Powered by Deep Web Technologies
Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA Access Manager Server CVE-2011-0322 Update 0: RSA Access Manager Server CVE-2011-0322 Update T-640: RSA Access Manager Server CVE-2011-0322 Update June 7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server. PLATFORM: RSA Access Manager Server version 5.5.x, 6.0.x, and 6.1.x ABSTRACT: RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3

2

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

3

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

4

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

5

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

6

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

7

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer GRC version 5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: Security Alert: ESA-2013-002 SecurityTracker Alert ID: 1028073 CVE-2012-1064 CVE-2012-2292 CVE-2012-2293 CVE-2012-2294 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-1064]. The code will originate from the

8

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

9

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

10

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

11

T-642: RSA SecurID update to Customers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

12

T-659: Update support for RSA Authentication Manager | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit (architectures)...

13

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

14

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

15

Factorization of a 512-bit RSA modulus  

Science Conference Proceedings (OSTI)

This paper reports on the factorization of the 512-bit number RSA-155 by the Number Field Sieve factoring method (NFS) and discusses the implications for RSA.

Stefania Cavallar; Bruce Dodson; Arjen K. Lenstra; Walter Lioen; Peter L. Montgomery; Brian Murphy; Herman Te Riele; Karen Aardal; Jeff Gilchrist; Grard Guillerm; Paul Leyland; Jol Marchand; Franois Morain; Alec Muffett; Chris Putnam; Craig Putnam; Paul Zimmermann

2000-05-01T23:59:59.000Z

16

Instructions for Using Secure Email via Outlook Web Access | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

17

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

NLE Websites -- All DOE Office Websites (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

18

Using Two-Factor RSA Token  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Two-Factor RSA Token Using Two-Factor RSA Token with VPN User Guide November 2013 Using Your RSA token with WebVPN 1. Establish a connection to the Internet and connect to https://connect.doe.gov 2. Users who are using their RSA Token for the first time should follow the steps below for PIN creation. Others who have already set up their PIN and used their RSA token previously should enter their six digit numeric username and passcode; this is the PIN + the RSA token code. The result of this successful login will be Step 8 below. 3. A login page similar to the picture below will be displayed. Enter your VPN Username (six-digit numeric ID) and your Password by typing your generated RSA Token code and then click the Login button. Example; your generated RSA token code is 032848 (from above). In the Password box, you will enter

19

5.3 Identity Management - Data Access Authorization Policy ...  

Science Conference Proceedings (OSTI)

****WORKING DOCUMENT****. 5.3 Identity Management - Data Access Authorization Policy Management in the Cloud. ...

2010-11-02T23:59:59.000Z

20

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

22

V-120: EMC Smarts Network Configuration Manager Java RMI Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

23

CRT RSA algorithm protected against fault attacks  

Science Conference Proceedings (OSTI)

Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, ... Keywords: RSA, chinese remainder theorem, fault attacks, modular exponentiation, simple power analysis, smart card

Arnaud Boscher; Robert Naciri; Emmanuel Prouff

2007-05-01T23:59:59.000Z

24

The RSA Group is Pseudo-Free  

E-Print Network (OSTI)

Rivest, On the notion of pseudo-free groups. In: Theory ofImplicit function theorem over free groups. J. Algebra 290(The RSA Group is Pseudo-Free ? Daniele Micciancio Department

Micciancio, Daniele

2010-01-01T23:59:59.000Z

25

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

26

U-090: RSA enVision Discloses Environment Variable Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am...

27

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

28

T-581: Novell Access Manager Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81: Novell Access Manager Java Double Literal Denial of Service 81: Novell Access Manager Java Double Literal Denial of Service Vulnerability T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability March 17, 2011 - 3:05pm Addthis PROBLEM: Novell has acknowledged a vulnerability in Novell Access Manager, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Novell Access Manager 3.1 Linux Access Gateway Novell Access Manager 3.1 Access Administration Novell Access Manager 3.1 SSLVPN Server Novell Access Manager 3.1 Windows Novell Identity Server Novell Access Manager 3.1 Linux Novell Identity Server Novell Access Manager 3.1 Java Agents ABSTRACT: Novell Access Manager Java Double Literal Denial of Service Vulnerability. reference LINKS: Secunia Advisory: SA43769 CVE-2010-4476

29

T-582: RSA systems has resulted in certain information being extracted from  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA systems has resulted in certain information being 2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely sophisticated cyber attack in progress, targeting their RSA business unit. RSA took a variety of aggressive measures against the threat to protect their business and their customers, including further hardening of their IT infrastructure. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

30

REMOTE ACCESS SERVICES | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES Access the information you need... Anywhere. Anytime. Different service providers within the Department offer remote access services based on your specific work requirements. If you need assistance, please contact your individual service provider. Energy IT Services (EITS) Remote Access Services Outlook Web Access RSA Token Login RSA Token Instructions HSPD-12 Login HSPD-12 Badge Instructions Virtual Private Network Instructions Citrix Workplace Instructions Energy Information Administration (EIA) Remote Access Services Outlook Web Access EIA VPN Office of Intelligence and Counterintelligence (IN) Remote Access Services Outlook Web Access Office of Science (SC) Remote Access Services Citrix Workplace Help for EITS Customers

31

DOE O 206.2, Identity, Credential, and Access Management (ICAM)  

Directives, Delegations, and Requirements

To establish requirements and responsibilities for DOE identity, credential, and access management program.

2013-02-19T23:59:59.000Z

32

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

33

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

34

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

35

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agent Discloses Node Secret Encryption Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5...

36

U-063: RSA SecurID Software Token for Windows DLL Loading Error...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote...

37

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

38

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

39

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

40

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

An enhancement of the Role-Based Access Control model to facilitate information access management in context of team collaboration and workflow  

Science Conference Proceedings (OSTI)

Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate ... Keywords: Access control, Computation model, Computer supported cooperative work, Information management, Medical education, Workflow

Xuan Hung Le; Terry Doll; Monica Barbosu; Amneris Luque; Dongwen Wang

2012-12-01T23:59:59.000Z

42

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

43

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

44

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

45

Policy Flash 2013-33 Department of Energy Order 206.2 Identity, Credential and Access Managment (ICAM)  

Energy.gov (U.S. Department of Energy (DOE))

Attached is Policy Flash 2013-33 Department of Energy Order 206.2 Identity, Credential and Access Managment (ICAM)

46

Transmission Pricing and Congestion Management: Efficiency, Simplicity and Open Access  

E-Print Network (OSTI)

to the transmission grid is the essential centerpiece for a competitive electricity market. Order 888 and Order 889 for the electric power industry restructuring. These orders provide guidelines for nondiscriminatory transmission functions of the ISO. In an open access, competitive electricity system a transmission pricing scheme should

Oren, Shmuel S.

47

U-090: RSA enVision Discloses Environment Variable Information to Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA enVision Discloses Environment Variable Information to 0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA enVision PLATFORM: Version(s): 4.0 prior to 4.0 SP4 P5, 4.1 prior to 4.1 P3 ABSTRACT: A remote user can view potentially sensitive data on the target system. reference LINKS: CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain environment variables containing web system setup information via the web interface. Further information about this resolution and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and

48

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

49

DiscPOP: Power-aware buffer management for disk accesses  

Science Conference Proceedings (OSTI)

Much research has been conducted on energy efficient cache buffer management for disk based storage systems. Some of them use greedy prefetching technique to artificially increase disk idle intervals if there are a large number of known future requests. ... Keywords: greedy partition, DiscPOP, power-aware buffer management, disk accesses, disk based storage systems, greedy prefetching, I/O access pattern, application pattern, CPU-bound application, energy conservation, efficient prefetching scheme, disk power consumption, performance guarantee, disk reliability, disk characteristic based power-optimal prefetching, energy-efficient cache buffer management, disk I/O system, optimization problem, integer linear programming, divide-and-conquer based offline algorithm

Xiongzi Ge; Dan Feng; David H. C. Du

2011-07-01T23:59:59.000Z

50

Remote Access to the BNL Network, Cyber Security, Information Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

51

Best Management Practices (BMPs) Manual for Access Road Crossings of Wetlands and Waterbodies  

Science Conference Proceedings (OSTI)

This manual addresses the selection and use of best management practices (BMPs) for the construction and/or maintenance of wetland and waterbody crossings by access roads associated with electric utility lines. Although the focus of this manual is on electric utility access roads, the contents are likely to be applicable to a much broader range of linear projects, including other types of roads and projects.

2002-03-22T23:59:59.000Z

52

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

NLE Websites -- All DOE Office Websites (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

53

A Distributed Metadata Management, Data Discovery and Access System  

E-Print Network (OSTI)

Mercury is a federated metadata harvesting, search and retrieval tool based on both open source and software developed at Oak Ridge National Laboratory. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury was developed during 2007. This new version provides orders of magnitude improvements in search speed, support for additional metadata formats, integration with Google Maps for spatial queries, support for RSS delivery of search results, among other features. Mercury provides a single portal to information contained in disparate data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow the users to perform simple, fielded, spatial and temporal searches across these metadata sources. This centralized repository of metadata with distributed data sources provides extremely fa...

Palanisamy, Giriprakash; Green, Jim; Wilson, Bruce

2010-01-01T23:59:59.000Z

54

The Human Genome Project: Information access, management, and regulation. Final report  

SciTech Connect

The Human Genome Project is a large, internationally coordinated effort in biological research directed at creating a detailed map of human DNA. This report describes the access of information, management, and regulation of the project. The project led to the development of an instructional module titled The Human Genome Project: Biology, Computers, and Privacy, designed for use in high school biology classes. The module consists of print materials and both Macintosh and Windows versions of related computer software-Appendix A contains a copy of the print materials and discs containing the two versions of the software.

McInerney, J.D.; Micikas, L.B.

1996-08-31T23:59:59.000Z

55

Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1  

Science Conference Proceedings (OSTI)

This memo represents a republication of PKCS #1 v2.1 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document is taken directly from the PKCS #1 v2.1 document, ...

J. Jonsson; B. Kaliski

2003-02-01T23:59:59.000Z

56

UNIXUNIXUNIXUNIX((((OpenSSHOpenSSHOpenSSHOpenSSH)))) (gw.ps.nifs.ac.jp) RSA  

E-Print Network (OSTI)

pdf SSH SSH SSH UNIXUNIXUNIXUNIX((((OpenSSHOpenSSHOpenSSHOpenSSH)))) ssh (gw.ps.nifsTerm: New connection TCP/IP gw.ps.nifs.ac.jp %ssh (-i ) (-l ) gw.ps.nifs.ac.jp The authenticity of host 'gw.ps.nifs.ps.nifs.ac.jp,133.75.37.11' (RSA) to the list of known hosts. Enter passphrase for key '/home

Ito, Atsushi

57

Virtual venue management users manual : access grid toolkit documentation, version 2.3.  

SciTech Connect

An Access Grid Venue Server provides access to individual Virtual Venues, virtual spaces where users can collaborate using the Access Grid Venue Client software. This manual describes the Venue Server component of the Access Grid Toolkit, version 2.3. Covered here are the basic operations of starting a venue server, modifying its configuration, and modifying the configuration of the individual venues.

Judson, I. R.; Lefvert, S.; Olson, E.; Uram, T. D.; Mathematics and Computer Science

2007-10-24T23:59:59.000Z

58

Radio access network power management considering radio over fiber technique for 4G mobile system  

Science Conference Proceedings (OSTI)

Radio over fiber technique was suggested as excelent candidates for 4G radio access network considering large number mobile users. With higher number of base stations, a microwave link presents more disadvantages across base stations in relation to power ... Keywords: 4G mobile system, fiber dispersion, power manaegment, radio access network, radio over fiber

Jalal J. Hamad Ameen; Widad Ismail; Sevia M. Idrus

2011-03-01T23:59:59.000Z

59

How Evolving Network Access and Network Management Technologies are Redefining the Competitive Wireless Markets  

Science Conference Proceedings (OSTI)

This paper examines some of the key problems users encounter when accessing current generation wireless networks. Using a case study of a hypothetical user, the authors explore the emerging services and the new broadband wireless network technologies ... Keywords: Autonomic Communications, Broadband Wireless Access Technologies, Cognitive Wireless Networks, Short and Long-Term Service Contracts, Two-Sided Markets, User-Centric Services

Fernando Beltrn; Jairo A. Gutirrez; Jos Luis Mels

2011-07-01T23:59:59.000Z

60

Integrating data base management into operating systems: an access method approach  

Science Conference Proceedings (OSTI)

It appears that the final word about Data Management and Data Base Management has not yet been said. Different authors stress different points in the rather sparse bibliography on the subject. Different program products and packages are oriented toward ...

Alberto Cezar De Souza Moreira; Claudio Pinheiro; Luiz Fernando D'Elia

1974-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Modeling and implementing an agent-based system for prediction of protein relative solvent accessibility  

Science Conference Proceedings (OSTI)

In this paper, an agent-based system for prediction of relative solvent accessibility (RSA) of proteins is proposed. Since, it is believed that the 3D-structure of most proteins is defined by their sequences, utilizing data mining methods to extract ... Keywords: Data mining, Feature selection methods, Intelligent agents, Physicochemical properties of amino acids

Alireza Meshkin; Nasser Ghasem Aghaee; Mehdi Sadeghi

2011-05-01T23:59:59.000Z

62

Configuring private data management as access restrictions: from design to enforcement  

Science Conference Proceedings (OSTI)

Service-Oriented Computing (SOC) is a major trend in designing and implementing distributed computer-based applications. Dynamic late biding makes SOC a very promising way to realize pervasive computing, which promotes the integration of computerized ... Keywords: SOA, access restriction, private data, workflow

Aurlien Faravelon; Stphanie Chollet; Christine Verdier; Agns Front

2012-11-01T23:59:59.000Z

63

Identity and Access Management  

Science Conference Proceedings (OSTI)

... Goal 2 In order to protect power generation, transmission and distribution ... Scenario 11 An energy company technician attempts to enter a substation. ...

2013-07-17T23:59:59.000Z

64

Identity and Access Management  

Science Conference Proceedings (OSTI)

... in the fast- moving cybersecurity technology market. ... Example Scenario 11 An energy company technician ... ability to share that 57 information with a ...

2013-07-17T23:59:59.000Z

65

ACCESS CONTROL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TERMSDEFINITIONS FROM DOE M 470.4-7 ACCESS CONTROL. The process of permitting access or denying access to information, facilities, nuclear materials, resources, or designated...

66

Scientific Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Scientific Access The APS is a open user facility that makes beam time available to the international scientific community through a peer-reviewed proposal process. Two access...

67

Open Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Communication » Communication » Open Access Open Access Open access (OA) is the practice of providing unrestricted access via the Internet to peer-reviewed scholarly journal articles. Learn more below... Questions? Open Access Email Open access publishing and publications have experienced substantial growth, expansion and uptake in recent years. What exactly is an open access publication? There are many definitions, but in a nutshell an open access publication is a publication that provides immediately free online access to all users worldwide. This may sound like a tall order, and yet there are to date over 4000 journal publications that fit this definition. The need for this type of access has been driven by the out-of-control costs for scholarly publications. Statistics kept by the Association for Research Libraries

68

Performance Management  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Performance Management. ... If you are unable to access these PDF files, please contact the Office of Workforce Management.

2013-04-20T23:59:59.000Z

69

Open Access  

E-Print Network (OSTI)

2007 Brewer; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License

Earl J Brewer; Earl J Brewer

2007-01-01T23:59:59.000Z

70

ACCESS CONTROL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TERMS/DEFINITIONS FROM DOE M 470.4-7 TERMS/DEFINITIONS FROM DOE M 470.4-7 ACCESS CONTROL. The process of permitting access or denying access to information, facilities, nuclear materials, resources, or designated security areas. ACCESS CONTROL MEASURES. Hardware and software features, physical controls, operating procedures, administrative procedures, and various combinations of these designed to detect or prevent unauthorized access to classified information; special nuclear materials; Government property; automated information systems, facilities, or materials; or areas containing the above and to enforce use of these measures to protect Departmental security and property interests. CRITICAL PATH SCENARIO. An adversary-based scenario that is generated during the conduct of a vulnerability assessment and accounts for adversary tactics that

71

RE: NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RE: NBP RFI: Data Access RE: NBP RFI: Data Access Comments from Building Owners and Managers Association International on DOE Request for Information-Implementing the National...

72

Survey of Substation Equipment Access Control Policies  

Science Conference Proceedings (OSTI)

Utility management and control of access to substations and equipment can help prevent not only unauthorized access by outside agents with ill intent, but also erroneous access to, or erroneous operation of, utility equipment by utility personnel. This report provides the results of an EPRIsponsored research project to identify how utilities manage access to transmission and distribution substations and equipment.BackgroundThe enhanced ...

2012-11-20T23:59:59.000Z

73

Training Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

Beam Time ESAF Contacts Calendars User Community Scientific Access Site AccessVisit Training Training Management System Argonne system used to track training requirements and...

74

Substation Security and Remote Access Implementation Strategies  

Science Conference Proceedings (OSTI)

This project analyzed control system remote access solutions in a side-by-side comparison. Five systems were lab-tested against common functions used by utilities to access and manage electronic control systems. The five vendors products met the basic remote access requirements tested.BackgroundElectronic control systems that actuate protective equipment and physical operations in the ...

2012-12-20T23:59:59.000Z

75

Environment/Health/Safety/Security (EHSS): Building Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Access Building Access Access Control - On-site access is controlled by either keys or by LBNL's automated access control system. LBNL's automated access control system is used for exterior perimeter doors to most buildings, as well as some individual labs, offices, and equipment. The access system is linked to the LBNL Human Resources PeopleSoft database and is updated with the employees' or affiliates' current appointment status at the Laboratory. . If your LBNL appointment end date has expired, then your access will be suspended. Security Access Managers (SAM) Administrators - LBNL's automated access control system is a decentralized access permission control structure managed by each Division or major program via Security Access Managers (SAM) Administrators and In-putters. Go here for the current

76

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HQ OCIO Instructions for Using Secure Email (SMail) via HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy DOE HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Requirements SMail: 1. An Energy IT Services (EITS) provided Exchange email account. 1 2. An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server. 2 3. Appropriate access granted Active Directory group membership. 3 4. DOEnet or Internet access and a supported web browser. Login Procedure for SMail:

77

A Progressive Network Management Architecture Enabled By Java Technology  

E-Print Network (OSTI)

This paper proposes a framework based completely on Java technology. The advantages brought about by the use of Java in network management answer some critical problems existing in current systems. With this work we address several factors concerning interoperability and security in heterogeneous network environments. Specifically, we present a manager application and a multithreaded agent engine that make use of a lightweight communication mechanism for message exchange. A MIB parser is introduced to accelerate handling of incoming management requests, and the RSA public-key cryptosystem is implemented to provide both encryption and authentication features. Results, measured in terms of response time, compare favourably with other published work and standard management frameworks.

Gavalas, Damianos; Ghanbari, Mohammed; O'Mahony, Mike

2010-01-01T23:59:59.000Z

78

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to the ALS Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to...

79

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Gate Access Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to register...

80

Supplement Analysis for the Transmission System Vegetation Management Program FEIS (DOE/EIS-0285/SA-111) - (Fairview-Brandon #1, Fairview-Brandon #2 and Fairview-Rogue #1access road, danger tree and structure clearing) 9/25/02  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

25, 25, 2002 REPLY TO ATTN OF: KEPR-4 SUBJECT: Supplement Analysis for the Transmission System Vegetation Management Program FEIS (DOE/EIS-0285/SA-111) - (Fairview-Bandon #1, Fairview-Bandon #2 and Fairview-Rogue #1access road, danger tree and structure clearing) Benjamin Tilley Natural Resource Specialist Proposed Action: Vegetation Management for the Fairview-Bandon #1and #2 and Fairview- Rogue #1 transmission lines. Location: Throughout the Fairview-Bandon #1, Fairview-Bandon #2 and Fairview-Rogue #1 corridors located within Coos and Curry counties in Oregon. Proposed by: Bonneville Power Administration (BPA). Description of the Proposal: Tall-growing vegetation that is currently or will soon be a hazard to the line will be removed. Vegetation that will grow tall will be selectively eliminated before it reaches a height or density to begin competing with low-growing

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

(DOE/EIS-0285/SA-109): Supplement Analysis for the Transmission System Vegetation Management Program FEIS - (Santiam-Alvey # 1 #2 access road and structure clearing) 9/9/02  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9, 9, 2002 REPLY TO ATTN OF: KEPR-4 SUBJECT: Supplement Analysis for the Transmission System Vegetation Management Program FEIS (DOE/EIS-0285/SA-109) - (Santiam-Alvey # 1 and #2 access road and structure clearing) Benjamin Tilley Natural Resource Specialist Proposed Action: Vegetation Management for the Santiam-Alvey # 1 and #2 transmission line. Location: Throughout the Santiam-Alvey # 1 and #2 corridor located within Linn and Lane counties in Oregon. Proposed by: Bonneville Power Administration (BPA). Description of the Proposal: Tall-growing vegetation that is currently or will soon be a hazard to the line will be removed. Vegetation that will grow tall will be selectively eliminated before it reaches a height or density to begin competing with low-growing species. Cut-stump or follow- up herbicide treatments on re-sprouting-type species will be carried out to ensure

82

Environment/Health/Safety/Security (EHSS): Site Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Access Office Site Access Office Contact Information | Feedback Most-viewed links: Badging Getting a badge - new, stolen, or replacement. Building Access On-site access, key requests, Security Access Managers. Visitor Access Visitor passes, general information. Parking at the Lab Permits, parking map, vehicles registration, parking policy. Other information: FAQ Frequently Asked Questions. Foreign National Access Information on access to DOE sites. Gate Information Information on the different Lab gates. Getting to the Lab Directions and options for getting to Berkeley Lab: buses, carpooling, rapid transit, biking. Guest House Guest House information. Lost and Found Lost and found information and contacts. Meeting and Conference Meeting and conference procedures and general information.

83

A theory for comparing the expressive power of access control models  

Science Conference Proceedings (OSTI)

We present a theory for comparing the expressive power of access control models. The theory is based on simulations that preserve security properties. We perceive access control systems as state-transition systems and present two kinds of simulations, ... Keywords: Access control, access matrix, discretionary access control, expressive power, reduction, role-based access control, state-matching reduction, trust management

Mahesh V. Tripunitara; Ninghui Li

2007-04-01T23:59:59.000Z

84

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to register with the ALS...

85

Capital Access Program (Vermont)  

Energy.gov (U.S. Department of Energy (DOE))

The Capital Access Program provides loan guarantees to small businesses seeking access to commercial credit. Premiums paid by the borrower and matched by Vermont Economic Development Authority fund...

86

Template Discontinuation Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FOR SUBJECT FOR SUBJECT FROM: Personnel Security Program Manager SUBJECT: Discontinuation of Access Eligibility Determination Reference is made to your Questionnaire for National Security Positions signed on [insert date], which was forwarded to this office in connection with a Department of Energy security clearance request. A review of that form disclosed recent use of illegal drugs. [Insert a brief description of the circumstances such as: Specifically, you listed marijuana use 1 time in 5/02; 1 time in 2/03; and 1 time in 3/07.] This office has discontinued the personnel security processing of your security clearance due to your illegal drug usage within twelve months of the signing of your security clearance application.

87

PARS II User Account Access Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of Management Office of Management Office of Engineering and Construction Management User Account Access Guide for PARS II Version 1.5 June 25, 2011 Submitted by: Energy Enterprise Solutions 20440 Century Blvd. Suite 150 Germantown, MD 20874 Phone 301-916-0050 Fax 301-916-0066 www.eesllc.net June 25, 2011 (V1.5) PARS II User Account Access Guide ii This page intentionally left blank. June 25, 2011 (V1.5) PARS II User Account Access Guide iii Title Page Document Name: User Account Access Guide for PARS II Version Number: V1.5 Publication Date: June 25, 2011 Contract Number: DE-AT01-06IM00102 Project Number: 1ME07 CLIN 4 Prepared by: Scott Burns, Energy Enterprise Solutions, LLC Reviewed by: Judith Bernsen, Energy Enterprise Solutions, LLC

88

Web accessible image similarity measurements  

Science Conference Proceedings (OSTI)

Web accessible image similarity measurements. Background: There ... messages). Web Access to Image Similarity Measurements. ...

2013-04-16T23:59:59.000Z

89

Remote Access to the BNL Network, Cyber Security, Information...  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecureID tokens as soon as possible....

90

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91 - 18700 of 28,560 results. 91 - 18700 of 28,560 results. Article Energy Efficiency Hits from the Doors (and Windows) Our 1970's-vintage house always seemed a bit too welcoming when howling winter winds swept up Colorado's foothills. http://energy.gov/energysaver/articles/energy-efficiency-hits-doors-and-windows Article U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. http://energy.gov/cio/articles/u-205-rsa-access-manager-session-replay-flaw-lets-remote-users-access-system Article U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. http://energy.gov/cio/articles/u-125-cisco-asa-multiple-bugs-let-remote-users-deny-service

91

Management  

E-Print Network (OSTI)

Research has indicated that, depending upon driver and passenger characteristics, passengers can have either a positive or negative influence upon driver behaviour. In conclusion to a recent study investigating the roles that passengers can play to influence, positively and negatively, driver behaviour, Regan and Mitsopoulos (2001) recommended, among other things, that the principles of Crew Resource Management (CRM) training may increase passengers ability to positively influence driver behaviour and also drivers ability to accept constructive feedback. The present study investigated the potential application of CRM training within young driver training in the Australian Capital Territory (ACT). This involved a literature review, an analysis of the differences between the driving and aviation domains, an analysis of the team-based activities and the knowledge, skills and attitudes required during driving to perform those activities, consultation with CRM experts from the aviation and medicine domains and the conduct of six focus groups involving young learner drivers, provisional licence drivers and course teachers. The findings indicate that CRM training as part of young driver training in the ACT is a viable concept to pursue. The application of CRM training within young driver training has potential to significantly enhance the positive and reduce the negative effects of passengers on young driver behaviour, and thus the safety of young drivers and passengers alike. The outcomes of this study formed the basis for a set of recommendations for the development of a young driver CRM training program in the ACT.

Young Drivers; Eve Mitsopoulos; Michael Regan; Janet Anderson; Paul Salmon; Jessica Edquist; Ii Report Documentation Page

2005-01-01T23:59:59.000Z

92

Access Grid - CECM  

E-Print Network (OSTI)

"The Access Grid (AG) is the ensemble of resources that can be used to support ... We shall also illustrate the basic capture capacities that Smart Technology's...

93

Science Open Access Journals  

Office of Scientific and Technical Information (OSTI)

SOAJ allows the user to search multiple open access publications with a single query. Results are consolidated and returned in relevance-ranked order, and users are...

94

Role Based Access Control  

Science Conference Proceedings (OSTI)

... Nash and Poland [10] discuss the application of role based access control to cryptographic authentication devices commonly used in the banking ...

