National Library of Energy BETA

Sample records for rsa authentication manager

  1. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

  2. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  3. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  4. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks

    Broader source: Energy.gov [DOE]

    RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

  5. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  6. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated...

  7. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can conduct cross-frame scripting attacks CVE-2012-2280. Imp act: A remote user can access the target user's cookies (including authentication cookies), if any, ...

  8. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has issued a fix Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  9. U-267: RSA Authentication Agent 7.1 for Microsoft Windows...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  10. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote ... The vendor has issued a fix (5.3SP1). Addthis Related Articles V-084: RSA Archer eGRC ...

  11. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  12. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  13. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  14. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  15. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local ... Scripting and URL Redirection Attacks V-151: RSA Archer eGRC Bugs Let Remote ...

  16. T-640: RSA Access Manager Server CVE-2011-0322 Update

    Broader source: Energy.gov [DOE]

    RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3 ?Security Hot fix # 6.0.4.60 for RSA Access Manager Server version 6.0.4 ?Security Hot fix # 6.1.2.08 for RSA Access Manager Server version 6.1.2 ?Security Hot fix # 6.1.3.05 for RSA Access Manager Server version 6.1.3

  17. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has issued fixes. Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  18. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  19. T-642: RSA SecurID update to Customers

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

  20. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  1. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bypass Vulnerability | Department of Energy 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts

  2. Using Two-Factor RSA Token with WebVPN | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Two-Factor RSA Token with WebVPN Using Two-Factor RSA Token with WebVPN Your RSA token is used to esbablish a connection to the Internet and connect to https://connect.doe.gov . PDF icon Using-TwoFactorRSA-Token w VPN.pdf More Documents & Publications Instructions for WebVPN Connectivity Citrix_2FA_Authentication_09.09 Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc

  3. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  4. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote ...

  5. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  6. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  7. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  8. Citrix_2FA_Authentication_09.09 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Citrix_2FA_Authentication_09.09 Citrix_2FA_Authentication_09.09 PDF icon Citrix_2FA_Authentication-September09 More Documents & Publications Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Using Two-Factor RSA Token with WebVPN Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc

  9. System and method for authentication

    DOE Patents [OSTI]

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  10. Low-bandwidth authentication.

    SciTech Connect (OSTI)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  11. International safeguards data authentication

    SciTech Connect (OSTI)

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  12. User guide for remote access to VDI and Workplace using RSA token...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and ...

  13. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue ... Vendor recommends updating to version 5.4 Addthis Related Articles V-084: RSA Archer eGRC ...

  14. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Issue | Department of Energy 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing

  15. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Clickjacking, and File Upload Attacks | Department of Energy 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer

  16. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  17. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  18. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, ... The vendor has issued a fix (5.2SP1, 5.3). Addthis Related Articles V-151: RSA Archer eGRC ...

  19. Instructions for Using Two-Factor RSA Tokens with Citrix Workplace |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Two-Factor RSA Tokens with Citrix Workplace Instructions for Using Two-Factor RSA Tokens with Citrix Workplace Citrix Wokplace provides access to to a virtual desktop from any computer, but requires installation of a plug-in. Citrix Workplace Login Procedure: Enter https://workplace.doe.gov in the address field of your Internet browser. The Citrix Workplace window appears. Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus

  20. Authentication of quantum messages.

    SciTech Connect (OSTI)

    Barnum, Howard; Crépeau, Jean-Claude; Gottesman, D.; Smith, A.; Tapp, Alan

    2001-01-01

    Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

  1. Secure authenticated video equipment

    SciTech Connect (OSTI)

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  2. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS ...

  3. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  4. Authentication Without Secrets

    SciTech Connect (OSTI)

    Pierson, Lyndon G.; Robertson, Perry J.

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  5. Two-Factor Authentication

    Broader source: Energy.gov [DOE]

    Two-Factor Authentication (2FA) (also known as 2-Step Verification) is a system that employs two methods to identify an individual. More secure than reusable passwords, when a token's random number...

