identifies the procedure required to obtain access to the Hanford computer networks and the TPA related databases. It addresses security requirements, access methods, database availability dates, database access procedures, and the minimum computer hardware and software configurations required to operate within the Hanford networks.

Brulotte, P.J.; Christensen, K.C.

1993-10-01T23:59:59.000Z

473

Accessing Low-Cost Capital Through Securitization (Poster)  

SciTech Connect (OSTI)

Poster for Solar Power International conference presents information on NREL's effort to open capital markets through securitization via Solar Access to Public Capital (SAPC) working group's efforts.

Mendelsohn, M.

2014-10-01T23:59:59.000Z

474

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network [OSTI]

of surreptitious forwarding. The IETF S/MIME protocol, which can be used to secure email, includes an Authenticated

475

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network [OSTI]

. Related concepts to deniable authentication are plausible deniability and prevention of surreptitious

476

Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs  

E-Print Network [OSTI]

.Patel,Arvinderpal.Wander,Hans.Eberle, Sheueling.Chang}@sun.com http://www.research.sun.com/projects/crypto Abstract. Strong public

Han, Richard Y.

477

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Broader source: Energy.gov (indexed) [DOE]

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

478

A Distributed Metadata Management, Data Discovery and Access System Giriprakash Palanisamy1  

E-Print Network [OSTI]

development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury. Mercury has been used by various scientific projects that are funded by NASA, USGS and DOE (ORNL DAAC, Dublin- Core, Darwin-Core, EML, and ISO-19115. The new Mercury system is based on open source and Service

479

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Broader source: Energy.gov (indexed) [DOE]

LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory IMPACT ASSESSMENT: Medium Discussion: A remote authenticated user can...

480

T-581: Novell Access Manager Java Double Literal Denial of Service...  

Broader source: Energy.gov (indexed) [DOE]

the vendor's advisory for details). A fix is scheduled to be released in the 3.1.3 IR1 patch. Download the FPUpdater tool. Download and Copy to fpupdater.jar file Related...

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

EERE Program Management Guide - Chapter 2  

Broader source: Energy.gov (indexed) [DOE]

EERE Business Model and Management System EERE accomplishes its mission through individual programs and collective efforts across programs. Additional information on EERE's mission, vision, and priorities may be accessed at http://eere-intranet.ee.doe.gov/ front_office/index.html 2.1 EERE Programs as Key Mission Elements To accomplish its mission, Energy Efficiency and Renewable Energy (EERE), like any organization, must divide its work into manageable segments. All work done in EERE can be represented by a work breakdown structure; that is, a pyramid where the top level is the EERE mission and the succeeding lower levels are the EERE programs and projects, respectively (see Figure 2.1-1). Most EERE programs are further subdivided into subprograms. EERE

482

The Marshall Islands Data Management Program  

SciTech Connect (OSTI)

This report is a resource document of the methods and procedures used currently in the Data Management Program of the Marshall Islands Dose Assessment and Radioecology Project. Since 1973, over 60,000 environmental samples have been collected. Our program includes relational database design, programming and maintenance; sample and information management; sample tracking; quality control; and data entry, evaluation and reduction. The usefulness of scientific databases involves careful planning in order to fulfill the requirements of any large research program. Compilation of scientific results requires consolidation of information from several databases, and incorporation of new information as it is generated. The success in combining and organizing all radionuclide analysis, sample information and statistical results into a readily accessible form, is critical to our project.

Stoker, A.C.; Conrado, C.L.

1995-09-01T23:59:59.000Z

483

ACCESS America's Great Outdoors: Public Lands Are for Everyone!1  

E-Print Network [OSTI]

Universal Access to Outdoor Recreation: A Design Guide. This state-of-the-art design guide is breaking new ground in the area of accessibility by focusing on integrating universal design into all outdoor experience are limited. Historically, recreation facilities and programs were created by traditional design

Standiford, Richard B.