95

Making VRML Accessible  

Science Conference Proceedings (OSTI)

... Paper - Making VRML Accessible for People with Disabilities by Sandy Ressler and Qiming Wang to Appear in Proceeding of ASSETS 98. ...

96

Accessibility validation with RAVEN  

Science Conference Proceedings (OSTI)

Testing is, for most, a necessary evil in the software life cycle. One very important form of testing is the evaluation of software products according to mandated criteria or guidelines such as those that specify level of accessibility. Such evaluations ... Keywords: AOP, GUI, Java, accessibility, reflection, rich-client

Barry Feigenbaum; Michael Squillace

2006-05-01T23:59:59.000Z

97

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91 - 21200 of 26,764 results. 91 - 21200 of 26,764 results. Article T-672: Oracle Critical Patch Update Advisory- July 2011 Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. This Critical Patch Update contains 78 new security fixes across all product families. http://energy.gov/cio/articles/t-672-oracle-critical-patch-update-advisory-july-2011 Article T-640: RSA Access Manager Server CVE-2011-0322 Update RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support.

98

Accessing HPSS at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Accessing HPSS Accessing HPSS Accessing HPSS Once you have successfully generated an HPSS token you can access NERSC's HPSS in the different ways listed below. HSI and HTAR are usually the best ways to transfer data in and out of HPSS but other methods are also included. Access Method When to use this method Features Limitations HSI When a full-featured unix-like interface is desired high performance (parallel); unix-like user interface; firewall mode client is specific to HPSS version and might not work at other sites; HTAR When you have large collections of smaller (~10MB or less) files high performance (parallel); creates a tar file directly in HPSS along with an index file; more efficient for large collections of file same client limitations as HSI; also does not have firewall mode so using on a remote site with a firewall will require modification of firewall rules

99

The Broadband Access Facility  

Science Conference Proceedings (OSTI)

The deployment of broadband access networks will revolutionise many aspects of society in the early years of the next millennium. Manufacturers, telecommunications providers and cable television operators world-wide are investing heavily on research ...

J. Kelly; R. Adnams; M. Enrico; M. Whittle

2000-01-01T23:59:59.000Z

100

Multimodal accessibility modeling from coarse transportation networks in Africa  

Science Conference Proceedings (OSTI)

Accessibility is a key driving factor for economic development, social welfare, resources management, and land use planning. In many studies, modeling accessibility relies on proxy variables such as estimated travel time to selected destinations. In ... Keywords: African countries, coarse transportation networks, multimodal travel-time modeling, travel-time surface

Jean-Paul Kibambe Lubamba, Julien Radoux, Pierre Defourny

2013-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

TMS Members: Access Denied  

Science Conference Proceedings (OSTI)

TMS Home TMS Home Page Contact Us Contact Us View Cart View Shopping Cart Downloads Download Manager...

102

Utility Access Questionnaire | Utility Access Questionnaire  

Open Energy Info (EERE)

Questionnaire Questionnaire We are not currently accepting submissions. Thank you for your interest. Want to change your response? OMB Control Number: 1910-5164 Expiration Date: 9/30/2016 Public reporting burden for this collection of information is estimated to average 20 minutes per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Office of Management, Paperwork Reduction Project (1910-0400), U.S. Department of Energy, 1000 Independence Avenue, S.W., Washington, DC 20585; and to the Office of Management and Budget (OMB),

103

Towards inclusive identity management  

Science Conference Proceedings (OSTI)

The article argues for a shift of perspective in identity management (IDM) research and development. Accessibility and usability issues affect identity management to such an extent that they demand a reframing and reformulation of basic designs and requirements ... Keywords: Authentication, Disabilities, E-Inclusion, Exclusion, Identity management, Information security, Privacy, Universal design, Usability

Lothar Fritsch; Kristin Skeide Fuglerud; Ivar Solheim

2010-12-01T23:59:59.000Z

104

Burkina Faso Energy Access Project | Open Energy Information  

Open Energy Info (EERE)

Faso Energy Access Project Faso Energy Access Project Jump to: navigation, search Name of project Burkina Faso Energy Access Project Location of project Burkina Faso Year initiated 2007 Organization World Bank Website http://documents.worldbank.org Coordinates 12.238333°, -1.561593° References Document[1] Energy Access Project aims to support Burkina Faso's efforts to increase access to, and use of energy services to improve living conditions in selected rural, peri-urban, and urban areas. The project includes the following components : increasing access to electricity services in the urban, peri-urban and rural areas; woodfuels supply management and inter-fuel substitution initiatives; and institutional strengthening, capacity development, and harmonization. References ↑ "Document"

105

Access Grid | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Grid Access Grid Access Grid The Access Grid is the ensemble of resources that can be used to support human interaction across the grid. It consists of multimedia display, presentation and interactive environments, interfaces to grid middleware, and interfaces to visualization environments. The Access Grid will support large-scale distributed meetings, collaborative work sessions, seminars, lectures, tutorials and training. The Access Grid design point is group-to-group communication (thus differentiating it from desktop to desktop based tools that focus on individual communication). The Access Grid environment must enable both formal and informal group interactions. Large-format displays integrated with intelligent or active meeting rooms are a central feature of the Access Grid nodes. Access Grid nodes are

106

Web-based energy information systems for energy management and demand response in commercial buildings  

E-Print Network (OSTI)

market Energy providers Target users Program manager (energy provider), energy manager (customer) Commercialization Data Access Trendmarket Energy service providers, utilities Target users Energy manager, operator Commercialization Data Access Trend

Motegi, Naoya; Piette, Mary Ann; Kinney, Satkartar; Herter, Karen

2003-01-01T23:59:59.000Z

107

ARCS Access Rate Control System  

protected steel housing. ... Access Rate Control System This rugged, maintenance- ... Y-12 is seeking an industry partner to fully com-

108

Topic: Emergency Egress and Access  

Science Conference Proceedings (OSTI)

Topic: Emergency Egress and Access. Fire Research Seminar Series. NIST WTC Recommendations Are Basis for New Set of Revised Codes. ...

2012-08-20T23:59:59.000Z

109

VEHICLE ACCESS PORTALS  

NLE Websites -- All DOE Office Websites (Extended Search)

East Jemez Road (Map 1) East Jemez Road (Map 1) VEHICLE ACCESS PORTALS Traffic Lane 1: Closed except for emergencies and maintenance operations. Traffic Lanes 2-7: Drivers required to stop and present LANL badges or other form of valid identification to Protective Force officers. Drivers may proceed upon direction of the officers. Note: Commercial delivery vehicle drivers must also pres- ent their inspection passes from Post 10. More Information: spp-questions@lanl.gov Non-work Hours Vehicles entering LANL at the East Jemez VAPs during non-work hours (between 7

110

Open Access Transmission Tariff  

NLE Websites -- All DOE Office Websites (Extended Search)

Transmission | OATT Transmission | OATT Skip Navigation Links Transmission Functions Infrastructure projects Interconnection OASIS OATT Western Open Access Transmission Service Tariff Revision Western Area Power Administration submitted its revised Open Access Transmission Service Tariff with the Federal Energy Regulatory Commission on Sept. 30, 2009. The tariff became effective on Dec. 1, 2009, as modified by Western's March 2, 2011 compliance filing. The revised tariff was developed to comply with FERC Order No. 890 and to be consistent with Western's statutory and regulatory requirements. It addresses changes in transmission services and planning. FERC issued an order on Dec. 2, 2010, granting Western's petition for a Declaratory Order approving the tariff as an acceptable reciprocity tariff, subject to Western making a compliance filing within 30 days to address items in Attachment C, Attachment P and Attachment Q. Western made its compliance filing on March 2, 2010, addressing FERC's Dec. 2, 2010, order. FERC accepted Western's March 2, 2011 compliance filing on April 25, 2011. Western has made several ministerial filings to its OATT as part of FERC's eTariff viewer system, the last of these was approved on March 29, 2013. Further detail can be found in the links below.Current OATT

111

Remote access of electronic resources for thermal plant using mobile devices  

Science Conference Proceedings (OSTI)

This paper proposes a framework that extends a typical intelligent thermal system management that enables field engineers retrieving vital resources from centralised management station using mobile devices with limited memory, such as PDAs and cell phones. ... Keywords: J2ME, PDAs, artificial intelligence, cell phones, fault diagnosis, intelligent thermal management, mobile devices, mobile phones, remote access, thermal management systems, thermal plants, thermodynamic properties

F-L. Tan; S-C. Fok

2007-11-01T23:59:59.000Z

112

DOE Hydrogen Analysis Repository: Stochastic Energy Source Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Stochastic Energy Source Access Management (SESAM) Stochastic Energy Source Access Management (SESAM) Project Summary Full Title: Stochastic Energy Source Access Management (SESAM): Infrastructure-integrative modular plant for hydrogen-electric co-generation Project ID: 140 Principal Investigator: Kai Strunz Purpose The model demonstrates a renewable power plant that is designed to seamlessly integrate with the given energy infrastructure while serving the dual purpose of generating electric power and hydrogen. A multilevel storage absorbs short-term shocks on the infrastructure while also compensating for intermittency of wind and solar energy conversion in the long term. The model supports in particular analysis and design of a hydrogen infrastructure with a high penetration of renewable energy. Performer

113

NSLS User Access | Training  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Training Training for New Users and Users with Expired Training and/or Badges: All new users and users with expired badges must complete or update the training modules shown below prior to access to the experimental floor. The training can be completed online prior to arrival at the NSLS and is strongly recommended to save considerable time during check-in at the Guest, User, Visitor (GUV) Center in Building 400. Please note each training module is followed by an exam which asks for your name and guest number. If you do not already have a guest number, leave this entry blank. All new users and users with expired badges MUST arrive on a weekday (no weekends or holidays) and check in at the GUV Center so that your training can be verified and to receive a photo ID badge (new or updated). The GUV

114

Accounts & Access | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Account Information Accounts and Access FAQ Connect & Log In Using CRYPTOCards SSH Keys on Surveyor Disk Space Quota Management Allocations Decommissioning of BG/P Systems and Resources Blue Gene/Q Versus Blue Gene/P Mira/Cetus/Vesta Intrepid/Challenger/Surveyor Tukey Eureka / Gadzooks Policies Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] Accounts & Access Account Information Account Information: All computing carried out on the ALCF systems is associated with a user "account." This account is used to log onto the login servers and run jobs on the resources. Using CRYPTOcards Using CRYPTOCards: Useful information to guide you in using and troubleshooting your CRYPTOcard.

115

Furman University OPEN ACCESS PLUS MEDICAL  

E-Print Network (OSTI)

Furman University OPEN ACCESS PLUS MEDICAL BENEFITS ­ Core Plan OPEN ACCESS PLUS MEDICAL BENEFITS ............................................................................................................................................11 Open Access Plus Medical Benefits

116

Laboratory Access | Sample Preparation Laboratories  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Access Planning Ahead Planning Ahead Please complete the Beam Time Request (BTR) and Support Request forms thourgh the User Portal. Thorough chemical and sample information must be included in your BTR. Support Request forms include a list of collaborators that require laboratory access and your group's laboratory equipment requests. Researcher safety is taken seriously at SLAC. Please remember that radioactive materials, nanomaterials, and biohazardous materials have additional safety requirements. Refer to the SSRL or LCLS Safety Offices for further guidance. Upon Arrival Upon Arrival Once you arrive you must complete training and access forms before accessing the Sample Preparation Laboratories (SPL). All Sample Prep Lab doors are locked with access key codes. Once your SPL

117

Furman University OPEN ACCESS PLUS MEDICAL  

E-Print Network (OSTI)

8:54 AM Furman University OPEN ACCESS PLUS MEDICAL BENEFITS ­ Basic Plan OPEN ACCESS PLUS MEDICAL ...................................................................................................................................................10 Open Access Plus Medical Benefits Basic Plan ...............................................................................................................................................................12 Open Access Plus Medical Benefits Core Plan

118

Access Control Policy Tool (ACPT)  

Science Conference Proceedings (OSTI)

... In regard to cyber security, privacy, and information sharing, access control is one of the crucial elements in protecting the nation's critical IT ...

2013-01-15T23:59:59.000Z

119

Foreign National Access Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

will be allowed access to the ANL facility prior to approval by the Security and Counterintelligence Division. The visitor must have a valid passport and visa (or supplemental...

120

Science Open Access Journals - About  

Office of Scientific and Technical Information (OSTI)

SOAJ allows the user to search multiple open access publications with a single query. The query is sent simultaneously to each individual database searched by SOAJ,...

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Optical access port  

DOE Patents (OSTI)

A 0.025 m diameter optical access port system is provided for a high-pressure (20.4 bars) and high-temperature (538{degrees}C) fixed-bed coal gasification process stream. A pair of proximal channels lead into the pipe containing the process stream with the proximal channels disposed on opposite sides of the pipe and coaxial. A pair of ball valves are attached to respective ends of proximal channels for fluidly closing the respective channels in a closed position and for providing a fluid and optical aperture in an open position. A pair of distal channels are connected to respective ball valves. These distal channels are also coaxial with each other and with the proximal channels. Each distal channel includes an optical window disposed therein and associated sealing gaskets. A purge gas is introduced into each distal channel adjacent a respective optical window. The purge gas is heated by a heater before entry into the distal channels. Preferably the optical windows are made of fused silica and the seals are Grafoil gaskets which are pressed against the optical window. 3 figs.

Lutz, S.A.; Anderson, R.J.

1988-09-14T23:59:59.000Z

122

Internal Controls Over Sensitive Compartmented Information Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Controls Over Sensitive Compartmented Information Access for Selected Field Intelligence Elements, IG-0796 Internal Controls Over Sensitive Compartmented Information Access...

123

Template for Discontinuation of Access Eligibility Determination  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MEMORANDUM FOR (SUBJECT'S NAME) MEMORANDUM FOR (SUBJECT'S NAME) FROM: Personnel Security Program Manager SUBJECT: Discontinuation of Access Eligibility Determination Reference is made to your Questionnaire for National Security Positions (QNSP) signed [insert date], which was forwarded to this office in connection with a Department of Energy security clearance request. Your case was submitted to the Office of Personnel Management (OPM) and an investigation dated [insert date] has been received. [Insert a brief description of the circumstances such as: A review of your case reveals that you listed marijuana use 5-10 times from 8/01 to 5/05 on your QNSP. During the personal subject interview with OPM, you stated that the end date for the marijuana use was incorrect and the last time

124

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 5, 2012 July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). June 29, 2012 U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. June 28, 2012 U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

125

Data Management Group Joint Program in Transportation  

E-Print Network (OSTI)

Data Management Group Joint Program in Transportation University of Toronto System Access Request will the University of Toronto, the Joint Program in Transportation Data Management Group or any of its funding

Toronto, University of

126

Increasing access to the carbon market ENERGY, CLIMATE  

E-Print Network (OSTI)

· workshops; Knowledge and information management;· Research, policy analysis, and market surveil-· lanceIncreasing access to the carbon market ENERGY, CLIMATE AND SUSTAINABLE DEVELOPMENT 2008 #12;2 World is growing in parallel. With a dynamic carbon market under constant development, the Energy and Carbon Fi

127

Energy efficient wireless Internet access with cooperative cellular networks  

Science Conference Proceedings (OSTI)

In this paper we study the energy-aware cooperative management of the cellular access networks of the operators that offer service over the same area. In particular, we evaluate the amount of energy that can be saved by using all networks in high traffic ... Keywords: Cellular systems, Energy efficiency, Green networking

Marco Ajmone Marsan; Michela Meo

2011-02-01T23:59:59.000Z

128

V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Samsung and Dell printers Firmware Backdoor Unauthorized 39: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability December 4, 2012 - 2:00am Addthis PROBLEM: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability PLATFORM: The Samsung printer firmware before 20121031 ABSTRACT: Samsung (as well as some Dell printers manufactured by Samsung) issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. REFERENCE LINKS: Samsung Security Advisory Vulnerability Note VU#281284 Bugtraq ID: 56692 CVE-2012-4964 IMPACT ASSESSMENT: Medium DISCUSSION: Samsung and Dell printers are prone to an unauthorized-access vulnerability

129

V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Samsung and Dell printers Firmware Backdoor Unauthorized 9: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability December 4, 2012 - 2:00am Addthis PROBLEM: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability PLATFORM: The Samsung printer firmware before 20121031 ABSTRACT: Samsung (as well as some Dell printers manufactured by Samsung) issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. REFERENCE LINKS: Samsung Security Advisory Vulnerability Note VU#281284 Bugtraq ID: 56692 CVE-2012-4964 IMPACT ASSESSMENT: Medium DISCUSSION: Samsung and Dell printers are prone to an unauthorized-access vulnerability

130

A PrivileA Privilege Management And Enforcement System For Distributed RS  

Science Conference Proceedings (OSTI)

We propose a system which both allows for easy administration as well as enforcement of controlled access of resources to distributed users. In particular, we have developed management and access methods for end user access to distributed mass storage ...

KJ Maly; Gupta, A; Kvande, B; IB Levinstein; Mukkamala; al et

1996-04-01T23:59:59.000Z

131

Plan - Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Plan Plan Data Management for Data Providers Click an arrow to follow the data management path of a data set from planning to curation. plan Overview plan Plan manage Manage archive Archive curation DAAC Curation Data Management Overview Plan Manage Archive DAAC Curation Related Links DAAC Help Best Practices PDF Workshops DataONE ESIP Data Management Plans NASA's Terrestrial Ecology Program now requires that each proposal include a Data Management Plan (DMP) of up to two pages. A DMP for a proposal is a brief document that outlines what you will do with your data during and after your research, to ensure your data will be safe, documented, and accessible now and in the future. A DMP - developed early and used throughout the research project - will increase research efficiency by making the data understandable and usable in the future and

132

Notices Accessible Format: Individuals with  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

472 Federal Register 472 Federal Register / Vol. 77, No. 83 / Monday, April 30, 2012 / Notices Accessible Format: Individuals with disabilities can obtain this document in an accessible format (e.g., braille, large print, audiotape, or computer diskette) on request to the program contact person listed under FOR FURTHER INFORMATION CONTACT. Electronic Access to This Document: The official version of this document is the document published in the Federal Register. Free Internet access to the official edition of the Federal Register and the Code of Federal Regulations is available via the Federal Digital System at: www.gpo.gov/fdsys. At this site you can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document

133

Categorical Exclusion for Access Road  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access Road Access Road Improvements along the Pinnacle Peak- Prescott 230-kV Transmission Line between Structures 16813 and 170/1 Yavapai County. Arizona * RECORD OF CATEGORICAL EXCLUSION DETERMINATION A. Proposed Action: Western proposes to improve access roads along a portion of the Pinnacle Peak to Prescott 230-kV Transmission Line (Structures 168/3 and 170/1). which are currently impassable. to maintain worker safety and the reliability of the bulk electric system. Western plans to blade and grade the existing access road where it enters and leaves three washes so that Western's maintenance vehicles can drive across the washes. We will remove dirt from the road prism by starting at wash edges and pulling dirt up slope in order to create ramps with grades suitable for our equipment.

134

Network Access to Multimedia Information  

Science Conference Proceedings (OSTI)

This report summarises the requirements of research and academic network users for network access to multimedia information. It does this by investigating some of the projects planned or currently underway in the community. Existing information systems ...

C. Adie

1994-05-01T23:59:59.000Z

135

XML access control using static analysis  

Science Conference Proceedings (OSTI)

Access control policies for XML typically use regular path expressions such as XPath for specifying the objects for access-control policies. However such access-control policies are burdens to the query engines for XML documents. To relieve this burden, ... Keywords: Access control, XML, XPath, XQuery, automaton, query optimization, schema, static analysis, value-based access control, view schema

Makoto Murata; Akihiko Tozawa; Michiharu Kudo; Satoshi Hada

2006-08-01T23:59:59.000Z

136

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The

137

High-performance remote access to climate simulation data: a challenge problem for data grid technologies  

Science Conference Proceedings (OSTI)

In numerous scientific disciplines, terabyte and soon petabyte-scale data collections are emerging as critical community resources. A new class of Data Grid infrastructure is required to support management, transport, distributed access to, and analysis ...

Bill Allcock; Ian Foster; Veronika Nefedova; Ann Chervenak; Ewa Deelman; Carl Kesselman; Jason Lee; Alex Sim; Arie Shoshani; Bob Drach; Dean Williams

2001-11-01T23:59:59.000Z

138

Towards a Self-Adaptive Data Management System for Cloud Environments Alexandra Carpen-Amarie  

E-Print Network (OSTI)

. [11] C. Basescu, A. Carpen-Amarie, C. Leordeanu et al., "Managing data access on clouds: A generic

Paris-Sud XI, Université de

139

HM-ACCESS Project | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HM-ACCESS Project HM-ACCESS Project Framework for the Use of Electronic Shipping Papers for the Transport of Hazardous Materials HM-ACCESS Project (Framework for the Use of...

140

2e Carbon Access | Open Energy Information  

Open Energy Info (EERE)

Access Jump to: navigation, search Name 2e Carbon Access Place New York, New York Zip 10280 Sector Carbon Product 2E Carbon Access is an enterprise focused solely on bringing...

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Group key management  

SciTech Connect

This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

Dunigan, T.; Cao, C.

1997-08-01T23:59:59.000Z

142

Role Based Access Control System in the ATLAS Experiment  

E-Print Network (OSTI)

The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

2010-01-01T23:59:59.000Z

143

Role Based Access Control system in the ATLAS experiment  

E-Print Network (OSTI)

The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

2011-01-01T23:59:59.000Z

144

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access NBP RFI: Data Access Neustar, Inc. ("Neustar") hereby submits comments in response to the captioned Request for Information ("RFI") of the Department of Energy ("DOE"). The...

145

Remote Access of Computer Controlled Experiments.  

E-Print Network (OSTI)

??In this paper, we present a way for students to access and operate laboratory equipment, controlled by a laboratory computer via a remote access program. (more)

Nilsson, Kristian; Zackrisson, Johan

2008-01-01T23:59:59.000Z

146

International Electricity Trade - Open Access | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

International Electricity Trade - Open Access International Electricity Trade - Open Access DOE has consistently expressed its policy that international electricity trade should be...

147

Science Open Access Journals - Alerts Help  

Office of Scientific and Technical Information (OSTI)

SOAJ Alerts Fast Facts SOAJ Alerts Fast Facts You can easily create an alert right from the results page. Alerts run automatically, based on the schedule you choose. New relevantly ranked results are automatically sent to you through email or an individual or shared RSS/ATOM feed. There is no limit to the number of alerts you can create. Up to 6 previous sets of alert results may be accessed, with permanent links to the sources where possible. Selected results can be emailed, printed, or downloaded into a citation manager such as EndNote, RefWorks or Bib Tex. Alerts Help Alerts will make your recurring searches even easier by automating your search and sending you the results on a regular basis. To receive alerts on your topic(s) of interest, simply create an Alerts account, specify your

148

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 1880 of 28,905 results. 71 - 1880 of 28,905 results. Download EA-1388: Final Environmental Assessment Ground Water Compliance at the Shiprock Uranium Mill Tailings Site http://energy.gov/nepa/downloads/ea-1388-final-environmental-assessment Download Document Management & Control System (DMCS) http://energy.gov/cio/downloads/document-management-control-system-dmcs Article U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. http://energy.gov/cio/articles/u-129-rsa-envision-bugs-permit-cross-site-scripting-sql-injection-and-directory

149

OpenEI:Utility data access questionnaire | Open Energy Information  

Open Energy Info (EERE)

data access questionnaire data access questionnaire Jump to: navigation, search Ret Jump to Navigation Utility Access Questionnaire We are not currently accepting submissions. Thank you for your interest. Want to change your response? OMB Control Number: 1910-5164 Expiration Date: 9/30/2016 Public reporting burden for this collection of information is estimated to average 20 minutes per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Office of Management, Paperwork Reduction Project (1910-0400), U.S. Department of Energy, 1000 Independence Avenue, S.W.,

150

NBP_RFI_Data_Access.PDF | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBPRFIDataAccess.PDF NBPRFIDataAccess.PDF NBPRFIDataAccess.PDF More Documents & Publications Silver Spring Networks comments on DOE NBP RFI: Data Access...

151

PIA - Foreign Access Central Tracking System (FACTS) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access Central Tracking System (FACTS) PIA - Foreign Access Central Tracking System (FACTS) PIA - Foreign Access Central Tracking System (FACTS) PIA - Foreign Access Central...

152

ETTP Security Access Control System (ESACS) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

153

USRI Admins Accessing USRI Reports  

E-Print Network (OSTI)

button #12;Step 6: Search by Instructor Search Area Enter: Instructors ID; or Instructors full or partC Access Enter the following: User name, and Password with secure ID#s #12;Step 3: Click on the following: Mandatory Parameters Selections Select Term; Select Course Career; Select Releasable Type; Click

Habib, Ayman

154

Flexible access control for javascript  

Science Conference Proceedings (OSTI)

Providing security guarantees for systems built out of untrusted components requires the ability to define and enforce access control policies over untrusted code. In Web 2.0 applications, JavaScript code from different origins is often combined on a ... Keywords: delimited histories, javascript, same-origin policy, security

Gregor Richards, Christian Hammer, Francesco Zappa Nardelli, Suresh Jagannathan, Jan Vitek

2013-10-01T23:59:59.000Z

155

Remote Access to Brookhaven, Information Services Division (ISD),  

NLE Websites -- All DOE Office Websites (Extended Search)

ISD Homepage ISD Homepage Site Details ISD Staff Remote Access Other Information BNL Site Index Can't View PDFs? Remote Access to Brookhaven External BNL users who need internet access to the internal ISD website which includes the Research Library, Records Management, Publications and Technical Editing must have a Virtual Private Network (VPN) account to connect to the BNL Internal Campus Network. This account can be setup by the Accounts Management Office. Available Options Remote Access Policy Broad-Band Connection: must use VPN with a CryptoCard Token Anti-Virus Procedures All Windows PCs should be running one of Brookhaven's official anti-virus software packages when connecting remotely to the BNL Internal Campus Network. Anti-Virus procedures are an important component of BNL's host-based security architecture. Anti-Virus software is the component of this architecture that provides a protection mechanism against malicious code. Malicious codes are programs, such as Trojan horses or viruses, that run on a host system without the authorization of the system user. These codes typically come from e-mail attachments, or can be downloaded along with programs from the Internet, or through an infected floppy disk. Properly installed anti-virus software can minimize these vulnerabilities.

156

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and JBOSS. Addthis Related Articles V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control U-247: EMC Cloud Tiering...

157

Access Control for a Replica Management Database Justin M. Wozniak  

E-Print Network (OSTI)

commodity hardware may be cataloged into a unified, high- utilization system. Such widely distributed-59593-552-5/06/0010 ...$5.00. massively parallel computing infrastructure, capable of pro- cessing vast amounts of user data. A variety of options exist to parallelize and distribute stor- age over clusters or grids, but several

Thain, Douglas

158

SunShot Initiative: Access to Capital  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to Capital to someone by Access to Capital to someone by E-mail Share SunShot Initiative: Access to Capital on Facebook Tweet about SunShot Initiative: Access to Capital on Twitter Bookmark SunShot Initiative: Access to Capital on Google Bookmark SunShot Initiative: Access to Capital on Delicious Rank SunShot Initiative: Access to Capital on Digg Find More places to share SunShot Initiative: Access to Capital on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Balance of Systems Reducing Non-Hardware Costs Lowering Barriers Fostering Growth Access to Capital Photo of a room full of people seated in rows with a few standing in the background. Two hands in the crowd are holding up sheets of paper with 'Like'. Participants at the SunShot Summit breakout session "Big and Small Ideas:

159

An Access Definition and Query Language : Towards a Unified Access Control Model.  

E-Print Network (OSTI)

??In this work we suggest a meta access control model emulating established access control models by configuration and offering enhanced features like the delegation of (more)

Sonnenbichler, Andreas

2013-01-01T23:59:59.000Z

160

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access NBP RFI: Data Access Reply comments from Cleco Power LLC on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid:...

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

arXiv.org help - Web Accessibility  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Accessibility The arXiv.org web site is designed to work on the largest possible set of browsers and platforms, and to be accessible to users with disabilities. Our web pages...

162

Access Solar Energy LLC | Open Energy Information  

Open Energy Info (EERE)

Access Solar Energy LLC Jump to: navigation, search Name Access Solar Energy LLC Place Park CIty, Utah Zip 84060 Sector Renewable Energy, Solar Product Utah-based developers of...

163

Game Accessibility: Enabling Everyone to Play  

Science Conference Proceedings (OSTI)

There is a growing push to make computer games accessible to the disabled. Keywords: Games,Assistive technology,Assistive devices,game developers,games,accessibility,disabilities,disabled,adaptive technology

Lee Garber

2013-06-01T23:59:59.000Z

164

Access Control: Policies, Models, and Mechanisms  

Science Conference Proceedings (OSTI)

Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access control decision is enforced by a mechanism implementing regulations established ...

Pierangela Samarati; Sabrina De Capitani di Vimercati

2000-09-01T23:59:59.000Z

165

A propositional policy algebra for access control  

Science Conference Proceedings (OSTI)

Security-sensitive environments protect their information resources against unauthorized use by enforcing access control mechanisms driven by access control policies. Due to the need to compare, contrast, and compose such protected information resources, ... Keywords: Access control, policy algebra, policy composition, security policy

Duminda Wijesekera; Sushil Jajodia

2003-05-01T23:59:59.000Z

166

Programmer-focused website accessibility evaluations  

Science Conference Proceedings (OSTI)

Suggested methods for conducting website accessibility evaluations have typically focused on the needs of end-users who have disabilities. However, programmers, not people with disabilities, are the end-users of evaluations reports generated by accessibility ... Keywords: accessibility, evaluation, internet, reporting

Chris Law; Julie Jacko; Paula Edwards

2005-10-01T23:59:59.000Z

167

A systematic approach to static access control  

Science Conference Proceedings (OSTI)

The Java Security Architecture includes a dynamic mechanism for enforcing access control checks, the so-called stack inspection process. While the architecture has several appealing features, access control checks are all implemented via dynamic ... Keywords: Type systems, access control, stack inspection

Franois Pottier; Christian Skalka; Scott Smith

2005-03-01T23:59:59.000Z

168

Data Management Tools  

SciTech Connect

What is data management (DM) and why is it important? As described in the ''Handbook of Data Management'' (Thuraisingham, 1998), data management is the process of understanding the data needs of an organization and making the data available to support the operations of the organization. The ultimate goal of data management is to provide the seamless access and fusion of massive amounts of data, information, and knowledge in a heterogeneous and real-time environment, and to support the functions and decision making processes of an organization. The important questions that need to be asked for proper data management are: who is going to be using the data, what types of data need to be stored, and how will this data be accessed? With these questions answered, the data management system (DMS) can then be created, or an existing system can be modified to meet the needs of the organization. The real importance of a data management system is to provide the end user with a consistent data set of known quality. The elements of a good data management system should include a system that: is modeled to how the data is collected and processed, is very well documented, has specifically defined data elements, and has supporting data documentation. Supporting documentation includes items like quality control (QC) data that is carried with the analytical data, and meta data (information about the data). Supporting documentation can be anything that is useful to the project and that needs to be accessed with the data. Data sets get better the more they are used. As errors and inconsistencies are identified and corrected, the data set improves. A good DMS will achieve this because its design promotes use, and the ultimate value of data is in its use rather than its storage. The development and use of Internet access tools, and existing environmental data management systems, can help reduce the effort and cost associated with setting up a DMS. This presentation will discuss the qualities of a good data management system and provide examples.

Ridley, M; Stoker, C

2001-02-12T23:59:59.000Z

169

Transmission Access Charge Informational Filing  

E-Print Network (OSTI)

of any new Participating Transmission Owner (Participating TO) during the proceeding six months or (2) changes to Transmission Revenue Requirements of any of the Participating TOs. 1 Because the Access Charges are determined through a formula rate mechanism, these semi-annual adjustments take place automatically. In the enclosed informational filing, the ISO is providing notice regarding the updated Access Charges that reflect the charges that will be in effect beginning January 1, 2002 in accordance with the formula rate. The adjusted charges are based on the modified Transmission Revenue Requirements, both High Voltage and Low Voltage as a result of: (1) the Offer of Settlement accepted by the Commission in Pacific Gas & Electric Companys (PG&E) Docket No. ER01-66-000, (2) San Diego Gas and Electric Companys supplemental surcharge accepted, subject to refund, in Docket No. ER01-3074-000, and (3) the annual adjustment to the Transmission Revenue Balancing Account (TRBA) of the Participating TOs. 1 Capitalized terms not otherwise defined herein are defined in the Master Definitions

unknown authors

2001-01-01T23:59:59.000Z

170

Management Plan Management Plan  

E-Print Network (OSTI)

of a coevolving naturalcultural system. Suitable ecosystem attributes can be achieved by managing human maintenance that protects the riparian corridor. · Manage recreational use to protect riparian values Creek and the Warm Springs River during runoff periods. · Road systems and upland management practices

171

Mission-Aware Medium Access Control in Random Access Networks  

E-Print Network (OSTI)

We study mission-critical networking in wireless communication networks, where network users are subject to critical events such as emergencies and crises. If a critical event occurs to a user, the user needs to send necessary information for help as early as possible. However, most existing medium access control (MAC) protocols are not adequate to meet the urgent need for information transmission by users in a critical situation. In this paer, we propose a novel class of MAC protocols that utilize available past information as well as current information. Our proposed protocols are mission-aware since they prescribe different transmission decision rules to users in different situations. We show that the proposed protocols perform well not only when the system faces a critical situation but also when there is no critical situation. By utilizing past information, the proposed protocols coordinate transmissions by users to achieve high throughput in the normal phase of operation and to let a user in a critical ...

Park, Jaeok

2009-01-01T23:59:59.000Z

172

Access to DOE Database of Oil and Natural Gas Research Results Expanded |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access to DOE Database of Oil and Natural Gas Research Results Access to DOE Database of Oil and Natural Gas Research Results Expanded Access to DOE Database of Oil and Natural Gas Research Results Expanded January 12, 2011 - 12:00pm Addthis Washington, DC - The results of nearly four decades of research supported by the U.S. Department of Energy (DOE) are now available through the OnePetro online document repository. TheOnePetro website now contains NETL's Oil & Gas Knowledge Management Database. DOE's Knowledge Management Database (KMD) provides access to content from dozens of CDs and DVDs related to oil and natural gas research that the Office of Fossil Energy's (FE) National Energy Technology Laboratory (NETL) has published over the years. It also provides links to reports, data sets, and project summaries from ongoing research supported

173

A privilege management and enforcement system for distributed resource sharing  

Science Conference Proceedings (OSTI)

The Internet has been identified as one of the most dangerous aspects for an organization in today's information based world. Unauthorized access, misuse, and manipulation of data can create havoc. We have chosen a distributed environment with thousands ... Keywords: DCE based authentication, Distributed Informatics Computing and Collaborative Environments project, Internet, World Wide Web based interfaces, X Windows, access control, authorization, controlled access, data manipulation, delegated resource management, distributed environment, distributed resource sharing, end user access, enforcement system, information based world, operating system, privilege management, unauthorized access

K. J. Maly; A. Gupta; B. Kvande; I. B. Levinstein; R. Mukkamala; S. Nanjangud; M. Olson; R. Whitney; R. Chambers

1996-06-01T23:59:59.000Z

174

Announcement of Cloud & Accessibility Public Working Group ...  

Science Conference Proceedings (OSTI)

... Web server / Content Management; Identity Management; Document Retrieval / Library Systems. ... Dial up information: Phone: 877-953-0273. ...

2013-05-29T23:59:59.000Z

175

Utility Data Accessibility Map | Open Energy Information  

Open Energy Info (EERE)

Utility Data Accessibility Map Utility Data Accessibility Map Jump to: navigation, search Residential Commercial Benchmarking Energy Efficiency Delivery of Data Time Period Frequency of Data Access to Data Residential frequency of data access Ua Utility Data Access Map Having access to your electricity use data is a very important step in understanding your overall energy usage. Comparing historical data to your current usage is one way to see trends and determine ways for reducing electricity costs and improving overall efficiency. We asked all U.S. electric utility companies to tell us how accessible their electricity use data is for both residential and commercial customers. The results are updated live based on the responses we have to date. As more utilities provide information, the utility boundaries will be automatically colored

176

Chapter_12_Special_Access_Programs  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 Special Access Programs This chapter describes the DOE Special Access Program (SAP) at DOE HQ and implements the requirements of: * Executive Order 13526, Classified National Security Information, Section 4.3, Special Access Programs, and Section 5.4, General Responsibilities, subparagraph (d). * DOE Order 471.5, Special Access Programs. A SAP is a program established for a specific class of classified information that imposes safeguarding and access requirements exceeding those normally required for information at the same classification level. Terms and activities such as Limited Access, Controlled Access, and Limited Distribution programs are not authorized. HQ Implementation Procedures SAP administration for both DOE and NNSA is handled through the Executive

177

Access Fund Partners LP | Open Energy Information  

Open Energy Info (EERE)

Access Fund Partners LP Access Fund Partners LP Jump to: navigation, search Name Access Fund Partners, LP Place San Juan Capistrano, California Zip 92675 Product Boutique investment banking and investment advisory firm with clean energy focus References Access Fund Partners, LP[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Access Fund Partners, LP is a company located in San Juan Capistrano, California . References ↑ "Access Fund Partners, LP" Retrieved from "http://en.openei.org/w/index.php?title=Access_Fund_Partners_LP&oldid=341703" Categories: Clean Energy Organizations Companies Organizations Stubs What links here Related changes Special pages Printable version

178

On the impact of Gold Open Access journals  

Science Conference Proceedings (OSTI)

Gold Open Access (=Open Access publishing) is for many the preferred route to achieve unrestricted and immediate access to research output. However, true Gold Open Access journals are still outnumbered by traditional journals. Moreover availability of ... Keywords: Directory of Open Access journals (DOAJ), Gold Open Access, Impact analysis, Impact evolution, Journal citation reports (JCR), Journal impact factor, Open Access publishing, SJR, SNIP, Ulrichsweb

Christian Gumpenberger; Mara-Antonia Ovalle-Perandones; Juan Gorraiz

2013-07-01T23:59:59.000Z

179

A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems  

E-Print Network (OSTI)

Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC.

Wu, Guowei; Xia, Feng; Yao, Lin

2012-01-01T23:59:59.000Z

180

Microsoft Word - CX-Ross-Lexington_access_road_WEB.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Darin Bowman Darin Bowman Project Manager - TELF-TPP-3 Proposed Action: Access road repair including reconstructing, grading, and shaping of roads, placing and compacting of rock surfacing, installation of gates, installation and maintenance of erosion control and water drainage features, and restoration of disturbed areas. Budget Information: Work Order # 00259661 PP&A Project No.: 1738 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine maintenance activities...for...rights-of-way, infrastructures (e.g.. roads)...routine maintenance activities, corrective...are required to maintain and preserve infrastructures...in a condition suitable for the facility to be used for its designated purpose. Location: The project area is a Bonneville Power Administration (BPA) access road located on

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using...

182

SPEED CONTROL SYSTEM FOR AN ACCESS GATE - Energy Innovation Portal  

An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first ...

183

SLAC Lightsource User Access Guidelines and Agreement  

NLE Websites -- All DOE Office Websites (Extended Search)

Lightsource User Access Guidelines & Agreement Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC Lightsource User Access Guidelines and Agreement LCLS / SSRL User Research Administration approval (signature/date): LCLS Safety Office approval (signature/date): SSRL Safety Office approval (signature/date): XFO Operations approval (signature/date): Revision Record Revision Date Revised Section(s) Affected Description of Change R001 October 4 th , 2010 User Form Updated SLAC Lightsource User Access Agreement Form R000 Sept 14, 2009 Original Release SLAC Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC LIGHTSOURCE USER ACCESS GUIDELINES & AGREEMENT Introduction Welcome to SSRL and LCLS, SLAC's lightsource user facilities. We hope that your stay here will be

184

Management Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

3MS Environment and Waste Management Programs Environment and Waste Management Programs Environment and Waste Management Programs AN L-934 Surveillance of Site A and Plot M...

185

Management Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment and Waste Management Programs Environment and Waste Management Programs Environment and Waste Management Programs AN L-9213 Surveillance of Site A and Plot M Report...

186

Management Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

r Environment and Waste Management Programs Environment and Waste Management Programs Environment and Waste Management Programs ANL-949 Surveillance of Site A and Plot M Report...

187

Fleet Management | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Property Property » Fleet Management Fleet Management Fleet management includes commercial and agency owned motor vehicles such as cars, vans, trucks, and buses. Fleet (vehicle) management at the headquarters level includes a range of functions, such as vehicle data base management of the FAST, FMVRS, FedFMS, and UNICOR systems, annual motor vehicle utilization and budget forecast data, as well as the use and monitoring of GSA systems in their Fleet DriveThru data base. Fleet Briefings DOE Fleet Management Contact your Fleet manager for access to these systems Federal Automotive Statistical Tool (FAST): Supports EPAct of 1992 requirements , the Energy Conservation Reauthorization Act of 1998 (PL105-388), Executive Order 13149 Greening the Government Through Federal

188

Training  Access Training  CHRIS Training Workflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using ESS to register for PMCDP training Using ESS to register for PMCDP training Find the course CHRIS Code/Session # on the PMCDP Training Schedule located on PMCDP's website http://energy.gov/management/downloads/pmcdp-course-schedule Login into ESS using mis.doe.gov/ESS From the tabs at the top of the screen, select Training  Access Training  CHRIS Training Workflow  Select ...Connect to CHRIS... tab 2 On the CHRIS page, from the Menu (left column) select the following path CHRIS Workflow  Training  Training Requests  Create/Modify Training Request From the Training Request tab screen Select Create Request in upper right corner 

189

Site Access Policy | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Laboratory About Work with Argonne Safety News Community Events Careers Directory Energy Environment Security User Facilities Science Technology Visiting Argonne Site Access...

190

Adjudicative Guidelines for Determining Eligibility for Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to help a foreign person, group, or country by providing that information; (c) counterintelligence information, that may be classified, indicates that the individual's access to...

191

Expanding Researcher Access to EIA Microdata  

U.S. Energy Information Administration (EIA)

personal computers at remote locations. EIAs research access program is much more limited than those offered by other statistical agencies.

192

ORISE Resources: Puerto Rico Equal Access Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Minority AIDS Council (NMAC) and Office of AIDS Research (OAR) Puerto Rico Equal Access Program (PREAP). This PREAP training was specifically developed for the Puerto Rican...

193

Presenting Accessibility to Mobility-Impaired Travelers  

E-Print Network (OSTI)

Behaviors of the Mobility-Disabled Consumer." Journal ofCampus Access Guide at the Disabled Student Program at UCto dental services for disabled people. A questionnaire

Nuernberger, Andrea

2008-01-01T23:59:59.000Z

194

Technology and Access to Knowledge - CECM  

E-Print Network (OSTI)

Feb 9, 1998 ... Technology and Access to Knowledge. Mathematics as a branch of human knowledge is several millenia old, and though each individual...

195

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for approximately 11 percent of all electric energy sold in the United States. NBP RFI: Data Access More Documents & Publications Re: DOE Request for Information - Implementing the...

196

Content-Based Access to Unstructured Information  

Science Conference Proceedings (OSTI)

... of automatic systems that can provide content-based access to information that has not been explicitly structured for machine consumption. ...

2012-01-03T23:59:59.000Z

197

Data Center Access Policies and Version 2.0  

E-Print Network (OSTI)

Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 University://uits.arizona.edu #12;Table of Contents UITS Data Center Access Policies and Procedures!3 .Introduction!3 Overview!3 Data Center Access!3 Data Center Access - Levels of Access!4 Periodic Review and Termination of Access

Watkins, Joseph C.

198

Archive Access and Accessibility: A Progress Report on Social Networking at Work  

E-Print Network (OSTI)

bubble demo: http://lah.soas.ac.uk/projects/dev/bubble-player/wilbur.html 34 Access is also about perceptions ? perceptions of interfaces like Facebook, ELAR reduces distance and power disparities, supports interactions ? difficult access mistaken...

Nathan, David

2010-12-10T23:59:59.000Z

199

Web Accessibility Office of Diversity and Inclusion  

E-Print Network (OSTI)

Web Accessibility Office of Diversity and Inclusion Applies to: Any website conducting university of the art digital and web based information delivery of information is increasingly central in carrying out constituencies. This policy establishes minimum standards for the accessibility of web based information

Jones, Michelle

200

Three web accessibility evaluation perspectives for RIA  

Science Conference Proceedings (OSTI)

With the increasing popularity of Rich Internet Applications (RIAs), several challenges arise in the area of web accessibility evaluation. A particular set of challenges emerges from RIAs dynamic nature: original static Web specifications can change ... Keywords: automated evaluation, web accessibility, web browser processing, web science

Ndia Fernandes, Ana Sofia Batista, Daniel Costa, Carlos Duarte, Lus Carrio

2013-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Improving Access to Web Content at Google  

E-Print Network (OSTI)

1 Improving Access to Web Content at Google Loretta Guarino Reid (LorettaGuarino@google.com) Srinivas Annam (AnnamS@google.com) March 12, 2008 #12;2 Overview Accessibility developments for : · Gmail · Search · Toolbar · Maps & Transit · Books · Video & Captions · Short Topics ­ Calendar, Google Groups

Cortes, Corinna

202

Distributed user access control in sensor networks  

Science Conference Proceedings (OSTI)

User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network deployment in which sensors may provide users with different services in terms ...

Haodong Wang; Qun Li

2006-06-01T23:59:59.000Z

203

Locally Accessible Information and Distillation of Entanglement  

E-Print Network (OSTI)

A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

Sibasish Ghosh; Pramod Joag; Guruprasad Kar; Samir Kunkri; Anirban Roy

2004-03-18T23:59:59.000Z

204

National Radiobiology Archives Distributed Access user's manual  

SciTech Connect

This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

1991-11-01T23:59:59.000Z

205

Energy research network management workshop  

Science Conference Proceedings (OSTI)

This report contains presentations on computer network management. The list of presentations are: ESNET Steering Committee; Site Access Coordinator Group; Magnetic Fusion Energy; HEPNET Review Committee; High Energy Physics Technical Coordinating Committee; Energy Research DECnet Working Group; A Research and Development Strategy for High Performance Computing; Compare Functionality of DECNET, MFENET, TCP/IP; Video Movie Making Using The LBL/MFE Experimental Link; Research in Distributed Computing over Long Haul Networks; Performance Improvements and Transport Protocols; HRC Report; Panel Discussion: ESNET Management Issues; NMFECC Operations Summary; Large Systems Overview File Storage and POSIX Interface; User Support Services; Overview of the MFENET II; and Access to Supercomputers at FSU Hardware, Software Status, and Remote Access.

Not Available

1988-06-01T23:59:59.000Z

206

Ethiopia Energy Access Project | Open Energy Information  

Open Energy Info (EERE)

Ethiopia Energy Access Project Ethiopia Energy Access Project Jump to: navigation, search Name of project Ethiopia Energy Access Project Location of project Ethiopia Energy Services Lighting, Cooking and water heating, Information and communications Year initiated 2005 Organization World Bank Website http://documents.worldbank.org Coordinates 9.145°, 40.489673° References The World Bank[1] The Energy Access Project for Ethiopia will establish a sustainable program for expanding the population's access to electricity and improving the quality and adequacy of electricity supply, reduce environmental degradation and improve energy end-use efficiency; reduce the barriers to the wide spread adoption of renewable energy technologies, and provide technical support for institutional and capacity building of key sector

207

ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains  

Science Conference Proceedings (OSTI)

In this work we design and implement ESCORT, a backward compatible, efficient, and secure access control system, to facilitate mobile wireless access to secured wireless LANs. In mobile environments, a mobile guest may frequently ... Keywords: decentralized access control, identity privacy, location privacy, mobile privacy, wireless security

Jiejun Kong; Shirshanka Das; Edward Tsai; Mario Gerla

2003-09-01T23:59:59.000Z

208

Web-Based Project Management Tools  

E-Print Network (OSTI)

Role-based access to system functions, from guests to system managers E-mail based reminder functions- nating time-consuming paper chases System support done by SwRI, including system maintenance, data backups, software patches, and information security The SwRI Project Information Management System (PIMS

Chapman, Clark R.

209

SRS Seals Access to P and R Reactors, Marking End to Nearly 60-Years of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seals Access to P and R Reactors, Marking End to Nearly Seals Access to P and R Reactors, Marking End to Nearly 60-Years of History: American Recovery and Reinvestment Act Project Progress SRS Seals Access to P and R Reactors, Marking End to Nearly 60-Years of History: American Recovery and Reinvestment Act Project Progress June 28, 2011 - 12:00pm Addthis Marc Sharpe, who was a senior reactor operator at P Reactor in the mid-1980s, (left) and Dr. David Moody, U.S. Department of Energy-Savannah River Operation Office Manager, were the last people to leave P Reactor, just before the opening is welded shut. Marc Sharpe, who was a senior reactor operator at P Reactor in the mid-1980s, (left) and Dr. David Moody, U.S. Department of Energy-Savannah River Operation Office Manager, were the last people to leave P Reactor,

210

Issues in knowledge access, retrieval and sharing - Case studies in a Caribbean health sector  

Science Conference Proceedings (OSTI)

In knowledge sharing forums different actors access each others knowledge to assist in their own decision making process. However, in absence of a formal knowledge management system this knowledge may not be available for use/reuse. In this research, ... Keywords: Healthcare sector, Internal knowledge-transaction costs, Knowledge flows, Knowledge items, Knowledge sharing

Gunjan Mansingh; Kweku-Muata Osei-Bryson; Han Reichgelt

2009-03-01T23:59:59.000Z

211

Inspection of selected intelligence and special access program work-for-others projects  

Science Conference Proceedings (OSTI)

At the request of the former Secretary, an inspection of six classified intelligence and special access program work-for-others projects was conducted. The purpose of this inspection was to evaluate managements, effectiveness regarding these work-for-others projects and included tests for financial integrity and adherence to applicable laws and regulations. Details of the inspection are provided in this report.

Not Available

1993-10-08T23:59:59.000Z

212

Hybrid in-memory and on-disk tables for speeding-up table accesses  

Science Conference Proceedings (OSTI)

Main memory database management systems have become essential for response-time-bounded applications, such as those in telecommunications systems or Internet, where users frequently access a table in order to get information or check whether an element ... Keywords: DBMS performance, hybrid tables, main memory databases

Joan Guisado-Gmez; Antoni Wolski; Calisto Zuzarte; Josep-Llus Larriba-Pey; Victor Munts-Mulero

2010-08-01T23:59:59.000Z

213

Supporting Dynamic Spectrum Access in Heterogeneous LTE+ Networks  

SciTech Connect

As early as 2014, mobile network operators spectral capac- ity is expected to be overwhelmed by the demand brought on by new devices and applications. With Long Term Evo- lution Advanced (LTE+) networks likely as the future one world 4G standard, network operators may need to deploy a Dynamic Spectrum Access (DSA) overlay in Heterogeneous Networks (HetNets) to extend coverage, increase spectrum efficiency, and increase the capacity of these networks. In this paper, we propose three new management frameworks for DSA in an LTE+ HetNet: Spectrum Accountability Client, Cell Spectrum Management, and Domain Spectrum Man- agement. For these spectrum management frameworks, we define protocol interfaces and operational signaling scenar- ios to support cooperative sensing, spectrum lease manage- ment, and alarm scenarios for rule adjustment. We also quan- tify, through integer programs, the benefits of using DSA in an LTE+ HetNet, that can opportunistically reuse vacant TV and GSM spectrum. Using integer programs, we consider a topology using Geographic Information System data from the Blacksburg, VA metro area to assess the realistic benefits of DSA in an LTE+ HetNet.

Luiz A. DaSilva; Ryan E. Irwin; Mike Benonis

2012-08-01T23:59:59.000Z

214

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

215

Pact to Ensure Uninterrupted Research Access | OSTI, US Dept of Energy,  

Office of Scientific and Technical Information (OSTI)

Pact to Ensure Uninterrupted Research Access Pact to Ensure Uninterrupted Research Access NEWS MEDIA CONTACT: Cathey Daniels, (865) 576-9539 FOR IMMEDIATE RELEASE June 28, 2007 Pact to Ensure Uninterrupted Research Access Oak Ridge, TN -One sure thing about the World Wide Web: Like the weather, it will change. Given this dynamic nature of the Web and the importance of preservation of scientific information in a digital environment, the U.S. Department of Energy (DOE) Office of Scientific and Technical Information (OSTI) recently partnered with Internet Archive to ensure uninterrupted access to more than 1 million online research papers from the E-print Network. This was achieved through the Internet Archive's Web archiving service, Archive-It, a Web-based application that enables partners to harvest, manage, search, and preserve collections of archived Web pages and

216

GRR/Section 3 - Land Access Process Overview | Open Energy Information  

Open Energy Info (EERE)

GRR/Section 3 - Land Access Process Overview GRR/Section 3 - Land Access Process Overview < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 3 - Land Access Process Overview 03LandAccessOverview (4).pdf Click to View Fullscreen Contact Agencies Bureau of Land Management United States Forest Service Bureau of Indian Affairs Fish and Wildlife Service Bureau of Reclamation United States Department of Energy United States Department of Defense Regulations & Policies National Environmental Policy Act (NEPA) Energy Policy Act of 2005 (EPAct) Energy Policy Act, Section 1835 - Split Estate Geothermal Steam Act of 1970 Federal Geothermal Leasing - 2007 Rules (43 CFR Part 3200) 43 C.F.R. 3203 Competitive Leasing 43 C.F.R. 3104 Performance Bond

217

An Android application for Meter Terminal Management using Bluetooth Serial Port Profile.  