484

SPECTRUM OPPORTUNITY AND INTERFERENCE CONSTRAINT IN OPPORTUNISTIC SPECTRUM ACCESS  

E-Print Network [OSTI]

of the radio spec- trum? Actual spectrum usage measurements obtained by the FCC's Spectrum Policy Task Force [1SPECTRUM OPPORTUNITY AND INTERFERENCE CONSTRAINT IN OPPORTUNISTIC SPECTRUM ACCESS Qing Zhao@ece.ucdavis.edu ABSTRACT In this paper, we study two important concepts in opportunis- tic spectrum access: spectrum

Islam, M. Saif

485

Efficient IRM enforcement of history-based access control policies  

Science Journals Connector (OSTI)

Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an untrusted program in order to track its execution history. The injected code ... Keywords: distributed optimization protocol, history-based access control policies, inlined reference monitors, language-based security, security automata

Fei Yan; Philip W. L. Fong

2009-03-01T23:59:59.000Z

486

POLICY REGARDING SERVICE ANIMAL ACCESS TO UNIVERSITY OF GEORGIA FACILITIES,  

E-Print Network [OSTI]

POLICY REGARDING SERVICE ANIMAL ACCESS TO UNIVERSITY OF GEORGIA FACILITIES, PROGRAMS, SERVICES AND ACTIVITIES This policy ("Policy") is to implement federal and state laws regarding access for service animals, for purposes of this Policy, "Service Animals" are collectively defined to include those that are defined

Arnold, Jonathan

487

Mobile-Based Medical Data Accessibility in mHealth  

Science Journals Connector (OSTI)

The medical domain is embracing mobile technology (mHealth) to enable healthcare professionals have ubiquitous access to the Electronic Health Records (EHR). This creates the need for supporting mobile users to access medical data remotely in real-time, ... Keywords: mHealth, Web Services, middleware, WebSocket, Health Information System, REST, Provenance

Richard K. Lomotey, Ralph Deters

2014-04-01T23:59:59.000Z

488

Student Financial Services Division of Enrollment and Access  

E-Print Network [OSTI]

Student Financial Services Division of Enrollment and Access 2011-2012 Tuition Scholarship Program: Student Financial Services Division of Enrollment and Access Centennial Hall-1065 Campus Delivery Fort Collins, CO 80523-1065 FAX (970) 491-5010 Eligibility Criteria* For a student to qualify

489

Test Access Mechanism Optimization, Test Scheduling, and Tester Data Volume  

E-Print Network [OSTI]

Test Access Mechanism Optimization, Test Scheduling, and Tester Data Volume Reduction for System Marinissen, Senior Member, IEEE Abstract--We describe an integrated framework for system-on-chip (SOC) test automation. Our framework is based on a new test access mechanism (TAM) architecture consisting of flexible

Chakrabarty, Krishnendu

490

Towards Topic Driven Access to Full Text Documents  

E-Print Network [OSTI]

Towards Topic Driven Access to Full Text Documents Caterina Caracciolo, Willem van Hage access to full text documents. The methodology we propose is a combination of topic segmentation and coherent documents that can be used in two ways: as a basis for automatically generating hypertext links

de Rijke, Maarten

491

Transosseous Access for Decompression of an Obstructed Pelvic Kidney  

SciTech Connect (OSTI)

We report a case of an obstructed pelvic kidney which was decompressed using a transosseous access route. The patient presented with obstructive uropathy and fever, necessitating decompression. Initial access was gained to the kidney by traversing the ilium, allowing subsequent retrograde placement of a double-Jureteric catheter.

Kennedy, Peter T.; Goodacre, Brian W.; Wittich, Gerhard R.; Sonnenberg, Eric van [Department of Radiology, University of Texas Medical Branch, Route 0709, Galveston, TX 77555 (United States)

2002-08-15T23:59:59.000Z

492

Comparative assembly hubs: Web-accessible browsers for comparative genomics  

Science Journals Connector (OSTI)

......GENOME ANALYSIS Comparative assembly hubs: Web-accessible browsers for comparative genomics...pipeline to easily generate collections of Web-accessible UCSC Genome Browsers interrelated...hub listed on the UCSC browser public hubs Web page. Contact: benedict@soe.ucsc......