E-Print Network (OSTI)

?? When maintaining and configuring systems for Automatic Meter Reading (AMR) it is important to have access to powerful tools for on-site management of the (more)

Nelson, Henrik

2013-01-01T23:59:59.000Z

218

Groupware architecture for R&D managers  

Science Conference Proceedings (OSTI)

The business environment is changing at an accelerated pace. Contemporary business systems are becoming more knowledge intensive. Consequently, progressive organisations are collaborating with others in order to develop the linkages they require to access ... Keywords: D, D management, Ireland, R&, case study analysis, collaboration, communication, cooperation, groupware architecture, innovation management, networked R&, networks, product innovation, product portfolio management, research and development, virtual organisations, web-enabled networks

Kathryn Cormican; David O'Sullivan

2004-11-01T23:59:59.000Z

219

Airborne Multisensor Pod System (AMPS) data access concept  

SciTech Connect

The purpose of this document is to provide the conceptual design for accessing data collected under the Airborne Multisensor Pod System (AMPS) program and for accessing data about that data. The purpose of the AMPS program is to provide multisensor data for data fusion research as it applies to arms control treaty verification, non-proliferation surveillance, and related programs. Secondary objectives include sensor development and technology demonstration. The program was established by the U.S. Department of Energy (DOE), Office of Arms Control and Non-proliferation (DOE/AN) and is integrated into the overall DOE AN-10.1 technology development program. The AMPS program interacts with other technology programs of DOE/NN-20. The AMPS program participants include five DOE laboratories. Four will be responsible for collecting and supplying data to AMPS data researchers: (1) Lawrence Livermore National Laboratory (LLNL); (2) Remote Sensing Laboratory (RSL); (3) Sandia National Laboratories (SNL); (4) Savannah River Technology Center (SRTC). The Pacific Northwest Laboratory (PNL), has been assigned data management responsibility for the program, which is defined as the process of planning, acquiring, organizing, qualifying and disseminating data. Data ranges from single sensor readings, to high resolution images, to video. The potential volume of data to be collected under the AMPS program will require considerable management effort. The AMPS program specifies a distributed approach for the sharing and management of AMPS data. This approach shares the burden of data distribution across the DOE laboratories, which will be responsible for AMPS instruments development and implementation and the data those instruments produce. This approach will also provide the laboratories with direct control over the distribution of the data for which they are responsible.

Jou, Jiing-Yih J.; Meitzler, W.D.

1994-10-01T23:59:59.000Z

220

Rail Access to Yucca Mountain: Critical Issues  

SciTech Connect

The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area.

Halstead, R. J.; Dilger, F.; Moore, R. C.

2003-02-25T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Accessing speech data using strategic fixation  

Science Conference Proceedings (OSTI)

When users access information from text, they engage in strategic fixation, visually scanning the text to focus on regions of interest. However, because speech is both serial and ephemeral, it does not readily support strategic fixation. This paper describes ...

Steve Whittaker; Julia Hirschberg

2007-04-01T23:59:59.000Z

222

Fair resource allocation in multiple access channels  

E-Print Network (OSTI)

We consider the problem of resource allocation in a multiple access channel. Our objective is to obtain rate and power allocation policies that maximize a general concave utility function of average transmission rates over ...

ParandehGheibi, Ali

2008-01-01T23:59:59.000Z

223

Dynamic spectrum access -- concepts and future architectures  

Science Conference Proceedings (OSTI)

New trends and developments in radio technology are enhancing the future capabilities of devices to access electromagnetic spectrum using the full range of dimensions associated with the spectrum. This increased capability, together with current developments ...

M. Nekovee

2006-04-01T23:59:59.000Z

224

Decision Analysis of Dynamic Spectrum Access Rules  

SciTech Connect

A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

2011-12-01T23:59:59.000Z

225

North Carolina Capital Access Program (North Carolina)  

Energy.gov (U.S. Department of Energy (DOE))

The North Carolina Capital Access Program provides matching reserve funds for business loans that are beyond the traditional lending means of a lenders usual standards. The average CAP loan is ...

226

JOBAID-ACCESSING AND MODIFYING TALENT PROFILE  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile...

227

Radio over fiber in multimedia access networks  

Science Conference Proceedings (OSTI)

Dominant broadband access technologies today are Digital Subscriber Line (DSL) and hybrid fiber coaxial (HFC) networks. DSL leads, with global subscribers exceeding 100 million, while cable-modem subscribers worldwide total 55 million in 2005 [1]. Recently, ...

Xavier Fernando

2006-09-01T23:59:59.000Z

228

Data Link Switching Client Access Protocol  

Science Conference Proceedings (OSTI)

This memo describes the Data Link Switching Client Access Protocol that is used between workstations and routers to transport SNA/ NetBIOS traffic over TCP sessions. Any questions or comments should be sent to dcap@cisco.com.

S. Chiang; J. Lee; H. Yasuda

1997-02-01T23:59:59.000Z

229

Transportation Demand Management (TDM) Encyclopedia | Open Energy  

Open Energy Info (EERE)

Transportation Demand Management (TDM) Encyclopedia Transportation Demand Management (TDM) Encyclopedia Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Transportation Demand Management (TDM) Encyclopedia Agency/Company /Organization: Victoria Transport Policy Institute Sector: Energy Focus Area: Transportation Topics: Implementation Resource Type: Guide/manual Website: www.vtpi.org/tdm/tdm12.htm Cost: Free Language: English References: Victoria Transport Policy Institute[1] "The Online TDM Encyclopedia is the world's most comprehensive information resource concerning innovative transportation management strategies. It describes dozens of Transportation Demand Management (TDM) strategies and contains information on TDM planning, evaluation and implementation. It has thousands of hyperlinks that provide instant access

230

Storage Resource Managers: Recent International Experience on Requirements and Multiple Co-Operating Implementations  

Science Conference Proceedings (OSTI)

Storage management is one of the most important enabling technologies for large-scale scientific investigations. Having to deal with multiple heterogeneous storage and file systems is one of the major bottlenecks in managing, replicating, and accessing ...

Lana Abadie; Paolo Badino; Jean-Philippe Baud; Ezio Corso; Matt Crawford; Shaun De Witt; Flavia Donno; Alberto Forti; Akos Frohner; Patrick Fuhrmann; Gilbert Grosdidier; Junmin Gu; Jens Jensen; Birger Koblitz; Sophie Lemaitre; Maarten Litmaath; Dmitry Litvinsev; Giuseppe Lo Presti; Luca Magnoni; Tigran Mkrtchan; Alexander Moibenko; Remi Mollon; Vijaya Natarajan; Gene Oleynik; Timur Perelmutov; Don Petravick; Arie Shoshani; Alex Sim; David Smith; Massimo Sponza; Paolo Tedesco; Riccardo Zappi

2007-09-01T23:59:59.000Z

231

Chapter 1 Enterprise Dynamic Access Control Overview  

Science Conference Proceedings (OSTI)

... and placed in a directory service referred as a ... Organization finance marketing operations ... locations while the corporate headquarters can manage ...

2007-09-19T23:59:59.000Z

232

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

233

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

234

Property:EnergyAccessYearInitiated | Open Energy Information  

Open Energy Info (EERE)

EnergyAccessYearInitiated EnergyAccessYearInitiated Jump to: navigation, search Property Name EnergyAccessYearInitiated Property Type Date Description Year Initiated Pages using the property "EnergyAccessYearInitiated" Showing 10 pages using this property. B Benin: Increased Access to Modern Energy Project + 2009 + Burkina Faso Energy Access Project + 2007 + E Ethiopia Energy Access Project + 2005 + G Ghana Energy Development and Access Project (GEDAP) + 2007 + M Mongolia Renewable Energy and Rural Electricity Access Project + 2006 + P Papua New Guinea Improved Energy Access for Rural Communities + 2012 + R Republic of Yemen Energy Access Project + 2006 + S Sri Lanka Credit to Connect + 2011 + T Tanzania Energy Development and Access Expansion Project + 2007 + V Viet Nam Rural Electrification + 2009 +

235

Center for Nanoscale Materials User Access Program Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

Materials User Access Program Overview Materials User Access Program Overview CNM User Access Program Overview 1. Objective ............................................................................................................................................... 1 2. Submission Guidelines .......................................................................................................................... 1 2.1 Proposal Content ............................................................................................................................ 1 3. Proposal Review Process ....................................................................................................................... 2 3.1 Proposal Evaluation Board .............................................................................................................. 2

236

Web accessibility testing: when the method is the culprit  

Science Conference Proceedings (OSTI)

Testing accessibility of a web site is still an art. Lack of appropriate definitions of accessibility and of standard testing methods are some of the reasons why Web accessibility is so difficult to achieve The paper describes a heuristic walkthrough ...

Giorgio Brajnik

2006-07-01T23:59:59.000Z

237

An empirical comparison of monitoring algorithms for access anomaly detection  

Science Conference Proceedings (OSTI)

One of the major disadvantages of parallel programming with shared memory is the nondeterministic behavior caused by uncoordinated access to shared variables, known as access anomalies. Monitoring program execution to detect access anomalies ...

A. Dinning; E. Schonberg

1990-02-01T23:59:59.000Z

238

BPO crude oil analysis data base user`s guide: Methods, publications, computer access correlations, uses, availability  

SciTech Connect

The Department of Energy (DOE) has one of the largest and most complete collections of information on crude oil composition that is available to the public. The computer program that manages this database of crude oil analyses has recently been rewritten to allow easier access to this information. This report describes how the new system can be accessed and how the information contained in the Crude Oil Analysis Data Bank can be obtained.

Sellers, C.; Fox, B.; Paulz, J.

1996-03-01T23:59:59.000Z

239

Response to U. S. Department of Energy's NBP RFI: Data Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Response to U. S. Department of Energy's NBP RFI: Data Access DTE Energy Distribution Operations, SmartCurrents Standards 12 July 2010 I. Introduction The following is DTE Energy's response to the Department of Energy's (DOE) Request for Information on the subject of Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy, published in the Federal Register on 11 May 2010. DTE Energy is one of the nation's largest diversified energy companies. Headquartered in Detroit, Michigan, DTE Energy is involved in the development and management of energy-related

240

Power Delivery Asset Management Information Sharing Method  

Science Conference Proceedings (OSTI)

EPRI's Power Delivery Asset Management (PDAM) Program has initiated an EPRI.com Collaboration website for its members. Using this tool, members can access important meeting documents as well as presentations from meetings and webcasts. Members can also post documents for comment and discussion between other members. This report describes the process for accessing and using the EPRI.com Collaboration site for PDAM. This site was established for the sole use of EPRI members participating in the PDAM program.

2008-12-22T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Managing time  

Science Conference Proceedings (OSTI)

Professionals overwhelmed with information glut can find hope from new insights about time management.

Peter J. Denning

2011-03-01T23:59:59.000Z

242

NBP RFI: Data Access Honeywell Responses To Request for Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To...

243

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript of...

244

RE: NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RE: NBP RFI: Data Access RE: NBP RFI: Data Access Comments from Southern California Edison on DOE Request for Information-Implementing the National Broadband Plan by Empowering...

245

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

246

Solar access of residential rooftops in four California cities  

E-Print Network (OSTI)

the solar access of rooftop solar-energy systems, includingthermal collection by rooftop solar-energy equipment. It canthe solar access of rooftop solar-energy systems, including

Levinson, Ronnen

2010-01-01T23:59:59.000Z

247

Wind Access and Permitting Law | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access and Permitting Law Wind Access and Permitting Law < Back Eligibility Residential Savings Category Wind Buying & Making Electricity Program Info State Delaware Program Type...

248

Green Button Energy Data Access Expanding Across America | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Green Button Energy Data Access Expanding Across America Green Button Energy Data Access Expanding Across America October 17, 2012 - 6:01pm Addthis Utilities demonstrating the...

249

Re~ Request for Information NBP RFI: Data Access | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Information NBP RFI: Data Access Re Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight Midwestern...

250

Request for Information NBP RFI: Data Access | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Information NBP RFI: Data Access Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight Midwestern...

251

Reading Systems for eBooks Need to Become Accessible  

Science Conference Proceedings (OSTI)

Reading Systems for eBooks Need to Become Accessible. While the Publication Structure 1.0 spec is accessible, the reading systems are not. ...

2001-05-25T23:59:59.000Z

252

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

253

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

254

City of Boulder - Solar Access Ordinance (Colorado) | Open Energy...  

Open Energy Info (EERE)

solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted...

255

ORISE Resources: Equal Access Initiative Computer Grants Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Equal Access Initiative Computer Grants Program The Equal Access Initiative Computer Grants Program is sponsored by the National Minority AIDS Council (NMAC) and the National...

256

Rail Access Modes and Catchment Areas for the BART System  

E-Print Network (OSTI)

parking supplies), ridership (e.g. , rail modal splits), andof California at Berkeley Rail Access Modes and CatchmentHypothesized Distributions of Rail Station Access Modes as a

Cervero, Robert

1995-01-01T23:59:59.000Z

257

Test Procedure for 170.302 (p) Emergency Access  

Science Conference Proceedings (OSTI)

... September 24, 2010 1 Test Procedure for 170.302 (p) Emergency Access ... 170.302(p) Emergency Access. Permit authorized users ...

2013-11-06T23:59:59.000Z

258

College of Legacy Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Legacy Management Legacy Management College of Legacy Management College of Legacy Management Vision The College of Legacy Management (CLM) provides DOE program offices with access to the types of training that enables LM to execute its mission of protecting human health and the environment. CLM strives to: Encourage a high-quality workforce Ensure employees get the right skills, at the right time Empower employees to take charge of their own careers through accessible training Retain a best-in-class workforce by providing learning opportunities Maintain and share mission-critical knowledge Increase performance through the development of strong leaders Remain one of the best places to work in the Federal Government by investing in education CLM is a gateway to professional development opportunities including

259

Microsoft Word - CX-Boyer-Tillamook_access_road_WEB.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

James Semrau Project Manager - TELF-TPP-3 David Forward TELF-TPP-3 Proposed Action: Boyer-Tillamook No. 1 transmission line access road maintenance including grading and rocking of road surfaces and installation of water bars and cross drain culverts Budget Information: Work Order #00253279 PP&A Project No.: PP&A 1533 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine maintenance activities...for...rights-of-way...(e.g. roads)...required to maintain and preserve...infrastructures in a condition suitable for a facility to be used for its designated purpose. Location: Tillamook and Yamhill counties, Oregon. Proposed by: Bonneville Power Administration (BPA) Description of the Proposed Action:

260

Science Open Access Journals - Website Policies/Important Links  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Microsoft Word - CX-Ostrander-Troutdale-access_road_WEB.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 30, 2010 REPLY TO ATTN OF: KEP-4 SUBJECT: Environmental Clearance Memorandum Rick Ross Project Manager - TELF-TPP-3 Proposed Action: Ostrander-Troutdale No. 1 transmission line access road maintenance including grading and rocking of road surfaces and installation of water bars and cross drain culverts Budget Information: Work Order #: Unavailable PP&A Project No.: PP&A #1740 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine maintenance activities for rights-of-way, infrastructures (e.g. roads) routine maintenance activities corrective are required to maintain and preserve infrastructures in a condition suitable for the facility to be used for its designed purpose. Location: The proposed project is located within the Bonneville Power Administration (BPA)

262

Transmission access and pricing with multiple separate energy forward markets  

Science Conference Proceedings (OSTI)

California`s congestion management protocols provide comparable access and prices to all users of the transmission system (power exchange and bilateral contract parties). The users implicitly bid for capacity on major transmission paths between zones. The Independent System Operator (ISO) allocates the available transmission capacity on these paths so that it maximizes the value of this capacity as measured by the users` bids. Everyone scheduling flow on a congested path is charged the marginal-cost-based price for using the path. The ISO keeps each party`s portfolio of generation and load individually in balance when adjusting schedules to relieve congestion on interzonal paths. By keeping the portfolios of the different parties separate, the ISO clears its transmission market without arranging energy trades between parties. Parties are responsible for arranging their own trades. The ISO does not become involved in the energy forward markets.

Gribik, P.R. [Perot Systems Corp., Los Angeles, CA (United States); Angelidis, G.A. [Pacific Gas and Electric Co., San Francisco, CA (United States); Kovacs, R.R. [Southern California Edison, Rosemead, CA (United States)

1999-08-01T23:59:59.000Z

263

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBP RFI: Data Access NBP RFI: Data Access NBP RFI: Data Access The National Rural Electric Cooperative Association (NRECA) is the national service organization representing more than 900 not-for-profit, member-owned rural electric cooperatives ("Cooperatives"). Most of NRECA's members are distribution cooperatives, providing retail electric service to more than 42 million consumers in 47 states. NRECA members also include approximately 66 generation and transmission ("G&T") cooperatives that supply wholesale power to their distribution cooperative member-owners. Cooperatives provide service to approximately 75 percent of the nation's land mass, resulting in a consumer density of just seven consumers per mile of line, significantly less density than that of

264

Notices Electronic Access to This Document:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

805 Federal Register 805 Federal Register / Vol. 77, No. 67 / Friday, April 6, 2012 / Notices Electronic Access to This Document: The official version of this document is the document published in the Federal Register. Free Internet access to the official edition of the Federal Register and the Code of Federal Regulations is available via the Federal Digital System at: www.gpo.gov/fdsys. At this site you can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document Format (PDF). To use PDF you must have Adobe Acrobat Reader, which is available free at the site. You may also access documents of the Department published in the Federal Register by using the article search feature at: www.federalregister.gov.

265

Uniform Transboundary Pollution Reciprocal Access Act (Montana) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Uniform Transboundary Pollution Reciprocal Access Act (Montana) Uniform Transboundary Pollution Reciprocal Access Act (Montana) Uniform Transboundary Pollution Reciprocal Access Act (Montana) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Tribal Government Institutional Fuel Distributor Transportation Program Info State Montana Program Type Environmental Regulations This Act allows any entity in a Reciprocating Jurisdiction harmed by pollution originating in the state of Montana to bring an action or other proceeding against the source of that pollution in the state of Montana. Such an entity has the same rights in the state of Montana as they would if

266

Security and Access Policy Security of and access to campus facilities, including campus residences  

E-Print Network (OSTI)

Security and Access Policy Security of and access to campus facilities, including campus residences facilities. Residence halls are secured 24 hours a day. Over extended breaks, the doors of all residence halls will be secured around the clock. Some facilities may have individual hours, which may vary

Escher, Christine

267

Quantum internet using code division multiple access  

E-Print Network (OSTI)

A crucial open problem in large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

Jing Zhang; Yu-xi Liu; Sahin Kaya Ozdemir; Re-Bing Wu; Feifei Gao; Xiang-Bin Wang; Lan Yang; Franco Nori

2012-04-08T23:59:59.000Z

268

Efficient side-channel testing for public key algorithms: RSA ...  

Science Conference Proceedings (OSTI)

... it may also b nts. ... us far, can qu ations in a sem nt to consider when testing might be eas ... ervals, slight d er to isolate, h is performed re a t-test (or et ...

2011-09-21T23:59:59.000Z

269

JM to Cancel DOE M 200.1-1 Ch 9, Public Key Cryptography and Key Management  

Directives, Delegations, and Requirements

The Federal Chief Information Officers' (CIO) Council has consolidated PKI programs into the Identity, Credential, and Access Management (ICAM) Program. PKI ...

2013-06-11T23:59:59.000Z

270

Data Management Architectures  

Science Conference Proceedings (OSTI)

Data management is the organization of information to support efficient access and analysis. For data intensive computing applications, the speed at which relevant data can be accessed is a limiting factor in terms of the size and complexity of computation that can be performed. Data access speed is impacted by the size of the relevant subset of the data, the complexity of the query used to define it, and the layout of the data relative to the query. As the underlying data sets become increasingly complex, the questions asked of it become more involved as well. For example, geospatial data associated with a city is no longer limited to the map data representing its streets, but now also includes layers identifying utility lines, key points, locations and types of businesses within the city limits, tax information for each land parcel, satellite imagery, and possibly even street-level views. As a result, queries have gone from simple questions, such as "how long is Main Street?", to much more complex questions such as "taking all other factors into consideration, are the property values of houses near parks higher than those under power lines, and if so, by what percentage". Answering these questions requires a coherent infrastructure, integrating the relevant data into a format optimized for the questions being asked.

Critchlow, Terence J.; Abdulla, Ghaleb; Becla, Jacek; Kleese van Dam, Kerstin; Lang, Sam; McGuinness, Deborah L.

2012-10-31T23:59:59.000Z

271

GRR/Section 3-FD-c - Right-of-Way Access | Open Energy Information  

Open Energy Info (EERE)

GRR/Section 3-FD-c - Right-of-Way Access GRR/Section 3-FD-c - Right-of-Way Access < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 3-FD-c - Right-of-Way Access 03FDCRightOfWayROWAccess (2).pdf Click to View Fullscreen Contact Agencies Bureau of Land Management United States Forest Service United States Department of Transportation National Telecommunications and Information Administration Regulations & Policies NEPA Triggers None specified Click "Edit With Form" above to add content 03FDCRightOfWayROWAccess (2).pdf 03FDCRightOfWayROWAccess (2).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative This flow chart is intended to apply to lands on which a lease has not been

272

Microsoft Word - CX-LowerGranite-HatwaiAccessRoadImprovementFY13_WEB.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9, 2012 9, 2012 REPLY TO ATTN OF: KEPR-Bell-1 SUBJECT: Environmental Clearance Memorandum Kristi Unholz Project Manager - TELF-TPP-3 Proposed Action: Improve the access road system in miles 4, 5, 16, 17, 18, and 30 of the Lower Granite-Hatwai transmission line PP&A Project No.: 2378 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine Maintenance. B1.13 Pathways, short access roads, and rail lines Location: As identified in table below: Lower Granite-Hatwai Access Road Project Location Township Range Section County, State mile 4 to mile 5 13N 43E 2 Whitman, WA mile 16 12N 45E 8 mile 17 12N 45E 17 mile 18 12N 45E 20 mile 30 36N 5W 19, 30 Nez Perce, ID Proposed by: Bonneville Power Administration (BPA)

273

Microsoft Word - CX-Ross-Lexington_access_road_addition_WEB.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

KEPR-4 KEPR-4 SUBJECT: Environmental Clearance Memorandum Dawneen Dostert Project Manager - TERR-LMT Proposed Action: New access road construction to include clearing, grading, and shaping of roads, placing and compacting of rock surfacing, installation of gates, installation and maintenance of erosion control and water drainage features, and restoration of disturbed areas Budget Information: Work Order # 00230995 PP&A Project No.: 1534 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.13 Construction/ acquisition/relocation of onsite pathways, short onsite access roads/railroads. Location: The project area is confined to the existing and proposed access roads around the right-of-way (ROW) corridor of Bonneville Power Administration's (BPA) Ross-Lexington

274

Ttl prediction schemes and the effects of inter-update time distribution on wireless data access  

E-Print Network (OSTI)

Abstract. Modern mobile networks, such as GPRS and UMTS, support wireless data applications. One successful example is the ever popular i-Mode in Japan. Wireless data services (wireless Internet) become more important as more and more customers of handheld devices enjoy the convenience of the ubiquitous computing. To improve the effective wireless data access, the time-to-live (TTL) management for data entries becomes important due to its use in effective caching design. In this paper, we study three TTL prediction schemes and investigate the effects of the inter-update time distribution on the wireless data access. Performance analysis is carried out via simulations as well as analytical modeling. We expect our results will be useful for the future wireless data access systems, in which transmission power for mobile devices is more limited.

Zygmunt J. Haas; Ben Liang; Yi-bing Lin

2004-01-01T23:59:59.000Z

275

NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Use and Privacy- Comments of Use and Privacy- Comments of Utilities Telecom Council NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities Telecom Council The Utilities Telecom Council hereby comments in response to the Department of Energy (DOE) request for information on data access, third party use, and privacy. In summary, UTC submits that the innovative deployment by energy utilities of smart meters and smart control systems will create a smart energy grid that will unlock the value of what has been called the Energy Information Economy2. Smart energy grids will create an environment in which consumers will have greater abilities to manage their own energy usage and utilities will have new tools to affect grid-wide energy efficiencies never before possible. The key to all this is data. How to provide secure access to it

276

Chapter 1 Enterprise Dynamic Access Control Overview  

Science Conference Proceedings (OSTI)

... Organization, Assembly Line. ... format and placed in a directory service referred as ... at different locations while the corporate headquarters can manage ...

2005-05-12T23:59:59.000Z

277

Query Evaluation in the Presence of Fine-grained Access Control.  

E-Print Network (OSTI)

??Access controls are mechanisms to enhance security by protecting data from unauthorized accesses. In contrast to traditional access controls that grant access rights at the (more)

Zhang, Huaxin

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

NIST Offering Free Access to Standards for First Responders  

Science Conference Proceedings (OSTI)

NIST Offering Free Access to Standards for First Responders. From NIST Tech Beat: April 26, 2011. ...

2011-04-26T23:59:59.000Z

282

Guidelines for Handling Confidential Information by Remote Access  

E-Print Network (OSTI)

Guidelines for Handling Confidential Information by Remote Access You have signed an OHSU of your access to OHSU electronic information and/or other sanctions. Remember, using remote access of the OHSU facilities. When you are utilizing remote access, you must provide the same level of security used

Chapman, Michael S.

283

Access to recorded interviews: A research agenda  

Science Conference Proceedings (OSTI)

Recorded interviews form a rich basis for scholarly inquiry. Examples include oral histories, community memory projects, and interviews conducted for broadcast media. Emerging technologies offer the potential to radically transform the way in which recorded ... Keywords: Interviews, access technology, oral history, speech indexing, spoken word archives

Franciska De Jong; Douglas W. Oard; Willemijn Heeren; Roeland Ordelman

2008-06-01T23:59:59.000Z

284

Tolerating data access latency with register preloading  

Science Conference Proceedings (OSTI)

By exploiting fine grain parallelism, superscalar processors can potentially increase the performance of future supercomputers. However, supercomputers typically have a long access delay to their first level memory which can severely restrict the performance ... Keywords: VLIW/superscalar processor, data dependence analysis, load latency, register file, register preload

William Y. Chen; Scott A. Mahlke; Wen-mei W. Hwu; Tokuzo Kiyohara; Pohua P. Chang

1992-08-01T23:59:59.000Z

285

Securing network access in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In this paper, we present the design, implementation, and evaluation of a secure ... Keywords: elliptic curve cryptography, security, sensor networks

Kun Sun; An Liu; Roger Xu; Peng Ning; Douglas Maughan

2009-03-01T23:59:59.000Z

286

Providing Access to High Performance Computing Technologies  

E-Print Network (OSTI)

Providing Access to High Performance Computing Technologies Jack Dongarra 1 , Shirley Browne 2 to high performance computing technologies. One effort, the National HPCC Software Exchange, is providing scientists involved with High Performance Computing and Communications (HPCC) [1] 3 . The NHSE facilitates

Dongarra, Jack

287

Consumer Devices for eCommerce Access  

Science Conference Proceedings (OSTI)

It is widely predicted that electronic commerce will have a far-reaching impact on businesses in the next few years. For this to occur it will be essential that users are able to access and use eCommerce services when and where they wish, at times and ...

M. C. Revett; G. J. South

1999-07-01T23:59:59.000Z

288

Open Access and UK universities: an introduction  

E-Print Network (OSTI)

both Gold and Green OA options but with a preference for Gold (= immediate access and maximum opportunity for re-use) Preferred Green embargos: max. 6 months (STEM) & 12 months (A/H/SS) but 12 /24 months are acceptable during transition period...

Morgan, Peter

2013-05-17T23:59:59.000Z

289

Creating home network access for the elderly  

Science Conference Proceedings (OSTI)

Wireless broadband networks for home environment present us with many challenges unfamiliar in more public settings. At home, we encounter the end-users with little ICT experience. Probably among the most challenging members of the home network are the ... Keywords: accessibility, authentication, home networks, security, usability, user interface design

Kristiina Karvonen

2007-07-01T23:59:59.000Z

290

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

291

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

292

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

293

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

294

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

295

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

296

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

297

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

298

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

299

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

300

Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Neighborhood Electric Neighborhood Electric Vehicle (NEV) Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Google Bookmark Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Delicious Rank Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Neighborhood Electric Vehicle (NEV) Access to Roadways on AddThis.com... More in this section... Federal State

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Speed control system for an access gate  

DOE Patents (OSTI)

An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

Bzorgi, Fariborz M. (Knoxville, TN)

2012-03-20T23:59:59.000Z

302

Management Responsibilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Responsibilities Management Responsibilities Depleted UF6 Management Responsibilities DOE has responsibility for safe and efficient management of approximately 700,000 metric tons of depleted UF6. Organizational Responsibilities In the United States, the U.S. Department of Energy is responsible for managing all the depleted uranium that has been generated by the government and has been declared surplus to national defense needs. In addition, as a result of two memoranda of agreement that have been signed between the DOE and USEC, the DOE has assumed management responsibility for approximately 145,000 metric tons of depleted UF6 that has been or will be generated by USEC. Any additional depleted UF6 that USEC generates will be USEC's responsibility to manage. DOE Management Responsibility

303

NETL: News Release - Access to DOE Database of Oil and Natural Gas Research  

NLE Websites -- All DOE Office Websites (Extended Search)

2, 2011 2, 2011 Access to DOE Database of Oil and Natural Gas Research Results Expanded Washington, DC -The results of nearly four decades of research supported by the U.S. Department of Energy (DOE) are now available through the OnePetro online document repository. Click to link to the OnePetro website The OnePetro website now contains NETL's Oil & Gas Knowledge Management Database DOE's Knowledge Management Database (KMD) provides access to content from dozens of CDs and DVDs related to oil and natural gas research that the Office of Fossil Energy's (FE) National Energy Technology Laboratory (NETL) has published over the years. It also provides links to reports, data sets, and project summaries from ongoing research supported by FE's Oil and Natural Gas Program.

304

Federal Energy Management Program: Energy Management Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Energy Management Guidance to someone by E-mail Share Federal Energy Management Program: Energy Management Guidance on Facebook Tweet about Federal Energy Management Program: Energy Management Guidance on Twitter Bookmark Federal Energy Management Program: Energy Management Guidance on Google Bookmark Federal Energy Management Program: Energy Management Guidance on Delicious Rank Federal Energy Management Program: Energy Management Guidance on Digg Find More places to share Federal Energy Management Program: Energy Management Guidance on AddThis.com... Requirements by Subject Requirements by Regulation Notices & Rules Guidance Facility Reporting Fleet Reporting Energy Management Guidance The Federal Energy Management Program (FEMP) provides guidance on Federal

305

Office of Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security and Emergency Management Office of Security and Emergency Management The Security and Emergency Management page is designed to give newcomers and veterans alike an introduction and refresher about our activities. We hope you will find it useful. Much of this page's contents are oriented to reindustrialization and other managers of new DOE projects and programs. Feel free to contact the designated key personnel for assistance. Access Authorization Branch Using established guidelines and the "whole person concept," we evaluate and adjudicate informaton about those who need clearances which is developed during background investigations. The objective is to render access determinations that are in the best interest of national security. We also provide security education and awareness information, personnel security program support, and visitor control and foreign travel support to the Oak Ridge Office, the Paducah-Portsmouth Project Office, and the Thomas Jefferson National Accerelator Facility.

306

An exploration of the relationship between use of parks and access, park appeal, and communication effectiveness  

E-Print Network (OSTI)

Understanding what variables influence park use would assist park providers and policy makers in acquiring, designing, managing, and funding initiatives which encourage or support park use. Previous studies indicate that access to parks (measured by both objective and perceived distances), park appeal in terms of being well-maintained, and effective communication between constituents and park suppliers, relate positively to park use. This study explores the relationships between access, appeal, and communication and park use. Access is operationalized as four objective distances from household to nearest park using both Euclidian and Network measures, and by subjective self-reported measures of ability to access parks on foot or by bicycle. Appeal is concerned with the influence of parks perceived level of maintenance and availability of amenities on the probability of park use. Effective communication is operationalized by three variables: perceptions of being well-informed, being included in the planning process, and being able to give feedback to park leaders. These variables and selected demographic data were extracted from an existing data set: the City of College Station Needs Assessment. Findings indicated that a) respondents with access to parks are more likely to use parks, b) level of maintenance and available amenities influenced use, and c) respondents who are well-informed are more likely to use parks.

Walker, Jamie Rae

2008-12-01T23:59:59.000Z

307

Pricing and Security of ResidentialPricing and Security of Residential Broadband AccessBroadband Access  

E-Print Network (OSTI)

and Department of Electrical Engineering Pennsylvania State University kesidis@engr.psu.edu Carlos Kirjner McKinsey and Company, New York Carlos_Kirjner@Mckinsey.com #12;2 OutlineOutline Growth in residential broadband access

Yener, Aylin

308

Access Venture Partners | Open Energy Information  

Open Energy Info (EERE)

Logo: Access Venture Partners Name Access Venture Partners Address 8787 Turnpike Drive, Suite 260 Place Westminster, Colorado Zip 80030 Region Rockies Area Product Venture Capital Number of employees 1-10 Year founded 1998 Phone number 303-426-8899 Website http://www.accessvp.com/ Coordinates 39.854298°, -105.052635° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.854298,"lon":-105.052635,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

309

NSLS User Access | Requesting Beam Time  

NLE Websites -- All DOE Office Websites (Extended Search)

Requesting Beam Time Requesting Beam Time Use one of the following options depending on your research: General User Proposal General User proposals are peer reviewed for scientific merit by a Proposal Review Panel (PRP). General User proposals compete for beamtime with other General User Proposals based on scientific merit. Once the original proposal and beam time request is reviewed and rated in the PASS System, additional beam time requests can be submitted against the original proposal for its lifetime, a period of up to six cycles (two years). Data taken during experiments associated with a General User proposal is considered to be in the public domain. There is no charge for General User beamtime. Rapid Access Rapid Access proposals are a subset of General User proposals available for

310

Easy Access to Energy Improvement Funds  

NLE Websites -- All DOE Office Websites (Extended Search)

EASY ACCESS TO ENERGY IMPROVEMENT EASY ACCESS TO ENERGY IMPROVEMENT FUNDS IN THE PUBLIC SECTOR Are you postponing the installation of energy efficiency projects because the money is not in your current budget? Do you find yourself weighing the benefits of installing energy efficiency equipment today against the hassles and expense of requesting new or additional debt? Are energy efficiency projects being delayed because you are understaffed? If you answered "YES" to any of these questions, you will be happy to know there are several simple, fast, legal, and well-tested financing alternatives that may address your concerns. In the public sector, two of the most popular mechanisms for financing energy efficiency projects are performance contracts and tax- exempt lease-purchase agreements. A

311

Executive Order 12968 Access to Classified Information  

NLE Websites -- All DOE Office Websites (Extended Search)

40243 40243 Monday August 7, 1995 Part IV The President Executive Order 12968-Access to Classified Information Presidential Determination No. 95-32 of July 28, 1995 Presidential Determination No. 95-33 of July 31, 1995 Presidential Documents 40245 Federal Register Vol. 60, No. 151 Monday, August 7, 1995 Title 3- The President Executive Order 12968 of August 2, 1995 Access to Classified Information The national interest requires that certain information be maintained in confidence through a system of classification in order to protect our citizens, our democratic institutions, and our participation within the community of nations. The unauthorized disclosure of information classified in the national interest can cause irreparable damage to the national security and loss of human life.

312

Safety testing for LHC access system  

E-Print Network (OSTI)

In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of system??s models through an automatic system??s state space exploration against some property formulas.

Valentini, F; Ninin, P; Scibile, S

2008-01-01T23:59:59.000Z

313

Open Access Transmission and Renewable Energy Technologies  

Science Conference Proceedings (OSTI)

In April 1996, the Federal Regulatory Commission (PERC) approved Orders 888 and 889 and released a draft rule for public comment on capacity reservation tariffs (CRTs). Order No. 888 requires electric utilities to file transmission tariffs that would allow transmission access to third parties who want to conduct wholesale transactions, and Order No. 889 requires transmission-owning utilities to set up open access, same-time information systems (OASIS), using commercial software and Internet protocols. This paper discusses these Orders in detail, as well as some of the issues before FERC with implications for renewables, which include: transmission pricing; transmission terms and conditions; reassignment of transmission capacity; defining state and FERC jurisdiction over transmission and distribution; the pricing of ancillary services; and the adoption and implementation of independent system operators.

Porter, K.

1996-09-01T23:59:59.000Z

314

Alternative Fuels Data Center: Access to State Alternative Fueling Stations  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Access to State Access to State Alternative Fueling Stations to someone by E-mail Share Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Facebook Tweet about Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Twitter Bookmark Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Google Bookmark Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Delicious Rank Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Digg Find More places to share Alternative Fuels Data Center: Access to State Alternative Fueling Stations on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Access to State Alternative Fueling Stations

315

Accessibility in 5-Axis Milling Environment  

E-Print Network (OSTI)

Using algorithms from computer graphics, namely hidden line and surface removal, techniques have been constructed to derive the 3-axis visible or millable set of a computer model from a given orientation or simulate and verify machining toolpaths. In this paper, an approach that reduces the accessibility problem of 5-axis milling using a flat end tool into a 3-axis accessibility problem is discussed. Using this approach, global detection of possible gouging into other parts, while a 5-axis flat end mill is in use, is made feasible and collisions can be avoided. Key Words: NURBs, accessibility, 5-axis machining. 1 Introduction Several methods are in use, when freeform computer models are realized using milling machines. Possibly the most common approach utilizes a ball end tool with three degrees of freedom, namely translation in x, y, and z [1, 2, 4, 5, 6, 7]. The ball end center of the tool follows an offset [8] to the model by the tool radius while the ball end surface is tangent to...

Gershon Elber

1997-01-01T23:59:59.000Z

316

Microsoft Word - CX-Kalispell-KerrMile15-16AccessRoadImprovementFY12_WEB.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 REPLY TO ATTN OF: KEPR-Bell-1 SUBJECT: Environmental Clearance Memorandum Joe Johnson Project Manager - TELF-TPP-3 Proposed Action: Access road improvement for the Kalispell-Kerr #1, 115-kilovolt (kV) transmission line PP&A Project No.: 2474 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine Maintenance, B1.13 Pathways, short access roads, and rail lines Location: Township 26 North, Range 21 West, Section 13 and 24, Flathead County, MT. Proposed by: Bonneville Power Administration (BPA) Description of the Proposed Action: BPA proposes to perform access road maintenance on several segments of the access road for the Kalispell-Kerr #1, 115-kV transmission line. Work includes reconstruction and drainage enhancements on 5000 feet of road beginning at structure

317

Enterprise Digital Rights Management: Solutions against Information Theft by Insiders  

E-Print Network (OSTI)

Management (E-DRM) protects sensitive information by managing and enforcing access and usage rights to the information throughout its lifecycle, no matter where the information is distributed. However, the self-protection authorities to read/write the protected information. The DOFS architecture ensures that bits of a sensitive

Chiueh, Tzi-cker

318

NGNP Risk Management Database: A Model for Managing Risk  

Science Conference Proceedings (OSTI)

To facilitate the implementation of the Risk Management Plan, the Next Generation Nuclear Plant (NGNP) Project has developed and employed an analytical software tool called the NGNP Risk Management System (RMS). A relational database developed in Microsoft Access, the RMS provides conventional database utility including data maintenance, archiving, configuration control, and query ability. Additionally, the tools design provides a number of unique capabilities specifically designed to facilitate the development and execution of activities outlined in the Risk Management Plan. Specifically, the RMS provides the capability to establish the risk baseline, document and analyze the risk reduction plan, track the current risk reduction status, organize risks by reference configuration system, subsystem, and component (SSC) and Area, and increase the level of NGNP decision making.

John Collins

2009-09-01T23:59:59.000Z

319

Federal Energy Management Program: Computerized Maintenance Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Computerized Computerized Maintenance Management Systems to someone by E-mail Share Federal Energy Management Program: Computerized Maintenance Management Systems on Facebook Tweet about Federal Energy Management Program: Computerized Maintenance Management Systems on Twitter Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Google Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Delicious Rank Federal Energy Management Program: Computerized Maintenance Management Systems on Digg Find More places to share Federal Energy Management Program: Computerized Maintenance Management Systems on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

320

SUBCONTRACT MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-1 -1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish, document, and maintain adequate purchasing systems. 2. To ensure contractors flow down contract requirements to subcontractors. WHY IS SUBCONTRACT MANAGEMENT IMPORTANT? In many Department prime contracts a significant portion of the obligated dollars is spent on subcontract work. Due to the absence of a direct contractual relationship with the subcontractor, the Department must rely on the prime contractor to manage subcontract work. Subcontractors perform significant work efforts at sites and are an integral part of the site's success. Prime

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Documentation and Quality Assurance for Data Sharing and Archival Now that you have planned your project and data management, collected data, integrated imagery, or generated model...

322

Reservation Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Reservation Management The ORR is home to three major facility complexes: the East Tennessee Technology Park (ETTP), the National Nuclear Security Administration's (NNSA's) Y-12...

323

Management Plan  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Plan (SSMP) to be submitted to Congress after the April 2010 release of the Nuclear Posture Review Report. It is aligned with the President's National Security Strategy...

324

Management Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

to global waste vitrification and related programs Serve as a technical platform for DOE reviews Environmental Management Leadership Team Responsible for identifying or...

325

MANAGEMENT ASSESSMENT AN INTEGRATED ENVIRONMENT SAFETY & HEALTH MANAGEMENT SYSTEM (ISMS) CORE FUNCTION FOR FEEDBACK & CONTINUOUS IMPROVEMENT  

Science Conference Proceedings (OSTI)

Management assessment is required of US Department of Energy contractors by 10 CFR 830.122 and DOE Order 414.1. The management assessment process is a rigorous, preplanned, forward-looking review. It is required to be performed by owners of the processes that are being assessed. Written from the perspective of the Assessment Program Director and an Assessment Specialist, this paper describes the evolution of the process used by CH2MHILL to implement its management assessment program over the past two years including: roles, responsibilities, and details about our program improvement project designed to produce a clear picture of management processes and to identify opportunities for improvement. The management assessment program is essential to successful implementation, maintenance, and improvement of the CH2MHILL Integrated Environment, Safety, and Health Management System (ISMS). The management assessment program implements, in part, ISMS Core Function No. 5. ''Feedback and Continuous Improvement''. Organizations use the management assessment process to assess ISMS implementation and effectiveness. Management assessments evaluate the total picture of how well management processes are meeting organizational objectives and the customer's requirements and expectations. The emphasis is on management issues affecting performance, systems, and processes such as: strategic planning, qualification, training, staffing, organizational interfaces, communication, cost and schedule control and mission objectives. Management assessments should identify any weaknesses in the management aspects of performance and make process improvements. All managers from first line supervisors to the president and general manager are involved in the management assessment process. More senior managers, in conducting their assessment, will use data from lower levels of management. This approach will facilitate the objective of having managers closer to the work under review focusing on more compliance- and process-oriented aspects of work performance, while senior managers will concentrate on more strategic issues, having more access to information generated from assessments by their subordinates.

VON WEBER, M.

2005-07-26T23:59:59.000Z

326

Grid Data Access on Widely Distributed Worker Nodes Using Scalla and SRM  

Science Conference Proceedings (OSTI)

Facing the reality of storage economics, NP experiments such as RHIC/STAR have been engaged in a shift of the analysis model, and now heavily rely on using cheap disks attached to processing nodes, as such a model is extremely beneficial over expensive centralized storage. Additionally, exploiting storage aggregates with enhanced distributed computing capabilities such as dynamic space allocation (lifetime of spaces), file management on shared storages (lifetime of files, pinning file), storage policies or a uniform access to heterogeneous storage solutions is not an easy task. The Xrootd/Scalla system allows for storage aggregation. We will present an overview of the largest deployment of Scalla (Structured Cluster Architecture for Low Latency Access) in the world spanning over 1000 CPUs co-sharing the 350 TB Storage Elements and the experience on how to make such a model work in the RHIC/STAR standard analysis framework. We will explain the key features and approach on how to make access to mass storage (HPSS) possible in such a large deployment context. Furthermore, we will give an overview of a fully 'gridified' solution using the plug-and-play features of Scalla architecture, replacing standard storage access with grid middleware SRM (Storage Resource Manager) components designed for space management and will compare the solution with the standard Scalla approach in use in STAR for the past 2 years. Integration details, future plans and status of development will be explained in the area of best transfer strategy between multiple-choice data pools and best placement with respect of load balancing and interoperability with other SRM aware tools or implementations.

Jakl, Pavel; /Prague, Inst. Phys.; Lauret, Jerome; /Brookhaven; Hanushevsky, Andrew; /SLAC; Shoshani, Arie; /LBL, Berkeley; Sim, Alex; /LBL, Berkeley; Gu, Junmin; /LBL, Berkeley

2011-11-10T23:59:59.000Z

327

Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Limited Speed Vehicle Limited Speed Vehicle Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Google Bookmark Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Delicious Rank Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Limited Speed Vehicle Access to Roadways A limited speed vehicle is defined as a vehicle that is capable of

328

Solar/Wind Access Policy | Open Energy Information  

Open Energy Info (EERE)

Solar/Wind Access Policy Solar/Wind Access Policy < Solar Jump to: navigation, search Solar and wind access laws are designed to establish a right to install and operate a solar or wind energy system at a home or other facility. Some solar access laws also ensure a system owner's access to sunlight. These laws may be implemented at both the state and local levels. In some states, access rights prohibit homeowners associations, neighborhood covenants and local ordinances from restricting a homeowner's right to use solar energy. Easements, the most common form of solar access law, allow for the rights to existing access to a renewable resource on the part of one property owner to be secured from an owner whose property could be developed in such a way as to restrict that resource. An easement is

329

Alternative Fuels Data Center: Public Access to State Compressed Natural  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Public Access to State Public Access to State Compressed Natural Gas (CNG) Fueling Stations to someone by E-mail Share Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Facebook Tweet about Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Twitter Bookmark Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Google Bookmark Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Delicious Rank Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Digg Find More places to share Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on

330

Green Button: Providing Consumers with Access to Their Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Green Button: Providing Consumers with Access to Their Energy Data Green Button: Providing Consumers with Access to Their Energy Data January 19, 2012 - 2:54pm Addthis Aneesh...

331

Foundation for a time interval access control model  

Science Conference Proceedings (OSTI)

A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects and objects, and a time interval access graph. The time ...

Francis B. Afinidad; Timothy E. Levin; Cynthia E. Irvine; Thuy D. Nguyen

2005-09-01T23:59:59.000Z

332

Web accessibility compliance of government web sites in Korea  

Science Conference Proceedings (OSTI)

This paper introduces Korean web accessibility activities, such as relational laws, ordinances, policies, guidelines. It also presents analytical result of the investigation on web-contents accessibilities of the 39 Korean government agencies. The result ...

Joonho Hyun; Doojin Choi; Sukil Kim

2007-07-01T23:59:59.000Z

333

Re: NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the topics of data access, third party usage and privacy as they relate to consumers energy usage information and the Smart Grid. Re: NBP RFI: Data Access More Documents &...

334

Auctions to gas transmission access : the British experience  

E-Print Network (OSTI)

When access to monopoly owned networks is constrained auctioning access rights can increase the efficiency of allocations relative to negotiation and grandfathering when there is sufficient competition among network users. ...

McDaniel, Tanga

2002-01-01T23:59:59.000Z

335

Questions_and_Answers_on_the_New_Access_Control_System  

NLE Websites -- All DOE Office Websites (Extended Search)

Questions and Answers on the New Access Control System for HQ Security Areas September 15, 2010 Question: Why is the current access control system to security areas being changed?...

336

Access Rate Control System | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Rate Control System Access Rate Control System The mp4 video format is not supported by this browser. Download video Captions: On Time: 4:03 min Developed to support...

337

Femtocell access control strategy in UMTS and LTE  

Science Conference Proceedings (OSTI)

Femtocells have become an attractive device for operators to offer extended services on their licensed UMTS/LTE spectrum. In this article we focus on the access control strategy -- a crucial aspect for operators to give preferential access to femtocells ...

Assen Golaup; Mona Mustapha; Leo Boonchin Patanapongpibul

2009-09-01T23:59:59.000Z

338

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS December 4, 2012 V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. November 30, 2012 V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. November 27, 2012 V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws

339

Context and Structure in Automated Full-Text Information Access  

E-Print Network (OSTI)

Context and Structure in Automated Full-Text Information Access Marti A. Hearst Report No. UCB 94720 #12;#12;Context and Structure in Automated Full-Text Information Access by Marti A. Hearst B and Structure in Automated Full-Text Information Access Copyright c 1994 by Marti A. Hearst #12;In memory of my

Hearst, Marti

340

Risk-based access control systems built on fuzzy inferences  

Science Conference Proceedings (OSTI)

Fuzzy inference is a promising approach to implement risk-based access control systems. However, its application to access control raises some novel problems that have not been yet investigated. First, because there are many different fuzzy operations, ... Keywords: access control, fuzzy inference, risk

Qun Ni; Elisa Bertino; Jorge Lobo

2010-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Oblivious transfer with complex attribute-based access control  

Science Conference Proceedings (OSTI)

In this paper, we present oblivious transfer with complex attribute-based access control policies. The protocol allows a database server to directly enforce "and" and "or" access control policies (c11 ? c12 ... Keywords: access control, attribute-based encryption, oblivious transfer

Lingling Xu; Fangguo Zhang

2010-12-01T23:59:59.000Z

342

Achieving distributed user access control in sensor networks  

Science Conference Proceedings (OSTI)

User access control in sensor networks defines a process of granting user an access right to the stored information. It is essential for future real sensor network deployment in which sensors may provide users with different services in terms of data ... Keywords: Elliptic Curve Cryptography, Public key cryptography, Sensor networks, User access control

Haodong Wang; Qun Li

2012-05-01T23:59:59.000Z

343

Trading in risk: using markets to improve access control  

Science Conference Proceedings (OSTI)

With the increasing need to securely share information, current access control systems are proving too in flexible and difficult to adapt. Recent work on risk-based access control systems has shown promise at resolving the inadequacies of traditional ... Keywords: market, risk, risk-based access control

Ian Molloy; Pau-Chen Cheng; Pankaj Rohatgi

2009-08-01T23:59:59.000Z

344

DEACTIVATION MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MANAGEMENT MANAGEMENT The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project management approach, and as such is not addressed. The following specific topics are based on lessons learned during deactivation of DOE facilities.  The Deactivation Mission  The Stabilization/Deactivation "Customer"  Project Approach for a Complex Facility  Establishing the Overall End-State  Viewing Deactivation in Two Phases  Early Decisions  Early Deactivation Tasks  Facility-Specific Commitments  Hazard Reduction  Detailed End-Points  Set Up Method and Criteria  Post-Deactivation S&M Plan

345

Gender and lexical access in Bulgarian  

E-Print Network (OSTI)

Two procedures were used to explore the effects of semantic and grammatical gender on the recognition and processing of Bulgarian nouns, in relation to other factors that are known to affect lexical access. This study in a three-gender language was modeled on previous work in Italian, a two-gender language (Bates, Devescovi, Pizzamiglio, DAmico, & Hernandez, 1995). Words were presented auditorily in randomized lists in two tasks: (1) repeat the word as quickly as possible and (2) determine the grammatical gender of the noun as soon as possible and indicate the decision by pressing a button. Reaction times in both tasks were influenced by phonological factors, word frequency, and irregularity of gender marking, but semantic and grammatical gender affected only gender monitoring. The significant contribution of semantic gender to processing in Bulgarian contrasts with previous findings for Italian. Also, we obtained an interaction between sex of the subject and noun gender, reflecting a bias toward ones own grammatical gender counterpart (especially for females). Reanalysis of the prior study in Italian showed a similar interaction but confirmed no effects of the semantic gender of the noun, suggesting that these two natural gender effects can dissociate. Possible reasons for cross-linguistic differences are discussed, with implications for comparative studies of gender and lexical access. Recently, there has been a surge of interest in the nature

Elena Andonova; Antonella Devescovi

2004-01-01T23:59:59.000Z

346

Importance-driven compositing window management  

E-Print Network (OSTI)

In this paper we present importance-driven compositing window management, which considers windows not only as basic rectangular shapes but also integrates the importance of the windows content using a bottom-up visual attention model. Based on this information, importance-driven compositing optimizes the spatial window layout for maximum visibility and interactivity of occluded content in combination with see-through windows. We employ this technique for emerging window manager functions to minimize information overlap caused by popping up windows or floating toolbars and to improve the access to occluded window content. An initial user study indicates that our technique provides a more effective and satisfactory access to occluded information than the well-adopted Alt+Tab window switching technique and see-through windows without optimized spatial layout. Author Keywords compositing window management, visual saliency, space

Manuela Waldner; Markus Steinberger; Raphael Grasset; Dieter Schmalstieg

2011-01-01T23:59:59.000Z

347

A flexible location management scheme for mobile computing  

E-Print Network (OSTI)

Location management for mobile users is an important issue in distributed, mobile computing environments. In this thesis, I propose a flexible location management scheme on the Internet to support mobile users. The proposed scheme supports location search and update operations based on a data replication technique. I implemented the proposed scheme as an experimental prototype using ORACLE Distributed Database Management System (DDBMS), where two clients access independent database objects on one server to simulate the behavior of a distributed system.