Ngan Nguyen; Glenn Hickey; Brian J. Raney; Joel Armstrong; Hiram Clawson; Ann Zweig; Donna Karolchik; William James Kent; David Haussler; Benedict Paten

2014-12-01T23:59:59.000Z

493

Memory Coalescing Techniques 1 Accessing Global and Shared Memory  

E-Print Network [OSTI]

Memory Coalescing Techniques 1 Accessing Global and Shared Memory memory coalescing to global memory avoiding bank conflicts in shared memory 2 Memory Coalescing Techniques accessing global memory for a matrix using shared memory for coalescing 3 Avoiding Bank Conflicts computing consecutive powers MCS 572

Verschelde, Jan

494

Accessibility for people who are blind in public transportation systems  

Science Journals Connector (OSTI)

In order to support access for people who are blind to modes of transportation in the city, it is necessary to design technological tools that allow them to carry out activities safely, autonomously, and functionally. In this context, three mobile orientation ... Keywords: accessibility, blind people, mobility, transportation in the city

Jaime Snchez; Marcia de Borba Campos; Matas Espinoza; Lotfi B. Merabet

2013-09-01T23:59:59.000Z

495

Federal Energy Management Program: Best Management Practice: Information  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information and Education Programs to someone by E-mail Information and Education Programs to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Information and Education Programs on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Information and Education Programs on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Google Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Delicious Rank Federal Energy Management Program: Best Management Practice: Information and Education Programs on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Information and Education Programs on AddThis.com...

496

Federal Energy Management Program: Best Management Practice: Commercial  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Commercial Kitchen Equipment to someone by E-mail Commercial Kitchen Equipment to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Google Bookmark Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Delicious Rank Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on AddThis.com... Sustainable Buildings & Campuses

497

Federal Energy Management Program: Best Management Practice: Alternate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Alternate Water Sources to someone by E-mail Alternate Water Sources to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Google Bookmark Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Delicious Rank Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Alternate Water Sources on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Greenhouse Gases

498

Fusing Integration Test Management with Change Management  

E-Print Network [OSTI]

- 1 - Infuse: Fusing Integration Test Management with Change Management Gail E. Kaiser* Dewayne E, NJ 07974 Murray Hill, NJ 07974 Infuse is an experimental software development environment focusing the change set into the baseline. We have previously described how Infuse enforces static consistency at each

Perry, Dewayne E.

499

Proposed Open Access Requirement for International Electric Transmission  

Broader source: Energy.gov (indexed) [DOE]

Proposed Open Access Requirement for International Electric Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Notice is given of the Department of Energy's (DOE or Department) intention to amend existing Presidential permits issued for the construction, operation, maintenance, or connection of facilities at the international border for the transmission of electric energy between the United States and foreign countries to require permit holders to provide ondiscriminatory open access transmission services. The open access

500

Mongolia Renewable Energy and Rural Electricity Access Project | Open  

Open Energy Info (EERE)

Mongolia Renewable Energy and Rural Electricity Access Project Mongolia Renewable Energy and Rural Electricity Access Project Jump to: navigation, search Name of project Mongolia Renewable Energy and Rural Electricity Access Project Location of project Mongolia Energy Services Lighting, Cooking and water heating, Space heating, Cooling, Earning a living Year initiated 2006 Organization World Bank Website http://documents.worldbank.org Coordinates 46.862496°, 103.846656° References The World Bank[1] The objective of the Renewable Energy and Rural Electricity Access Project is to increase access to electricity and improve reliability of electricity service among the herder population and in off-grid soum centers by: (i) assisting the development of institutions and delivery mechanisms; (ii) facilitating herders' investments in Solar Home Systems (SHSs) and small