Zhang, Ying

1996-01-01T23:59:59.000Z

348

The Energy Access Situation in Developing Countries | Open Energy  

Open Energy Info (EERE)

Energy Access Situation in Developing Countries Energy Access Situation in Developing Countries Jump to: navigation, search Tool Summary Name: The Energy Access Situation in Developing Countries Agency/Company /Organization: World Health Organization (WHO), United Nations Development Programme (UNDP) Sector: Energy Focus Area: Renewable Energy, Biomass, Energy Efficiency Topics: Co-benefits assessment, - Energy Access, - Health Resource Type: Presentation, Technical report User Interface: Website Website: www.who.int/indoorair/publications/energyaccesssituation/en/index.html Cost: Free A Review focusing on the Least Developed Countries and Sub-Saharan Africa The "Energy Access Situation in Developing Countries - A Review focusing on the Least Developed Countries and Sub-Saharan Africa" report draws

349

SVOPME: A scalable virtual organization privileges management environment  

Science Conference Proceedings (OSTI)

Grids enable uniform access to resources by implementing standard interfaces to resource gateways. In the Open Science Grid (OSG), privileges are granted on the basis of the user's membership to a Virtual Organization (VO). However, Grid sites are solely responsible to determine and control access privileges to resources using users identity and personal attributes, which are available through Grid credentials. While this guarantees full control on access rights to the sites, it makes VO privileges heterogeneous throughout the Grid and hardly fits with the Grid paradigm of uniform access to resources. To address these challenges, we are developing the Scalable Virtual Organization Privileges Management Environment (SVOPME), which provides tools for VOs to define and publish desired privileges and assists sites to provide the appropriate access policies. Moreover, SVOPME provides tools for Grid sites to analyze site access policies for various resources, verify compliance with preferred VO policies, and generate directives for site administrators on how the local access policies can be amended to achieve such compliance without taking control of local configurations away from site administrators. This paper discusses what access policies are of interest to the OSG community and how SVOPME implements privilege management for OSG.

Garzoglio, Gabriele; /Fermilab; Wang, Nanbor; /Tech-X, Boulder; Sfiligoi, Igor; Levshina, Tanya; /Fermilab; Anathan, Balamurali; /Tech-X, Boulder

2009-05-01T23:59:59.000Z

350

Safety & Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Coordination Management andor Coordination of APS Site WorkServices Safety & Emergency Management Database Maintenance Personnel Safety & Emergency Management Area...

351

Mozambique-Biofuels, Land Access and Rural Livelihoods | Open Energy  

Open Energy Info (EERE)

Biofuels, Land Access and Rural Livelihoods Biofuels, Land Access and Rural Livelihoods Jump to: navigation, search Name Mozambique-Biofuels, Land Access and Rural Livelihoods Agency/Company /Organization International Institute for Environment and Development Sector Energy, Land Focus Area Biomass, - Biofuels, Forestry, Agriculture Topics Implementation, Co-benefits assessment, - Energy Access, Resource assessment, Background analysis Resource Type Publications, Case studies/examples Website http://www.iied.org/pubs/pdfs/ Country Mozambique UN Region Eastern Africa References Mozambique-Biofuels, Land Access and Rural Livelihoods[1] Mozambique-Biofuels, Land Access and Rural Livelihoods Screenshot Background "This report documents how the spread of biofuels is affecting land access for poorer groups in Mozambique, and what actions are being taken,

352

Access to Climate Change Technology by Developing Countries | Open Energy  

Open Energy Info (EERE)

Access to Climate Change Technology by Developing Countries Access to Climate Change Technology by Developing Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Access to Climate Change Technology by Developing Countries Agency/Company /Organization: International Centre for Trade and Sustainable Development Sector: Energy, Land Focus Area: Renewable Energy Topics: Finance, Implementation Resource Type: Publications, Guide/manual Website: ictsd.org/downloads/2009/11/access-to-climate-change-technology-by-dev Access to Climate Change Technology by Developing Countries Screenshot References: Developing Country-Access to CC Tech[1] "The paper critically examines various approaches that have been suggested for achieving greater access to climate change technology by developing countries, including compulsory licensing, patent pools, patent databases

353

City of Boulder - Solar Access Ordinance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access Ordinance Access Ordinance City of Boulder - Solar Access Ordinance < Back Eligibility Construction Residential Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Buying & Making Electricity Water Heating Program Info State Colorado Program Type Solar/Wind Access Policy Provider City of Boulder The City of Boulder's solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted shading by new construction. A solar access permit is available to those who have installed or who plan to install a solar energy system and need more protection than is provided by the ordinance. For new developments, all units which are not planned to

354

UN-Energy-Measuring Energy Access | Open Energy Information  

Open Energy Info (EERE)

UN-Energy-Measuring Energy Access UN-Energy-Measuring Energy Access Jump to: navigation, search Tool Summary LAUNCH TOOL Name: UN-Energy-Measuring Energy Access Agency/Company /Organization: United Nations Energy Knowledge Network (UN-Energy) Sector: Energy Focus Area: Renewable Energy, Non-renewable Energy Topics: Co-benefits assessment, - Energy Access Resource Type: Dataset, Maps Website: www.un-energy.org/measuring-energy-access Cost: Free Language: English UN-Energy-Measuring Energy Access Screenshot References: UN-Energy-Measuring Energy Access[1] "A reliable and comprehensive information base is necessary to inform target-setting and to monitor outcomes. Openly available and visually attractive information presentation can support the design of innovative policies and measures, and underpin detailed analysis. UN-Energy, the

355

Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Alternative Fuel Alternative Fuel Vehicle (AFV) Access to Tunnels to someone by E-mail Share Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Facebook Tweet about Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Twitter Bookmark Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Google Bookmark Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Delicious Rank Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Digg Find More places to share Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

356

Management Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

Immobilization Research Immobilization Research Kurt Gerdes U.S. DOE, Office of Engineering and Technology John Vienna Pacific Northwest National Laboratory Environmental Management May 19, 2009 2009 Hanford - Idaho - Savannah River Technical Exchange 2 Objectives Perform research and development to advance the waste stabilization technology options by through closely- coupled theory, experimentation, and modeling Develop solutions for Hanford, Idaho, Savannah River, and Oak Ridge wastes challenges (along with facilitating management of future wastes) Environmental Management General Approach Balance between near-term incremental technology improvements and long-term transformational solutions Address the requirements for high risk waste streams - high-level tank waste (RPP, SRS)

357

Federal Energy Management Program: Federal Energy Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Energy Management Program Contacts to someone by E-mail Share Federal Energy Management Program: Federal Energy Management Program Contacts on Facebook Tweet about Federal...

358

Federal Energy Management Program: Energy Management Requirements...  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Requirements by Subject to someone by E-mail Share Federal Energy Management Program: Energy Management Requirements by Subject on Facebook Tweet about Federal...

359

Environmental Management Waste Management Facility (EMWMF) at...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Skip to main content Energy.gov Office of Environmental Management Search form Search Office of Environmental Management Services Waste Management Site & Facility Restoration...

360

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water-Efficient Irrigation on Facebook Tweet about Federal Energy Management Program: Best...

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Federal Energy Management Program: Computerized Maintenance Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Computerized Maintenance Management Systems Computerized maintenance management systems (CMMS) are a type of management software that perform functions in support of operations and...

362

Organization Update Assistant Manager for Environmental Management  

NLE Websites -- All DOE Office Websites (Extended Search)

EM-90 Office of the Manager Mark Whitney, Manager Sue Cange, Deputy Manager Brenda Hawks, Senior Technical Advisor Karen Ott, Chief of Staff Karen Forester, Administrative...

363

Access Energy Coop | Open Energy Information  

Open Energy Info (EERE)

Coop Coop Jump to: navigation, search Name Access Energy Coop Place Iowa Utility Id 16611 Utility Location Yes Ownership C NERC Location SERC NERC SERC Yes ISO Other Yes Activity Distribution Yes Alt Fuel Vehicle Yes Alt Fuel Vehicle2 Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Interruptible Large Power Rate* Industrial Large Commercial Rate Commercial Large Power Rate Schedule Industrial Residential Single Phase Rate Residential Security Lights HPS 100 W Lighting Security Lights HPS 1000 W Lighting Security Lights HPS 250 W Lighting Security Lights HPS 400 W Lighting

364

Work Manager  

Science Conference Proceedings (OSTI)

A real-time control system has been developed and deployed nationally to support BTs work management programme. This paper traces the history, system architecture, development, deployment and service aspects of this very large programme. Many ...

G. J. Garwood

1997-01-01T23:59:59.000Z

365

Airflow Management  

Science Conference Proceedings (OSTI)

This technical update provides an overview of airflow management, with an emphasis on how reduced airflow can improve energy efficiency in data centers. Airflow management within a data center can have a dramatic impact on energy efficiency. Typically, much more cold air circulates within conventional data centers than is actually needed to cool equipment related to information and communication technology (ICT). It is not uncommon for facilities to supply more than two to three times the minimum require...

2011-12-14T23:59:59.000Z

366

Management Solution  

E-Print Network (OSTI)

MEMO: Request for proposal for Computer-Aided Facilities and Maintenance Management application software; professional services; development services for interfaces to Financial Management and Human Resources systems; configuration, test, train, maintenance and support services to implement and maintain a CAFM Solution for the California Administrative Office of the Courts, the Trial Courts, the Appellate Courts and the Judicial Council, known as The AOC Group. You are invited to review and respond to the attached Request for Proposal (RFP):

Rfp Number Isdcafm

2004-01-01T23:59:59.000Z

367

Microsoft Word - TIA Reply Comments DOE NBP RFI Data Access.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2010 26, 2010 US Department of Energy Office of the General Counsel 1000 Independence Avenue, SW Room 6A245 Washington, DC 20585 Re: NBP RFI-Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use and Privacy Introduction Smart grid provides consumers with unprecedented access and control of their electricity usage, and it provides utilities with the ability to manage the electric grid with significantly greater efficiency. As the end-users, TIA believes consumers will ultimately determine how successful the smart grid can become. For utility-driven smart grid solutions, utilities can only do as much as voter-accountable regulators will allow. The success of consumer-driven smart grid solutions will rest entirely on consumer value and

368

Microsoft Word - CX-Cardwell-Cowlitz2011AccessRoad_WEB.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

KEP-4 KEP-4 SUBJECT: Environmental Clearance Memorandum Rick Ross Project Manager - TELF-TPP-3 Proposed Action: Access road maintenance on or leading to the Cardwell-Cowlitz No.1, 115-kilovolt (kV) transmission line. Budget Information: Work Order #00281014 PP&A Project No.: 2020 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine maintenance activities... for...rights-of-way, infrastructures (e.g.. roads)... routine maintenance activities, corrective...are required to maintain and preserve infrastructures...in a condition suitable for the facility to be used for its designated purpose. Location: The project area consists of Bonneville Power Administration (BPA) access roads located on or leading to the Cardwell-Cowlitz No. 1, 115-kV transmission line right-of-way.

369

Microsoft Word - CX-AccessRoads-KingCoWA-FY13_WEB.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

22, 2013 22, 2013 REPLY TO ATTN OF: KEPR-Covington SUBJECT: Environmental Clearance Memorandum Rick Ross Engineer - TELF-TPP-3 Proposed Action: Covington District Culvert Replacements Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): Appendix B1.3, Routine Maintenance Location: King County, WA Proposed by: Bonneville Power Administration (BPA) Description of the Proposed Action: BPA is proposing to replace existing culverts at 12 access road stream crossings that present barriers to fish passage. These improvements will be made on BPA easement access roads within DNR owned and managed lands. BPA will make these improvements by installing new fish friendly culverts and/or bridges at each stream crossing. The current stream crossings do not meet DNR fish passage standards that will be in

370

Microsoft Word - CX-GarrisonSubstationAccessRoadImprovementFY13_WEB.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2013 8, 2013 REPLY TO ATTN OF: KEPR-Bell-1 SUBJECT: Environmental Clearance Memorandum Jonathan Malmberg Project Manager - TETQ-TPP-3 Proposed Action: Maintenance along sections of the access road leading to Bonneville Power Administration's (BPA) Garrison Substation PP&A Project No.: 2609 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine Maintenance. B1.13 Pathways, short access roads, and rail lines. Location: As identified in table below: Township Range Section County 9N 11W 14, 13, 24 Powell 9N 10W 19, 30, 20 Powell Proposed by: BPA Description of the Proposed Action: BPA proposes repairing a corrugated metal pipe end; making minor asphalt repairs; and grading, shaping, compacting, and placing road aggregate on 20,005 linear feet

371

Microsoft Word - CX-McNary-SantiamAccessRoad_WEB.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

James Semrau Project Manager - TELF-TPP-3 Proposed Action: Access road maintenance along the McNary-Santiam 230-kV and Jones Canyon-Santiam 230-kV transmission line corridors. Budget Information: WO #00292092 PP&A Project No.: 2044 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B1.3 Routine maintenance activities... for...rights-of-way, infrastructures (e.g.. roads)... routine maintenance activities, corrective...are required to maintain and preserve infrastructures...in a condition suitable for the facility to be used for its designated purpose. Location: The project area consists of Bonneville Power Administration (BPA) access roads located on the McNary-Santiam (structure 123/1) & Jones Canyon-Santiam (structure 75/1)

372

Estimating solar access of typical residential rooftops: A case study in San Jose, CA  

E-Print Network (OSTI)

the solar access of rooftop solar-energy systems, includingthe solar access of rooftop solar-energy systems, includingof shading on residential rooftop solar access in various

Levinson, Ronnen M

2008-01-01T23:59:59.000Z

373

A KNOWLEDGE BASED SYSTEM FOR PROVIDING INTELLIGENT ACCESS TO A PETROLEUM USER DATABASE  

E-Print Network (OSTI)

INTELLIGENT ACCESS TO A PETROLEUM USER DATABASE StevenINTELLIGENT ACCESS TO A PETROLEUM USER DATABASE StevenINTELLIGENT ACCESS TO A PETROLEUM USER DATABASE Steven

Rosenberg, Steven

2011-01-01T23:59:59.000Z

374

BNL | Center for Functional Nanomaterials Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Management at CFN Data Management at CFN The Center for Functional Nanomaterials encourages Users to bring with them high capacity data storage drives (such as flash drives or portable hard-disk drives), which will allow them to manage their data on their own computers. The transfer of data is conducted consistently on secondary, data-retrieval computers. The CFN currently offers several resources for Users to manage their data: The CFN provides all onsite Users the opportunity to acquire an account on a CFN-dedicated computer server. This data server, which is managed by BNL's Information Technology Division (ITD), provides Users with a location to store data that was obtained at CFN, to which the Users may have access after departing CFN at the conclusion of an onsite visit.

375

General Guidance on Data Usage and Management  

NLE Websites -- All DOE Office Websites (Extended Search)

General Guidance on Data Usage and Management General Guidance on Data Usage and Management Summary Data Usage Credit Data Management and Documentation: Introduction Our philosophy Data management Record measured values Zero versus missing value Metadata Data documentation Define variables Specify units Provide citations For additional information Summary Ensure long-term preservation of, and full and open access to, high-quality data sets Give proper credit to the researchers providing the data Provide thorough, yet simple, documentation: how the data were produced, what they mean Generate ASCII data and documentation files; they ensure readibility by virtually all users Define variable names and units Point to, or provide, important publications that further document the data Data usage CDIAC fully supports the July 1991 Policy Statements on Data Management for

376

Categorical Exclusion Determinations: Legacy Management | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Legacy Management Legacy Management Categorical Exclusion Determinations: Legacy Management Categorical Exclusion Determinations issued by Legacy Mangement. DOCUMENTS AVAILABLE FOR DOWNLOAD May 28, 2013 CX-010396: Categorical Exclusion Determination Bioremediation Injection and Related Activities at the Pinellas Site, Largo, Florida CX(s) Applied: B3.1, B6.1 Date: 05/28/2013 Location(s): Florida Offices(s): Legacy Management May 28, 2013 CX-010533: Categorical Exclusion Determination Road Maintenance on roads Used to Access Groundwater Monitoring Wells South of the Tuba City, Arizona, Uranium Mill Tailing Remedial Action Title I Site CX(s) Applied: B1.3, B3.3, B6.1 Date: 05/28/2013 Location(s): Arizona Offices(s): Legacy Management November 2, 2012 CX-009399: Categorical Exclusion Determination

377

U.S. Department of Energy Office of Legacy Management  

Office of Legacy Management (LM)

U.S. Department of Energy Office of Legacy Management U.S. Department of Energy Office of Legacy Management LMS 3047FER Page 1 of 2 02/02/2010 Fernald Preserve Institutional Control Inspection Date Dec. 2011 Inspector SM Stoller Area Institutional Controls Type of Finding (See Definitions Page) Follow Up Institutional Control Signage Barrier Groundskeeping Other Description Photo? (File No.) Corrected Maintenance Req'd Cont. Observation Access Points South Access NO FINDINGS No North Access NO FINDINGS No Eco Park NO FINDINGS No Forest Demo NO FINDINGS No Perimeter Authorized Vehicle Access NO FINDINGS No Perimeter Signage NO FINDINGS No Fencing CAWWT X X Tree growing into chain link fence on north side. No X

378

Environmental Compliance Management System  

SciTech Connect

Argonne National Laboratory (ANL) is developing the Environmental Compliance Management System (ECMS) as a comprehensive, cost-effective tool to ensure (1) that the Laboratory complies with all applicable federal and state environmental laws and regulations, (2) that environmental issues and concerns are recognized and considered in the early phases of projects; and (3) that Laboratory personnel conduct Laboratory operations in the most environmentally acceptable manner. The ECMS is an expert computer system which is designed to allow project engineers to perform an environmental evaluation of their projects. The system includes a Master Program which collects basic project information, provide utility functions, and access the environmental expert modules, environmental expert system modules for each federal and state environmental law which allows the user to obtain specific information on how an individual law may affect his project; and site-specific databases which contain information necessary for effective management of the site under environmental regulations. The ECMS will have the capability to complete and print many of the necessary environmental forms required by federal and state agencies, including the Department of Energy.

Brownson, L.W.; Krsul, T.; Peralta, R.A. [Argonne National Lab., Idaho Falls, ID (United States); Knudson, D.A.; Rosignolo, C.L. [Argonne National Lab., IL (United States)

1992-09-01T23:59:59.000Z

379

Environmental Compliance Management System  

SciTech Connect

Argonne National Laboratory (ANL) is developing the Environmental Compliance Management System (ECMS) as a comprehensive, cost-effective tool to ensure (1) that the Laboratory complies with all applicable federal and state environmental laws and regulations, (2) that environmental issues and concerns are recognized and considered in the early phases of projects; and (3) that Laboratory personnel conduct Laboratory operations in the most environmentally acceptable manner. The ECMS is an expert computer system which is designed to allow project engineers to perform an environmental evaluation of their projects. The system includes a Master Program which collects basic project information, provide utility functions, and access the environmental expert modules, environmental expert system modules for each federal and state environmental law which allows the user to obtain specific information on how an individual law may affect his project; and site-specific databases which contain information necessary for effective management of the site under environmental regulations. The ECMS will have the capability to complete and print many of the necessary environmental forms required by federal and state agencies, including the Department of Energy.

Brownson, L.W.; Krsul, T.; Peralta, R.A. (Argonne National Lab., Idaho Falls, ID (United States)); Knudson, D.A.; Rosignolo, C.L. (Argonne National Lab., IL (United States))

1992-01-01T23:59:59.000Z

380

Adjudicative Guidelines for Determining Eligibility for Access to  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adjudicative Guidelines for Determining Eligibility for Access to Adjudicative Guidelines for Determining Eligibility for Access to Classified Information Adjudicative Guidelines for Determining Eligibility for Access to Classified Information Introduction. The following adjudicative guidelines are established for all U.S. government civilian and military personnel, consultants, contractors, employees of contractors, licensees, certificate holders or grantees and their employees and other individuals who require access to classified information. They apply to persons being considered for initial or continued eligibility for access to classified information, to include sensitive compartmented information and special access programs, and are to be used by government departments and agencies in all final clearance determinations. Government departments and agencies may also choose to

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Definition: Open Access Same Time Information Service | Open Energy  

Open Energy Info (EERE)

Access Same Time Information Service Access Same Time Information Service Jump to: navigation, search Dictionary.png Open Access Same Time Information Service An electronic posting system that the Transmission Service Provider maintains for transmission access data and that allows all transmission customers to view the data simultaneously.[1] View on Wikipedia Wikipedia Definition Also Known As Open Access Same-Time Information System (OASIS) Related Terms transmission lines, transmission Service Provider, system, electricity generation, transmission line References ↑ Glossary of Terms Used in Reliability Standards An inli LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ne Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Open_Access_Same_Time_Information_Service&oldid=480308"

382

Using Microfinance to Expand Access to Energy Services | Open Energy  

Open Energy Info (EERE)

Using Microfinance to Expand Access to Energy Services Using Microfinance to Expand Access to Energy Services Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Using Microfinance to Expand Access to Energy Services Agency/Company /Organization: United States Agency for International Development Sector: Energy Focus Area: Renewable Energy Topics: Co-benefits assessment, - Energy Access, Finance Resource Type: Case studies/examples, Lessons learned/best practices, Publications Website: waterwiki.net/images/6/65/File_Energy_Summary_FINAL.pdf Language: English References: Using Microfinance to Expand Access to Energy Services[1] Logo: Using Microfinance to Expand Access to Energy Services "To carry out this research, SES and the SEEP Network invited MFIs in Africa, Asia, Latin America and the Caribbean (LAC) to participate in an

383

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Access Gateway Unspecified Security Bypass 6: Citrix Access Gateway Unspecified Security Bypass Vulnerability V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway PLATFORM: Standard Edition 5.0.x prior to 5.0.4.223524. Versions 4.5.x and 4.6.x are not affected by this vulnerability ABSTRACT: A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA52479 Security Tracker Alert ID 1028255 com/id/1028255 CVE-2013-2263 Citrix Knowledge Center IMPACT ASSESSMENT: High DISCUSSION: The vulnerability could allow an unauthenticated user to gain access to network resources. IMPACT:

384

IEA-Electricity Access Database | Open Energy Information  

Open Energy Info (EERE)

IEA-Electricity Access Database IEA-Electricity Access Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: IEA-Electricity Access Database Agency/Company /Organization: International Energy Agency (IEA) Topics: Co-benefits assessment, - Energy Access Resource Type: Dataset Website: www.iea.org/weo/electricity.asp Language: English IEA-Electricity Access Database Screenshot References: Electricity Access Database[1] "In a continuing effort to improve our understanding of the electrification process, we have updated, for the fifth time, the database on electrification rates that we first built for WEO-2002. The database shows detailed data on urban and rural electrification collected from industry, national surveys and international sources. Based on this updated analysis,

385

Measuring Energy Access: Supporting a Global Target | Open Energy  

Open Energy Info (EERE)

Measuring Energy Access: Supporting a Global Target Measuring Energy Access: Supporting a Global Target Jump to: navigation, search Tool Summary Name: Measuring Energy Access: Supporting a Global Target Agency/Company /Organization: Columbia University Sector: Energy Focus Area: Renewable Energy, Non-renewable Energy Topics: Co-benefits assessment, - Energy Access Resource Type: Publications Website: www.unido.org/fileadmin/user_media/Services/Energy_and_Climate_Change/ Cost: Free Language: English References: Measuring Energy Access: Supporting a Global Target[1] "This paper first describes the relevant context, definitions, data, and links to national policies and energy planning. Section 2 reviews relevant development and energy metrics. Several options for measuring energy access are then presented in section 3. Finally, Section 4 offers thoughts on

386

OpenEI:Utility data access map | Open Energy Information  

Open Energy Info (EERE)

Utility data access map Utility data access map Jump to: navigation, search Ret Utility Data Access Map Having access to your electricity use data is a very important step in understanding your overall energy usage. Comparing historical data to your current usage is one way to see trends and determine ways for reducing electricity costs and improving overall efficiency. We asked all U.S. electric utility companies to tell us how accessible their electricity use data is for both residential and commercial customers. The results are updated live based on the responses we have to date. As more utilities provide information, the utility boundaries will be automatically colored and the overall map will become more complete. Try searching for your utility company to see your electricity data access options.

387

Overview of Access Authorization Process for Applicants, May, 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Overview of Access Authorization Process for Applicants, May, 2013 Overview of Access Authorization Process for Applicants, May, 2013 Overview of Access Authorization Process for Applicants, May, 2013 May, 2013 This overview will help individuals new to the process understand what it means to obtain and maintain a Department of Energy (DOE) security clearance or access authorization This overview will help individuals new to the process understand what it means to obtain and maintain a Department of Energy (DOE) security clearance or access authorization. You are a part of a select group of individuals who are being considered for access to classified information maintained by DOE. As you know, the protection of classified information is very important to our national security. Generally, classified information is official information or material that requires protection in

388

Automotive Accessibility and Efficiency Meet in the Innovative MV-1 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Automotive Accessibility and Efficiency Meet in the Innovative MV-1 Automotive Accessibility and Efficiency Meet in the Innovative MV-1 Automotive Accessibility and Efficiency Meet in the Innovative MV-1 March 11, 2011 - 4:03pm Addthis The MV-1, a new wheelchair accessible, fuel-efficient vehicle | Photo Courtesy of Vehicle Production Group The MV-1, a new wheelchair accessible, fuel-efficient vehicle | Photo Courtesy of Vehicle Production Group Daniel B. Poneman Daniel B. Poneman Deputy Secretary of Energy Yesterday, the Department of Energy announced that we've now finalized a loan for nearly $50 million to the Vehicle Production Group - or VPG. The project will support the development and manufacturing of a new wheelchair accessible, fuel-efficient car, the MV-1, that will run on compressed natural gas instead of gasoline, produce low emissions, and create 900 jobs

389

MANAGEMENT SUMMARY  

E-Print Network (OSTI)

need to effectively manage business performance. This has never been more true than in todays complex, highly regulated and confusing business environment which requires better decisions and improved execution now! In spite of the billions of dollars invested in infor-mation technology to address these challenges, managers and executives in many organizations still make key decisions underpinned by their own personal versions of documents and spread-sheets. Their organization struggles to provide a seamless flow of trusted information between customers, suppliers and their employees. The result is that most organizations cannot provide their people with the right information at the right time, and in attempting to do so are committing significant resources to compiling and auditing numbers instead of using them to inform the business. Consequently, they are far more reac-tive than proactive and ultimately they are not efficiently and effectively managing their current and future performance. Leading organizations are investing in managing information and developing predictive insights to drive sustainable business results. These com-panies have become masters in Performance Management- going beyond mere users of business intelligence to become the Intelligent Enterprises. ...a new breed of company is upping the stakes....have dominated their fields by deploy-ing industrial-strength analytics across a wide variety of activities. In essence, they are trans-forming their organiza-tions into armies of killer apps and crunching their way to victory.

unknown authors

2006-01-01T23:59:59.000Z

390

Quality System Documentation Management  

Science Conference Proceedings (OSTI)

Quality System Documentation Management. ... Minutes, summaries, or notes from Management Meetings of significance are archived here. ...

2012-08-21T23:59:59.000Z

391

NIST Performance Management Program  

Science Conference Proceedings (OSTI)

NIST Performance Management Program. Performance ... appraisal. APMS and FWS Performance Management Programs: ...

2010-10-05T23:59:59.000Z

392

Presidential Management Fellows Program  

Science Conference Proceedings (OSTI)

Presidential Management Fellows Program. Summary: About the Program: The Presidential Management Fellows (PMF ...

2012-08-31T23:59:59.000Z

393

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... A Framework for Designing Cryptographic Key Management Systems ... A Framework for Designing Cryptographic Key Management Systems ...

2013-08-13T23:59:59.000Z

394

Environmental Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

Video Community, Environment Environmental Stewardship Environmental Protection Environmental Management System Environmental Management System An Environmental...

395

A survey on emerging broadband wireless access technologies  

Science Conference Proceedings (OSTI)

Wireless broadband technologies provide ubiquitous broadband access to wireless users, enabling services that were available only to wireline users. In this paper, we summarize emerging wireless broadband access technologies, ranging from WLANs to satellite ... Keywords: HAPs, HiperACCESS, HiperLAN, HiperMAN, IEEE 802.11, IEEE 802.16, IEEE 802.20, IEEE 802.22, Satellite, WLAN, WMAN, WWAN, WiBro, WiFi, WiMAX

Mehmet S. Kuran; Tuna Tugcu

2007-08-01T23:59:59.000Z

396

Adjudicative Guidelines for Determining Eligibility for Access to Classified Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adjudicative Guidelines for Determining Eligibility for Adjudicative Guidelines for Determining Eligibility for Access to Classified Information 1. Introduction. The following adjudicative guidelines are established for all U.S. government civilian and military personnel, consultants, contractors, employees of contractors, licensees, certificate holders or grantees and their employees and other individuals who require access to classified information. They apply to persons being considered for initial or continued eligibility for access to classified information, to include sensitive compartmented information and special access programs, and are to be used by government departments and agencies in all final clearance determinations. Government departments and agencies may also choose to apply these

397

New Web Database Improves Access to Ionic Liquid Data  

Science Conference Proceedings (OSTI)

New Web Database Improves Access to Ionic Liquid Data. ... The ILThermo portal on the web is at http://ilthermo.boulder.nist.gov.

2013-08-22T23:59:59.000Z

398

Definition: Open Access Transmission Tariff | Open Energy Information  

Open Energy Info (EERE)

navigation, search Dictionary.png Open Access Transmission Tariff Electronic transmission tariff accepted by the U.S. Federal Energy Regulatory Commission requiring the...

399

OSTP Directs Federal Agencies to Increase Public Access to Scientific...  

Office of Scientific and Technical Information (OSTI)

OSTP Directs Federal Agencies to Increase Public Access to Scientific Publications open book The White House Office of Science and Technology Policy (OSTP) has issued a major...

400

Effect of memory access and caching on high performance computing.  

E-Print Network (OSTI)

??High-performance computing is often limited by memory access. As speeds increase, processors are often waiting on data transfers to and from memory. Classic memory controllers (more)

Groening, James

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Utilization and fairness in spectrum assignment for opportunistic spectrum access  

E-Print Network (OSTI)

users channel availability and transmission power, which inits own channel availability and transmission constraints.transmission link or a broadcast access point. The channel availability

Peng, ChunYi; Zheng, Haitao; Zhao, Ben Y

2006-01-01T23:59:59.000Z

402

Role Based Access Control for the World Wide Web  

Science Conference Proceedings (OSTI)

... The other way to use RBAC/Web is to modify the UNIX Web server to call the RBAC/Web API to determine RBAC access. ...

403

Adding Attributes to Role-Based Access Control  

Science Conference Proceedings (OSTI)

... allow access if the subject is a teller working between ... Edward J. Coyne is a senior security engineer at Science ... Contact him at ed.coyne@va.gov. ...

2010-06-15T23:59:59.000Z

404

TMS and Springer Launch New and Innovative Open Access Journal  

Science Conference Proceedings (OSTI)

Oct 16, 2011... 2011 Conference & Exhibition (MS&T'11) in Columbus, Ohio, The journal will begin publishing in early 2012. Under the Open Access model,...

405

Transpiration Purging Access Probe for Particulate Laden or  

NLE Websites -- All DOE Office Websites (Extended Search)

need for sensors that tolerate dirty environments, research is currently active on the patent-pending technology "Transpiration Purging Access Probe for Particulate Laden or...

406

City of San Jose- Solar Access Design Guidelines  

Energy.gov (U.S. Department of Energy (DOE))

The San Jose Environmental Services Department has developed voluntary guidelines to encourage solar orientation in new construction. These Solar Access Design Guidelines specify that the long...

407

Tri-Party Agreement databases, access mechanism and procedures  

SciTech Connect

This document contains the information required for the Washington State Department of Ecology (Ecology) and the US Environmental Protection Agency (EPA) to access databases related to the Hanford Federal Facility Agreement and Consent Order [also known as the Tri-Party Agreement (TPA)] (Ecology et al. 1992). It identifies the procedure required to obtain access to the Hanford computer networks and the TPA related databases. It addresses security requirements, access methods, database availability dates, database access procedures, and the minimum computer hardware and software configurations required to operate within the Hanford networks.

Brulotte, P.J.; Christensen, K.C.

1993-10-01T23:59:59.000Z

408

Property:EnergyAccessPowerUse | Open Energy Information  

Open Energy Info (EERE)

Jump to: navigation, search Property Name EnergyAccessPowerUse Property Type String Description Power Use Retrieved from "http:en.openei.orgwindex.php?titleProperty:...

409

Property:EnergyAccessImpactAreas | Open Energy Information  

Open Energy Info (EERE)

Jump to: navigation, search Property Name EnergyAccessImpactAreas Property Type String Description Impact Areas Retrieved from "http:en.openei.orgwindex.php?titleProper...

410

Property:EnergyAccessPowerSource | Open Energy Information  

Open Energy Info (EERE)

Jump to: navigation, search Property Name EnergyAccessPowerSource Property Type String Description Power Source Retrieved from "http:en.openei.orgwindex.php?titleProper...

411

Digital Materiality: Preserving Access to Computers as Complete Environments  

E-Print Network (OSTI)

J. 1982. Living with a Computer. The Atlantic (July).Preserving Access to Computers as Complete Environmentsthat account for the computer as a complete artifact and

2009-01-01T23:59:59.000Z

412

"This past month Sandy Ressler of the Information Access ...  

Science Conference Proceedings (OSTI)

... In recent months, Sandy Ressler of the Information Access Division has presented keynote talks entitled "Beer Bellies, Bountiful Behinds and other ...

413

Microsoft Word - Managing Your iSupplier Profile Job Aid R12 05092012.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

of Contents of Contents Summary of Your iSupplier Profile...........................................................................................................................2 Accessing Your Account for the First Time.............................................................................................................2 Navigating to Your Profile.........................................................................................................................................3 Company Information (a.k.a. Profile Management)............................................................................................4 Organization...............................................................................................................................................................5

414

China: International Trade and WTO Accession  

E-Print Network (OSTI)

This Working Paper should not be reported as representing the views of the IMF. The views expressed in this Working Paper are those of the author(s) and do not necessarily represent those of the IMF or IMF policy. Working Papers describe research in progress by the author(s) and are published to elicit comments and to further debate. Chinas increasing integration with the global economy has contributed to sustained growth in international trade. Its exports have become more diversified, and greater penetration of industrial country markets has been accompanied by a surge in Chinas imports from all regionsespecially Asia, where China plays an increasingly central role in regional specialization. Tariff reforms have been implemented in China since the 1980s; and, with its recent WTO accession, China has committed itself to additional reforms that are farreaching and challenging. Sustained implementation of these commitments would further deepen Chinas international integration and generate benefits for most partner countries.

Thomas Rumbaugh; Nicolas Blancher; International Monetary; Fund Wp; Prepared Thomas Rumbaugh; Nicolas Blancher

2004-01-01T23:59:59.000Z

415

Carbon Balance and Management BioMed Central Editorial Welcome to Carbon Balance and Management  

E-Print Network (OSTI)

which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. We are pleased to announce the launch of Carbon Balance and Management, a new online open access journal published by BioMed Central. Carbon Balance and Management Carbon Balance and Management is a new open access, peer-reviewed online journal that encompasses all aspects of research aimed at developing a comprehensive, policyrelevant understanding of the global carbon cycle [1]. Advancement in the union of the two issues indicted by the journal's title will be a very important element of future global economic and societal development. We must develop predictive and observational capabilities to determine how carbon systems are changing now and how they will be changing in the future, and we must

Robert Dickinson

2006-01-01T23:59:59.000Z

416

Security of Distributed Data Management  

E-Print Network (OSTI)

Security is a pervasive concept that cannot be decoupled from any distributed systems design. The constraints imposed by security considerations have a profound impact on the overall design of the services and interfaces of any Grid middleware and infrastructure, especially for data management. In this article we discuss the requirements, architecture and design of the security mechanisms that can be put in place for distributed data management. The advantages and disadvantages of different solutions and deployment models are discussed. We illustrate the discussion using the implementation of the EU funded Enabling Grids for E-SciencE (EGEE) project. We direct our focus on the security aspects of data access, data replication, data location and data consistency and how the security requirements of the applications are being addressed in the EGEE middleware stack gLite.

Frohner, A; Brito da Rocha, R; Laure, E

2006-01-01T23:59:59.000Z

417

Search Hanford accessible reports electronically system design description. Revision 1  

SciTech Connect

The Search Hanford Accessible Records Electronically (SHARE) system was produced by a combined team of personnel from Westinghouse Hanford Company (WHC) Corrective Action Data Systems (CADS) and Information Resource Management (IRM) Information and Scientific Systems (ISS) organizations. The ESQD Text Evaluation and exchange Tool (ETEXT) prototype was used as a basis for the requirements used to support this design/build effort. TOPIC was used to build the SHARE application. TOPIC is a text search and retrieval software product produced by the Verity Corporation. The TOPIC source code is not provided with the product, and the programs cannot be changed. TOPIC can be customized for special requirements. The software is fully documented. Help messages, menu and screen layouts, command edits and options, and internal system design are all described in the TOPIC documentation. This System Design Description (SDD) will not reiterate the TOPIC documentation and design. Instead, it will focus on the SHARE installation of TOPIC. This SDD is designed to assist the SHARE database/infobase administrator (DBA) in maintaining and supporting the application. It assumes that the assigned DBA is knowledgeable in using the TOPIC product, and is also knowledgeable in using a personal computer (PC), Disk Operating System (DOS) commands, and the document WHC-CM-3-10. SHARE is an Impact Level 4 system, and all activities related to SHARE must conform with the WHC-CM-3-10 procedures for an Impact Level 4 system. The Alternatives Analysis will be treated as a level 3-Q document, to allow for reference by potential future projects.

Gilomen, T.L.

1995-12-31T23:59:59.000Z

418

PUBLIC ACCESS: 955 LEnfant Plaza North, SW, Suite 1500, Washington, DC  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

th th Meeting Unconventional Resources Technology Advisory Committee July 14, 2009 1:00 p.m. EASTERN WebEx/Conference Call Meeting PUBLIC ACCESS: 955 L'Enfant Plaza North, SW, Suite 1500, Washington, DC AGENDA 12:30 Registration; Begin call in to 800-number and login to WebEx Members, Chair, Designated Federal Officer, and Committee Manager 1:00 Call to Order - Welcome Chris Hall, Committee Chair Member Roll Call and the presence of a quorum Elena Melchert Committee Manager Meeting purpose and review of the agenda; Insights regarding future funding and other pending legislation; Draft 2010 Annual Plan delivery, and pending meetings in September and October 2009 Guido DeHoratiis Designated Federal Officer 1:25 Report from the Standing Subcommittee and

419

Efficient and robust multiple access control for wireless multimedia services  

Science Conference Proceedings (OSTI)

In this paper, we propose a new multiple access control (MAC) protocol for wireless distributed multimedia systems based on ATM, in which user demands are highly heterogeneous and can be classified as CBR, VBR, and ABR. Our protocol is motivated by two ... Keywords: FDD, TDMA, adaptive protocol, multiple access control, wireless ATM, wireless multimedia

Yu-Kwong Kwok; Vincent K. N. Lau

2000-10-01T23:59:59.000Z

420

Test Access Mechanism Optimization, Test Scheduling, and Tester Data Volume  

E-Print Network (OSTI)

Test Access Mechanism Optimization, Test Scheduling, and Tester Data Volume Reduction for System Marinissen, Senior Member, IEEE Abstract--We describe an integrated framework for system-on-chip (SOC) test automation. Our framework is based on a new test access mechanism (TAM) architecture consisting of flexible

Chakrabarty, Krishnendu

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Accessible interactive television using the MPEG-21 standard  

Science Conference Proceedings (OSTI)

In this paper, the accessibility of interactive television (iTV) is discussed as a primary factor for its satisfactory adoption and commercial success. The work presented here is undertaken in the context of a research project that focuses on delivering ... Keywords: Accessible interactive TV, Collaborative filtering, Content adaptation approach, MPEG-21, Metadata, Pervasive environments

Evangelos Vlachogiannis; Damianos Gavalas; George E. Tsekouras; Christos N. Anagnostopoulos

2011-06-01T23:59:59.000Z

422

Throughput and Channel Access Statistics of Generalized Selection Multiuser Scheduling  

Science Conference Proceedings (OSTI)

To provide a near-optimal low-complexity solution to parallel multiuser scheduling in code-division multiple-access (CDMA), we propose generalized selection multiuser diversity (GSMuD) schemes with multi-code channel assignment and analyze their performance. ... Keywords: Multiuser diversity, channel access statistics, fairness, generalized fading channels, multicode CDMA, throughput

Yao Ma; Jinghua Jin; Dongbo Zhang

2008-08-01T23:59:59.000Z

423

An orthogonal access modifier model for feature-oriented programming  

Science Conference Proceedings (OSTI)

In feature-oriented programming (FOP), a programmer decomposes a program in terms of features. Ideally, features are implemented modularly so that they can be developed in isolation. Access control is an important ingredient to attain feature ... Keywords: feature-oriented programming, orthogonal access modifier model

Sven Apel; Jrg Liebig; Christian Kstner; Martin Kuhlemann; Thomas Leich

2009-10-01T23:59:59.000Z

424

Memory access problems in block cyclic reduction on vector computers  

Science Conference Proceedings (OSTI)

In the present paper, modifications of block cyclic reduction are introduced by which the often significant memory access problems of this method on vector computers can be drastically reduced. The modifications are discussed in the context of an interval ... Keywords: Block cyclic reduction, interval arithmetics, memory access problems, vector computers

Hartmut Schwandt

1991-06-01T23:59:59.000Z

425

DISTRIBUTED COGNITIVE MAC FOR ENERGY-CONSTRAINED OPPORTUNISTIC SPECTRUM ACCESS  

E-Print Network (OSTI)

DISTRIBUTED COGNITIVE MAC FOR ENERGY-CONSTRAINED OPPORTUNISTIC SPECTRUM ACCESS Yunxia Chen, Qing@arl.army.mil ABSTRACT We address the design of distributed cognitive medium ac- cess control (MAC) protocols for opportunistic spectrum access (OSA) under an energy constraint on the secondary users. The objective

Islam, M. Saif

426

A static type system for JVM access control  

Science Conference Proceedings (OSTI)

This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementation. In addition to verifying type consistency of a given JVM code, the ... Keywords: JVM, access control, stack inspection, type inference, type system

Tomoyuki Higuchi; Atsushi Ohori

2003-08-01T23:59:59.000Z

427

Efficient IRM enforcement of history-based access control policies  

Science Conference Proceedings (OSTI)

Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an untrusted program in order to track its execution history. The injected code ... Keywords: distributed optimization protocol, history-based access control policies, inlined reference monitors, language-based security, security automata

Fei Yan; Philip W. L. Fong

2009-03-01T23:59:59.000Z

428

A transformation contract to generate aspects from access control policies  

Science Conference Proceedings (OSTI)

Access control is an important security issue. It has been addressed since the late 1960s in the early time-sharing computer systems. Many access control models have been proposed since than but of particular interest is Ferraiolo and Khun's role-based ...

Christiano Braga

2011-07-01T23:59:59.000Z

429

The landlocked island: Information access and communications policy in Nepal  

Science Conference Proceedings (OSTI)

This paper examines information access in Nepal, its current limitations, and opportunities for expansion, particularly in rural areas. It argues that government policies and the regulatory environment have failed to create the competition necessary ... Keywords: Competition, Information access, Nepal, Rural development, Telecommunications

Robin Shields

2009-04-01T23:59:59.000Z

430

THE PUSH TOWARD GRID REGIONALIZATION IN OPEN ACCESS TRANSMISSION SYSTEMS  

E-Print Network (OSTI)

for the establishment of open access transmission in the US, while the Electricity Directive 96/92 of the European Union robust competition in wholesale electricity markets and mandate transmission-owning utilities to provideTHE PUSH TOWARD GRID REGIONALIZATION IN OPEN ACCESS TRANSMISSION SYSTEMS ProfessorGeorge Gross

Gross, George

431

Reframing Teachers' Conceptions of Accessible E-Learning Designs  

Science Conference Proceedings (OSTI)

This paper presents the results of a small-scale research project carried out in an English Higher Education institution which aimed to identify teachers understanding of accessible designs in relation to pedagogical situations where ... Keywords: accessible design, elearning design, inclusion, pedagogy

ric Bel; Emma Bradburn

2008-07-01T23:59:59.000Z

432

Opening up access to online documents using essentiality tracks  

Science Conference Proceedings (OSTI)

This paper discusses extensions to the previously developed "essentiality and proficiency" approach to increasing usability and accessibility of websites. The existing approach is introduced, as is a new application in the processing of Doc-Book XML ... Keywords: DocBook, XML, accessibility, essentiality, proficiency, usability, web

Matthew T. Atkinson; Jatinder Dhiensa; Colin H. C. Machin

2006-05-01T23:59:59.000Z

433

Structure for common access and support of fuel cell stacks  

DOE Patents (OSTI)

A structure provides common support and access to multiple fuel cells externally mounted thereto. The structure has openings leading to passages defined therein for providing the access. Various other fuel cell power system components are connected at the openings, such as reactant and coolant sources.

Walsh, Michael M. (Fairfield, CT)

2000-01-01T23:59:59.000Z

434

Windows Access Control Demystified Sudhakar Govindavajhala and Andrew W. Appel  

E-Print Network (OSTI)

ACM Conference on Computer and Communications Security, Washington, DC, November 2002. [2] R. BaldwinWindows Access Control Demystified Sudhakar Govindavajhala and Andrew W. Appel Princeton University of a single host with commonly used software. We have constructed a logical model of Windows XP access control

Appel, Andrew W.

435

Windows File Sharing / Accessing Samba Shares General Notes  

E-Print Network (OSTI)

Windows File Sharing / Accessing Samba Shares General Notes · When mapping a drive on a Windows XP from any Windows machine, before you can share a folder or access a shared folder, you need to have the File and Print Sharing enabled in the Windows Firewall exceptions list. Creating Shares: To Create

Firtel, Richard A.

436

ACConv -- An Access Control Model for Conversational Web Services  

Science Conference Proceedings (OSTI)

With organizations increasingly depending on Web services to build complex applications, security and privacy concerns including the protection of access control policies are becoming a serious issue. Ideally, service providers would like to make sure ... Keywords: Web services, access control, conversations

Federica Paci; Massimo Mecella; Mourad Ouzzani; Elisa Bertino

2011-07-01T23:59:59.000Z

437

Towards a task oriented method for accessing network based services  

Science Conference Proceedings (OSTI)

Today's networked users are required to configure a number of different network settings on their computer in order to access specific network based services. For example, these users need to know whether to enable a Virtual Private Network (VPN) tunnel ... Keywords: borderless networks, flyout, identity based networking, network access, network security, networking, user credentials, user interface, virtual private network

Nils Pedersen; Paul Clark; Martine Freiberger

2010-11-01T23:59:59.000Z

438

The Energy Harvesting Multiple Access Channel with Energy Storage Losses  

E-Print Network (OSTI)

The Energy Harvesting Multiple Access Channel with Energy Storage Losses Kaya Tutuncuoglu and Aylin considers a Gaussian multiple access channel with two energy harvesting transmitters with lossy energy storage. The power allocation policy maximizing the average weighted sum rate given the energy harvesting

Yener, Aylin

439

24X7X365: mobile cloud access  

Science Conference Proceedings (OSTI)

In the present era computing technology have been evolved and integrated with other service-centric technologies to achieve better performance. Computing architecture and nature of access changed drastically the format of service-delivery model. Technologies ... Keywords: cloud, mobile access, mobile cloud, mobile services

Khalid Mohiuddin; Asharul Islam; Aftab Alam; Awais Ali

2012-09-01T23:59:59.000Z

440

A study of end-to-end web access failures  

Science Conference Proceedings (OSTI)

We present a study of end-to-end web access failures in the Internet. Part of our characterization of failures is based on directly observable end-to-end information. We also present novel analyses that reveal aspects of end-to-end failures that would ... Keywords: BGP, DNS, HTTP, TCP, web access, web failure

Venkata N. Padmanabhan; Sriram Ramabhadran; Sharad Agarwal; Jitendra Padhye

2006-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

ARM - Data Management and Documentation Plan  

NLE Websites -- All DOE Office Websites (Extended Search)

DocumentationData Management and Documentation Plan DocumentationData Management and Documentation Plan Policies, Plans, Descriptions Data Documentation Home Data Sharing and Distribution Policy Data Management and Documentation Plan Data Product Registration and Submission Reading netCDF and HDF Data Files Time in ARM netCDF Data Files Data Archive Documentation ARM Archive's Catalog of Data Streams (Updated monthly) Access to Historical ARM Data More on Understanding and Finding ARM Data Data Quality Problem Reporting Data Management and Documentation Plan Purpose This document describes datastream documentation requirements and standard formatting and naming protocols for both data users and the infrastructure who produce the data. Definitions Baseline Change Request (BCR): Used by the ARM Infrastructure as a process to provide configuration

442

Operational Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management Operational Management Aviation Management Executive Secretariat Energy Reduction at HQ Facilities and Infrastructure Federal Advisory Committee Management Freedom of...

443

Aviation Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Aviation Management Aviation Management Aviation Management Executive Secretariat Energy Reduction at HQ Facilities and Infrastructure Federal Advisory Committee Management Freedom...

444

Security Survey of Internet Browsers Data Managers  

E-Print Network (OSTI)

The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. The paper describes how the browser protects the sensitive data and how an attacker or a forensic analyst can access it.

Boja, Catalin

2011-01-01T23:59:59.000Z

445

Proposed Open Access Requirement for International Electric Transmission  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Proposed Open Access Requirement for International Electric Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Notice is given of the Department of Energy's (DOE or Department) intention to amend existing Presidential permits issued for the construction, operation, maintenance, or connection of facilities at the international border for the transmission of electric energy between the United States and foreign countries to require permit holders to provide ondiscriminatory open access transmission services. The open access

446

Mongolia Renewable Energy and Rural Electricity Access Project | Open  

Open Energy Info (EERE)

Mongolia Renewable Energy and Rural Electricity Access Project Mongolia Renewable Energy and Rural Electricity Access Project Jump to: navigation, search Name of project Mongolia Renewable Energy and Rural Electricity Access Project Location of project Mongolia Energy Services Lighting, Cooking and water heating, Space heating, Cooling, Earning a living Year initiated 2006 Organization World Bank Website http://documents.worldbank.org Coordinates 46.862496°, 103.846656° References The World Bank[1] The objective of the Renewable Energy and Rural Electricity Access Project is to increase access to electricity and improve reliability of electricity service among the herder population and in off-grid soum centers by: (i) assisting the development of institutions and delivery mechanisms; (ii) facilitating herders' investments in Solar Home Systems (SHSs) and small

447

Re: NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Re: NBP RFI: Data Access Re: NBP RFI: Data Access Re: NBP RFI: Data Access The Consumer Electronics Association ("CEA") respectfully submits this response to the Department of Energy's ("DOE") Request for Information on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy ("RFI").1 CEA is the principal U.S. trade association of the consumer electronics and information technology industries. CEA's approximately 2,000 member companies include leading manufacturers and providers of consumer- and utility-facing smart grid products and services. Re: NBP RFI: Data Access More Documents & Publications Addressing Policy and Logistical Challenges to smart grid Implementation: eMeter Response to Department of Energy RFI

448

Marin County - Solar Access Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Marin County - Solar Access Code Marin County - Solar Access Code Marin County - Solar Access Code < Back Eligibility Commercial Industrial Residential Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Program Info State California Program Type Solar/Wind Access Policy Provider Marin County Community Development Agency Marin County's Energy Conservation Code is designed to assure new subdivisions provide for future passive or natural heating or cooling opportunities in the subdivision to the extent feasible. Streets, lots, and building setbacks must be designed so that habitable buildings are oriented with their long axis running east to west (with a possible variation of thirty degrees to the southwest and thirty degrees to the southeast) for the purpose of solar access. The planning director or planning commission

449

Proposed Open Access Requirement for International Electric Transmission  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Proposed Open Access Requirement for International Electric Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Notice is given of the Department of Energy's (DOE or Department) intention to amend existing Presidential permits issued for the construction, operation, maintenance, or connection of facilities at the international border for the transmission of electric energy between the United States and foreign countries to require permit holders to provide ondiscriminatory open access transmission services. The open access

450

City of Santa Cruz - Solar Access Ordinance (California) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cruz - Solar Access Ordinance (California) Cruz - Solar Access Ordinance (California) City of Santa Cruz - Solar Access Ordinance (California) < Back Eligibility Commercial Construction Local Government Multi-Family Residential Residential Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Buying & Making Electricity Swimming Pool Heaters Water Heating Wind Program Info State California Program Type Solar/Wind Access Policy Before a development plan can be approved in the City of Santa Cruz, it must be found that the orientation and location of buildings, structures, open spaces and other features of the site plan preserve solar access of adjacent properties. In addition, buildings and structures should be designed and oriented to make use of natural elements such as solar

451

Virginia Capital Access Program (Virginia) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Capital Access Program (Virginia) Capital Access Program (Virginia) Virginia Capital Access Program (Virginia) < Back Eligibility Commercial Industrial Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Virginia Program Type Loan Program Provider Virginia Economic Development Partnership The Virginia Capital Access Program (CAP), in partnership with Virginia's Small Business Financing Authority, provides access to capital for small businesses. Businesses must apply to participating banks for a traditional loan, and the lender advises the company of enrollment in CAP. The program offers loan guarantees on a portfolio of loans through a loan loss reserve, which it establishes at each participating bank. Funds can be used for

452

City of Sebastopol - Solar Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sebastopol - Solar Access Sebastopol - Solar Access City of Sebastopol - Solar Access < Back Eligibility Local Government Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Buying & Making Electricity Water Heating Program Info State California Program Type Solar/Wind Access Policy Provider City of Sebastopol As a condition of approval of a property subdivision parcel map, the City of Sebastopol has the right to ask for dedication of solar easements for the purpose of assuring that each parcel or unit in the subdivision receives sunlight for any solar energy system. Sebastopol also has the right to place restrictions on vegetation or building that would interfere with solar access. These easements can be required as long as they do not reduce allowable densities or the percentage of a lot that can be occupied

453

Ghana Energy Development and Access Project (GEDAP) | Open Energy  

Open Energy Info (EERE)

Energy Development and Access Project (GEDAP) Energy Development and Access Project (GEDAP) Jump to: navigation, search Name of project Ghana Energy Development and Access Project (GEDAP) Location of project Ghana Energy Services Lighting, Cooking and water heating, Information and communications Year initiated 2007 Organization World Bank Website http://web.worldbank.org/exter Coordinates 7.946527°, -1.023194° References World Bank[1] The objective of the Energy Development and Access Project in Ghana is to improve the operational efficiency of the electricity distribution system and increase the population's access to electricity. This will also cause Ghana to support its transition to a low-carbon economy through the reduction of greenhouse gas emissions (GHG). The project has three main

454

Tanzania Energy Development and Access Expansion Project | Open Energy  

Open Energy Info (EERE)

Energy Development and Access Expansion Project Energy Development and Access Expansion Project Jump to: navigation, search Name of project Tanzania Energy Development and Access Expansion Project Location of project Tanzania Energy Services Lighting, Cooking and water heating, Space heating, Cooling Year initiated 2007 Organization World Bank Website http://documents.worldbank.org Coordinates -6.369028°, 34.888822° References The World Bank[1] The objective of the Energy Development and Access Expansion Project of Tanzania is to improve the quality and efficiency of the electricity service provision in the three main growth centers of Dar es Salaam, Arusha, and Kilimanjaro and to establish a sustainable basis for energy access expansion. The project is consistent with the latest Joint Assistance Strategy (2007-2010) by specifically supporting the goals of the

455

Benin: Increased Access to Modern Energy Project | Open Energy Information  

Open Energy Info (EERE)

Benin: Increased Access to Modern Energy Project Benin: Increased Access to Modern Energy Project Jump to: navigation, search Name of project Benin: Increased Access to Modern Energy Project Location of project Benin Energy Services Lighting, Cooking and water heating, Space heating, Information and communications Year initiated 2009 Organization World Bank Website http://documents.worldbank.org Coordinates 9.30769°, 2.315834° References The World Bank[1] The objective of the Increased Access to Modern Energy Project is to improve reliability, efficiency, and access to modern energy services in Benin. There are three components to the project, the first component being electrical network upgrading. This component will provide for necessary investments to allow for continued operation of the existing transmission

456

Business Models for Energy Access | Open Energy Information  

Open Energy Info (EERE)

Business Models for Energy Access Business Models for Energy Access Jump to: navigation, search Tool Summary Name: Business Models for Energy Access Agency/Company /Organization: EASE-Enabling Access to Sustainable Energy Sector: Energy Focus Area: Renewable Energy, Non-renewable Energy, Biomass, - Biomass Combustion, Grid Assessment and Integration Topics: Background analysis, Co-benefits assessment, - Energy Access Resource Type: Case studies/examples, Lessons learned/best practices, Publications Website: www.ease-web.org/wp-content/uploads/2010/11/EASE-Business-models-for-e Country: Bolivia, Tanzania, Cambodia, Uganda, Laos, Mali, Vietnam, Senegal Cost: Free South America, Eastern Africa, South-Eastern Asia, Eastern Africa, South-Eastern Asia, Western Africa, South-Eastern Asia, Western Africa

457

Promoting Access to Energy Information | OpenEI Community  

Open Energy Info (EERE)

Promoting Access to Energy Information Promoting Access to Energy Information Home > Groups > OpenEI Community Central Graham7781's picture Submitted by Graham7781(1992) Super contributor 5 April, 2010 - 12:05 imported OpenEI President Obama is being urged by Google, along with other companies, to take steps towards making energy information more easily accessible for consumers and businesses. Google and 46 other companies wrote a letter to President Obama contending that access to open energy information can help maximize the innovative and efficient use of renewable energy sources. "The letter said government can help by providing "clear" rules outlining consumer access to such information; incentives to promote the deployment of technologies; and programs that educate and engage both providers and

458

International Electricity Trade - Open Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

International Electricity Trade - International Electricity Trade - Open Access International Electricity Trade - Open Access DOE has consistently expressed its policy that international electricity trade should be subject to the same principles of comparable open access and non-discrimination that apply to transmission in interstate commerce. DOE has stated this policy in export authorizations granted to entities requesting authority to export over international transmission facilities. In those authorizations, DOE indicated it expected transmitting utilities owning cross-border facilities constructed pursuant to Presidential permits to provide access across the border in accordance with the principles of comparable open access and non-discrimination contained in the Federal Power Act and articulated in Federal Energy Regulatory Commission Order No.

459

Global Access to Energy and Fresh Water - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Access to Energy and Fresh Water Global Access to Energy and Fresh Water International Safety Projects Overview Hydrogen as an Energy Carrier Global access to energy and fresh water International cooperation on safety of nuclear plants Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr International Safety Projects Global Access to Energy and Fresh Water Bookmark and Share Water Water shortages, unreliable water supplies, and poor water quality have been considered in recent years to be major obstacles to sustainable development and poverty alleviation that require urgent attention. Over 1 billion people lack access to safe drinking water. In such areas, water shortages are increasingly limiting development options.

460

Green Button: Providing Consumers with Access to Their Energy Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Green Button: Providing Consumers with Access to Their Energy Data Green Button: Providing Consumers with Access to Their Energy Data Green Button: Providing Consumers with Access to Their Energy Data January 19, 2012 - 2:54pm Addthis Aneesh Chopra What does this mean for me? 6 million utility customers in California now have access to their electricity usage data through the Green Button program, and millions more will get access as the program expands. This article is cross-posted from the White House blog. Imagine being able to shrink your utility bill, or knowing the optimal size and cost-effectiveness of solar panels for your home, or verifying that energy-efficiency retrofit investments have successfully paid for themselves over time. Far too often these and similarly important-and potentially money-saving-opportunities are unavailable to us. Why?

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Categorical Exclusion Determinations: Environmental Management...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Management Categorical Exclusion Determinations: Environmental Management Categorical Exclusion Determinations issued by Environmental Management. DOCUMENTS AVAILABLE...

462

ORISE: Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Emergency Management Effective emergency management relies on thorough integration of preparedness plans at all levels of government. The Oak Ridge Institute for Science...

463

MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT  

E-Print Network (OSTI)

#12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines

464

Federal Energy Management Program: Best Management Practice: Cooling Tower  

NLE Websites -- All DOE Office Websites (Extended Search)

Cooling Tower Management to someone by E-mail Cooling Tower Management to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Google Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Delicious Rank Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

465

Federal Energy Management Program: Best Management Practice: Water  

NLE Websites -- All DOE Office Websites (Extended Search)

Water Management Planning to someone by E-mail Water Management Planning to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water Management Planning on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Water Management Planning on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Google Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Delicious Rank Federal Energy Management Program: Best Management Practice: Water Management Planning on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Water Management Planning on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

466

PARLO: PArallel Run-Time Layout Optimization for Scientific Data Explorations with Heterogeneous Access Pattern  

SciTech Connect

Download Citation Email Print Request Permissions Save to Project The size and scope of cutting-edge scientific simulations are growing much faster than the I/O and storage capabilities of their run-time environments. The growing gap is exacerbated by exploratory, data-intensive analytics, such as querying simulation data with multivariate, spatio-temporal constraints, which induces heterogeneous access patterns that stress the performance of the underlying storage system. Previous work addresses data layout and indexing techniques to improve query performance for a single access pattern, which is not sufficient for complex analytics jobs. We present PARLO a parallel run-time layout optimization framework, to achieve multi-level data layout optimization for scientific applications at run-time before data is written to storage. The layout schemes optimize for heterogeneous access patterns with user-specified priorities. PARLO is integrated with ADIOS, a high-performance parallel I/O middleware for large-scale HPC applications, to achieve user-transparent, light-weight layout optimization for scientific datasets. It offers simple XML-based configuration for users to achieve flexible layout optimization without the need to modify or recompile application codes. Experiments show that PARLO improves performance by 2 to 26 times for queries with heterogeneous access patterns compared to state-of-the-art scientific database management systems. Compared to traditional post-processing approaches, its underlying run-time layout optimization achieves a 56% savings in processing time and a reduction in storage overhead of up to 50%. PARLO also exhibits a low run-time resource requirement, while also limiting the performance impact on running applications to a reasonable level.

Gong, Zhenhuan [North Carolina State University, Raleigh; Boyuka, David [North Carolina State University, Raleigh; Zou, X [North Carolina State University, Raleigh; Liu, Gary [ORNL; Podhorszki, Norbert [ORNL; Klasky, Scott A [ORNL; Ma, Xiaosong [North Carolina State University, Raleigh; Samatova, Nagiza F [ORNL

2013-01-01T23:59:59.000Z

467

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Faucets and Showerheads to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Faucets and Showerheads on Facebook Tweet about Federal Energy...

468

Summary - Environmental Management Waste Management Facility...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ETR Report Date: February 2008 ETR-11 United States Department of Energy Office of Environmental Management (DOE-EM) External Technical Review of Environmental Management...

469

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Other Water Intensive Processes to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Other Water Intensive Processes on Facebook Tweet about...

470

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Water-Efficient Landscaping to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water-Efficient Landscaping on Facebook Tweet about Federal...

471

Managing Data Access on Clouds: A Generic Framework for Enforcing Security Policies  

Science Conference Proceedings (OSTI)

Providing an adequate security level in Cloud Environments is currently an extremely active research area. More specifically, malicious behaviors targeting large-scale Cloud data repositories (e.g. Denial of Service attacks) may drastically degrade the ... Keywords: Cloud computing, Cloud storage service, security, policy enforcement, Denial of Service

Cristina Basescu; Alexandra Carpen-Amarie; Catalin Leordeanu; Alexandru Costan; Gabriel Antoniu

2011-03-01T23:59:59.000Z

472

Managing Data Access on Clouds: A Generic Framework for Enforcing Security Policies  

E-Print Network (OSTI)

Basescu, Catalin Leordeanu, Alexandru Costan Department of Computer Science, University Politehnica of Bucharest cristina.basescu@cti.pub.ro, {catalin.leordeanu, alexandru.costan}@cs.pub.ro Alexandra Carpen

Paris-Sud XI, Université de

473

The National Severe Storms Laboratory Historical Weather Data Archives Data Management and Web Access System  

Science Conference Proceedings (OSTI)

The NOAA/National Severe Storms Laboratory Historical Weather Data Archive (NSSL HWDA) is a new Web-based data portal that delivers surface and upper-air data to the online user through horizontal maps, vertical profiles on skew Tlogp charts, ...

Willa H. Zhu; David M. Schultz; Douglas W. Kennedy; Kevin E. Kelleher; Nancy N. Soreide

2006-12-01T23:59:59.000Z

474

T-581: Novell Access Manager Java Double Literal Denial of Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in the 3.1.3 IR1 patch. Download the FPUpdater tool. Download and Copy to fpupdater.jar file Related References: DOE-CIRC Tech Bulletin T-558 Addthis Related Articles T-561:...

475

Web-Based Services for Building Energy Management - WEBE  

E-Print Network (OSTI)

Nowadays, internet can be accessed anywhere, and www-based applications are widespread. Utilizing internet also for energy management and commissioning purposes will be a future trend. A web-based service for building energy management, called WebE, was developed at VTT. It is a modular and integrated service including several energy-related modules. This paper describes the main features of the WebE service modules. Also the system structure is briefly discussed.

Paiho, S.; Pietilainen, J.; Ala-Juusela, M.

2004-01-01T23:59:59.000Z

476

DUF6 Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Depleted UF6 Management An introduction to DOE's Depleted UF6 Management Program. The mission of the DOE's Depleted UF6 Management Program is to safely and efficiently...

477

Pennsylvania Capital Access Program (Pennsylvania) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pennsylvania Capital Access Program (Pennsylvania) Pennsylvania Capital Access Program (Pennsylvania) Pennsylvania Capital Access Program (Pennsylvania) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info Funding Source Pennsylvania Economic Development Financing Authority (PEDFA) State Pennsylvania Program Type

478

Capital Access Program (CAP) (Michigan) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CAP) (Michigan) CAP) (Michigan) Capital Access Program (CAP) (Michigan) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Michigan Program Type Loan Program The Capital Access Program (CAP), utilizes public resources to generate private financing for small business in Michigan seeking access to capital.

479

New antitrust issues in a deregulated environment: access to pipelines  

Science Conference Proceedings (OSTI)

The deregulated environment of the Natural Gas Policy Act, (NGPA) will introduce new antitrust issues, one issue of particular concern and difficulty being access and utilization of gas transmission and distribution facilities. The authors disagree with the tendency to use the bottleneck monopoly/essential facility doctrine to suggest that access is required by the antitrust laws. Current trends in judicial and economic analysis of refusals to deal by monopolists supports the view that nonpredatory denials of access, based on such legitimate business considerations as efficiency and profitability, are appropriate and consistent with both antitrust policy and the competitive purposes of industry deregulation. 80 references.

Mahinka, S.P.; Johnson, J.L.

1983-01-01T23:59:59.000Z

480

Your Records Management Responsibilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Your Records Management Your Records Management Responsibilities Table of Contents INTRODUCTION RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT RECORDS MANAGEMENT IN THE DEPARTMENT OF ENERGY IMPORTANCE OF RECORDS MANAGEMENT YOUR RECORDS MANAGEMENT RESPONSIBILITIES RECORDS MANAGEMENT LIFE CYCLE ELECTRONIC RECORDS & RECORDKEEPING LAW, REGULATION, AND POLICY ASSISTANCE RECORDS MANAGEMENT TERMS 2 INTRODUCTION If you are a government employee or contractor working for a federal agency, records management is part of your job. This pamphlet explains your responsibilities for federal records and provides the context for understanding records management in the federal government and in the Department of Energy. TOP RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT

Note: This page contains sample records for the topic "rsa access manager" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Integrated Safety Management Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INTEGRATED SAFETY INTEGRATED SAFETY MANAGEMENT SYSTEM DESCRIPTION U.S. DEPARTMENT OF ENERGY Office of Environmental Management Headquarters May 2008 Preparation: Braj K. sin& Occupational Safety and Health Manager Office of Safety Management Concurrence: Chuan-Fu wu Director, Offlce of Safety Management Deputy Assistant Secretary for safe& Management andoperations Operations Officer for 1 Environmental Management Approval: Date p/-g Date Environmental Management TABLE OF CONTENTS ACRONYMS................................................................................................................................................................v EXECUTIVE SUMMARY .........................................................................................................................................1

482

Managing time, part 2  

Science Conference Proceedings (OSTI)

Masterful time management means not just tracking of messages in your personal environment, but managing your coordination network with others.

Peter J. Denning; Ritu Raj

2011-09-01T23:59:59.000Z

483

Environmental Management Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Management Systems Technical Assistance Tools Technical Assistance Tool: Integrating Sustainable Practices into Environmental Management Systems , November 2009...

484

Managing PCBs  

Science Conference Proceedings (OSTI)

Compliance with Environmental Protection Agency regulations for managing the polychlorinated biphenyls (PCBs) that were widely distributed in electrical equipment will be costly to the utility industry, estimated at over $5 billion over a ten-year period by the Electric Power Research Institute (EPRI). Most of the budget could be needed to identify and reclaim 2.5 million contaminated transformers. Three divisions are coordinating EPRI research efforts with those of other companies and utilities in the areas of detection, destruction, spill cleanup, disposal, and health effects. (DCK)

Lihach, N.

1981-10-01T23:59:59.000Z

485

Subscriber access provided by - Access paid by the | UC Berkeley Library  

NLE Websites -- All DOE Office Websites (Extended Search)

Journal of Combinatorial Chemistry is published by the American Chemical Journal of Combinatorial Chemistry is published by the American Chemical Society. 1155 Sixteenth Street N.W., Washington, DC 20036 Article High-Throughput Sequencing of Peptoids and Peptide#Peptoid Hybrids by Partial Edman Degradation and Mass Spectrometry Amit Thakkar, Allison S. Cohen, Michael D. Connolly, Ronald N. Zuckermann, and Dehua Pei J. Comb. Chem., 2009, 11 (2), 294-302* DOI: 10.1021/cc8001734 * Publication Date (Web): 20 January 2009 Downloaded from http://pubs.acs.org on May 7, 2009 More About This Article Additional resources and features associated with this article are available within the HTML version: * Supporting Information * Access to high resolution figures * Links to articles and content related to this article * Copyright permission to reproduce figures and/or text from this article

486

Subscriber access provided by - Access paid by the | UC Berkeley Library  

NLE Websites -- All DOE Office Websites (Extended Search)

Nano Letters is published by the American Chemical Society. 1155 Sixteenth Nano Letters is published by the American Chemical Society. 1155 Sixteenth Street N.W., Washington, DC 20036 Letter Electron#Hole Interaction in Carbon Nanotubes: Novel Screening and Exciton Excitation Spectra Jack Deslippe, Mario Dipoppa, David Prendergast, Marcus V. O. Moutinho, Rodrigo B. Capaz, and Steven G. Louie Nano Lett., 2009, 9 (4), 1330-1334* DOI: 10.1021/nl802957t * Publication Date (Web): 09 March 2009 Downloaded from http://pubs.acs.org on May 14, 2009 More About This Article Additional resources and features associated with this article are available within the HTML version: * Supporting Information * Access to high resolution figures * Links to articles and content related to this article * Copyright permission to reproduce figures and/or text from this article

487

Reducing rural poverty through increased access to energy services: a  

Open Energy Info (EERE)

Reducing rural poverty through increased access to energy services: a Reducing rural poverty through increased access to energy services: a review of the multifunctional platform project in Mali Jump to: navigation, search Tool Summary Name: Reducing rural poverty through increased access to energy services: a review of the multifunctional platform project in Mali Agency/Company /Organization: Abeeku Brew-Hammond & Anna Crole-Rees Partner: United Nations Development Programme (UNDP) Sector: Energy Focus Area: Renewable Energy, Non-renewable Energy, Energy Efficiency, People and Policy Phase: Create a Vision, Determine Baseline, Develop Goals, Evaluate Effectiveness and Revise as Needed Topics: Co-benefits assessment, - Energy Access Resource Type: Publications User Interface: Website Website: www.beta.undp.org/undp/en/home/librarypage/environment-energy/sustaina

488

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS:  An EITS provided Exchange email account  A DOE issued HSPD-12 badge  DOEnet or Internet access and a supported web browser  A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

489

Access to High Technology User Facilities at DOE National Laboratories |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access to High Technology User Facilities at DOE National Access to High Technology User Facilities at DOE National Laboratories Access to High Technology User Facilities at DOE National Laboratories In recognition of the nation's expanding need to engage businesses and universities in the areas of commercial and basic science research, the Department has developed two special types of agreements for use at all DOE National Laboratories with approved designated user facilities. For non-commercial, basic science research, researchers may seek to use the Non-proprietary User Agreement. Under this type of agreement, the user pays its own costs of the research with the DOE laboratory, may access specialized laboratory equipment and collaborate with laboratory scientists. The non-proprietary user and the National Laboratory retain

490

Using Daylight to Light the Access Zone of Road Tunnels  

NLE Websites -- All DOE Office Websites (Extended Search)

Using Daylight to Light the Access Zone of Road Tunnels Using Daylight to Light the Access Zone of Road Tunnels Speaker(s): Eliyahu Ne'eman Date: March 4, 2003 - 12:00pm Location: Bldg. 90 Lighting guides for roadway tunnels specify relatively high luminances for the "access zone" into the tunnel. They are needed to allow the eyes of the driver sufficient time to adapt during the short period of the transition from the outdoor natural daylight levels to the fairly low luminances along the main length of the tunnel. Usually, the necessary high luminances are provided by rows of costly luminaries which consume a lot of electricity during peak use periods and need a good deal of maintenance. To save some electric power, controls are used to dim the lighting on cloudy hours. Daylight has been used for the access zone in several tunnels around the

491

Pacific Ethanol Inc formerly Accessity Corporation | Open Energy  

Open Energy Info (EERE)

Ethanol Inc formerly Accessity Corporation Ethanol Inc formerly Accessity Corporation Jump to: navigation, search Name Pacific Ethanol Inc (formerly Accessity Corporation) Place Fresno, California Zip 93711 Product String representation "Accessity has a ... r and marketer." is too long. Coordinates 29.53815°, -95.448909° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":29.53815,"lon":-95.448909,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

492

Military students access top R&D  

NLE Websites -- All DOE Office Websites (Extended Search)

Military students access top R&D Military students access top R&D Military students access top R&D Cadets and midshipmen spend summer expanding their scientific knowledge at world-class Los Alamos facilities August 27, 2013 Military students access top R&D Micah Dose, a midshipman at the U.S. Naval Academy and a SARA intern in the Laboratory's ARIES program, peers inside the glovebox where plutonium pits are dis-assembled at Los Alamos. ARIES is the only program in the nation that disassembles and destroys surplus plutonium pits. The pits are transformed into plutonium oxide powder suitable for being made into fuel for civilian nuclear reactors. "There are a lot of summer training programs out there, but most are class-like," said U.S. Air Force cadet Dale Becker, mentored by the Physics

493

RECORD OF CATEGORICAL EXCLUSION DETERMINATION Hygiene Substation Access Road Repairs  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hygiene Substation Access Road Repairs Hygiene Substation Access Road Repairs A. Brief Description of Proposal: Western Area Power Administration proposes to repair the access road/driveway into the Hygiene Substation. There is a low spot in the middle of the driveway that impedes maneuvering oflarge maintenance equipment in and out of the yard. Western plans to fill the low spot with road base and crumbled concrete fill. The Hygiene Substation is located in Boulder County, approximately 2 miles northwest of Longmont, CO (T3N, R69W, Sec 18). All proposed construction will occur within the existing, disturbed substation access road/driveway. B. Number and Title of tile Categorical Exclusion Being Applied: (See text in 10 CFR 1021, Subpart D.) BI.3 Routine maintenance activities and custodial services for buildings, structures,

494

The Ohio Capital Access Program (OCAP) (Ohio) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Ohio Capital Access Program (OCAP) (Ohio) The Ohio Capital Access Program (OCAP) (Ohio) The Ohio Capital Access Program (OCAP) (Ohio) < Back Eligibility Agricultural Commercial Construction Fuel Distributor Industrial Installer/Contractor Retail Supplier Transportation Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Ohio Program Type Loan Program Provider Ohio Development Services Agency The Ohio Capital Access Program (OCAP) encourages state depository financial institutions to make loans to for-profit or nonprofit small businesses that are having difficulty obtaining business loans through conventional underwriting standards. The business' principal place of business must be in Ohio with revenues less than $10 million and with fewer

495

Santa Cruz County - Solar Access Protection | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cruz County - Solar Access Protection Cruz County - Solar Access Protection Santa Cruz County - Solar Access Protection < Back Eligibility Commercial Industrial Residential Program Info State California Program Type Solar/Wind Access Policy Provider County of Santa Cruz Although the California Solar Rights Act of 1978 requires local governments to plan for future passive or natural heating or cooling opportunities in new residential construction, and the California Shade Control Act protects solar systems from shading by vegetation, current state and local laws do not protect installed solar energy systems from shading caused by structures. The County of Santa Cruz has developed a process for registering solar energy systems to provide additional protection to solar energy system owners. The County's Building Regulations Code requires that any obstructions of

496

Comments on Smart Grid data access | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

on Smart Grid data access on Smart Grid data access Comments on Smart Grid data access AARP, NASUCA, NCLC, Consumers Union and Public Citizen just released, "The Need for Essential Consumer Protections: Smart Metering Proposals and the Move to Time-Based Pricing." This white paper covers a range of issues including previous smart meter pilot programs, full costs associated with advanced meters and related infrastructure, and impacts of dynamic pricing on vulnerable customer groups. The paper includes 7 recommendations. Comments on Smart Grid data access More Documents & Publications AARP, National Consumer Law Center, and Public Citizen Comments to:DEPARTMENT OF ENERGY Smart Grid RFI: Addressing Policy and Logistical Challenges The Need for Essential Consumer Protections: Smart Metering Proposals and

497

Integrated Model to Access the Global Environment | Open Energy Information  

Open Energy Info (EERE)

Integrated Model to Access the Global Environment Integrated Model to Access the Global Environment Jump to: navigation, search LEDSGP green logo.png FIND MORE DIA TOOLS This tool is part of the Development Impacts Assessment (DIA) Toolkit from the LEDS Global Partnership. Tool Summary LAUNCH TOOL Name: Integrated Model to Access the Global Environment (IMAGE) Agency/Company /Organization: PBL Netherlands Environmental Assessment Agency Focus Area: Biomass Complexity/Ease of Use: Advanced Website: themasites.pbl.nl/en/themasites/image/index.html Cost: Paid Equivalent URI: cleanenergysolutions.org/content/integrated-model-access-global-enviro Related Tools ENV-Linkages-KEI Model World Induced Technical Change Hybrid (WITCH) Global Trade and Analysis Project (GTAP) Model ... further results IMAGE is an ecological-environmental framework that simulates the

498

File:03NVBStateLandAccess.pdf | Open Energy Information  

Open Energy Info (EERE)

3NVBStateLandAccess.pdf 3NVBStateLandAccess.pdf Jump to: navigation, search File File history File usage File:03NVBStateLandAccess.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:11, 15 October 2012 Thumbnail for version as of 12:11, 15 October 2012 1,275 × 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-NV-b - State Land Access Retrieved from

499

Republic of Yemen Energy Access Project | Open Energy Information  

Open Energy Info (EERE)

http:documents.worldbank.org Coordinates 15.552727, 48.516388 References The World Bank1 The Republic of Yemen Energy Access Project available at The World Bank....

500

Packing efficiency and accessible surface area of crumpled graphene  

E-Print Network (OSTI)

Graphene holds promise as an ultracapacitor due to its high specific surface area and intrinsic capacitance. To exploit both, a maximum surface area must be accessible while the two-dimensional (2D) graphene is deformed ...

Cranford, Steven Wayne