  6. Security analysis of RSA cryptosystem algorithm and its properties

    SciTech Connect (OSTI)

    Liu, Chenglian; Guo, Yongning E-mail: linjuanliucaihong@qq.com; Lin, Juan E-mail: linjuanliucaihong@qq.com

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  7. CERTIFICATE OF AUTHENTICITY

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair

  8. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  9. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  10. Authentication techniques for smart cards

    SciTech Connect (OSTI)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  11. ARM - Central Authentication Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data...

  12. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  13. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. Tran_001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for Offshore Wind Demonstrations Office of Information Resources Office of

  14. A proposed generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-01

    This contribution describes a proposed information element that can convey authentication information within an ATM signaling message. The design of this information element provides a large amount of flexibility to the user because it does not specify a particular signature algorithm, and it does not specify which information elements must accompany the Authentication IE in a signaling message. This allows the user to implement authenticated signaling based on her site`s security policies and performance requirements.

  15. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Energy Savers [EERE]

    D.C. Tran001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

  16. Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    More Documents & Publications Citrix2FAAuthentication09.09 Using Two-Factor RSA Token with WebVPN User guide for remote access to VDI and Workplace using RSA token

  17. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  18. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  19. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  20. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  1. Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc

    Energy Savers [EERE]

    HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment Instructions for Using Two- Factor RSA Tokens with Citrix Workplace Environment (CWE) Revision 1.13 December, 2009 Associate CIO for Operations (IM) United States Department of Energy DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment Using Your RSA Token with Citrix Note: If you access Citrix Workplace from within the DOE network

  2. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 Contract No. 11PB-12330 AMENDMENT executed by the BONNEVILLE POWER ADMINISTRATION and PORT TOWNSEND PAPER CORPORATION This AMENDMENT to the Firm Power Sales Agreement (Agreement)...

  3. Data Authentication Demonstration for Radionuclide Stations

    SciTech Connect (OSTI)

    Harris, Mark; Herrington, Pres; Miley, Harry; Ellis, J. Edward; McKinnon, David; St. Pierre, Devon

    1999-08-03

    Data authentication is required for certification of sensor stations in the International Monitoring System (IMS). Authentication capability has been previously demonstrated for continuous waveform stations (seismic and infrasound). This paper addresses data surety for the radionuclide stations in the IMS, in particular the Radionuclide Aerosol Sampler/Analyzer (RASA) system developed by Pacific Northwest National Laboratory (PNNL). Radionuclide stations communicate data by electronic mail using formats defined in IMS 1.0, Formats and Protocols for Messages. An open message authentication standard exists, called S/MIME (Secure/Multipurpose Internet Mail Extensions), which has been proposed for use with all IMS radionuclide station message communications. This standard specifies adding a digital signature and public key certificate as a MIME attachment to the e-mail message. It is advantageous because it allows authentication to be added to all IMS 1.0 messages in a standard format and is commercially supported in e-mail software. For command and control, the RASA system uses a networked Graphical User Interface (GUI) based upon Common Object Request Broker Architecture (CORBA) communications, which requires special authentication procedures. The authors have modified the RASA system to meet CTBTO authentication guidelines, using a FORTEZZA card for authentication functions. They demonstrated signing radionuclide data messages at the RASA, then sending, receiving, and verifying the messages at a data center. They demonstrated authenticating command messages and responses from the data center GUI to the RASA. Also, the particular authentication system command to change the private/public key pair and retrieve the new public key was demonstrated. This work shows that data surety meeting IMS guidelines may be immediately applied to IMS radionuclide systems.

  4. T-703: Cisco Unified Communications Manager Open Query Interface...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain ... Authentication Bypass Vulnerability T-614: Cisco Unified Communications Manager ...

  5. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  6. User Authentication Policy | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Accounts Policy Account Sponsorship & Retention Policy ALCC Quarterly Report Policy ALCF Acknowledgment Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/Q Job Scheduling Policies on Cooley Pullback Policy Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne

  7. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  8. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  9. T-646: Debian fex authentication bypass | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    46: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service

  10. Authentication of data for monitoring a comprehensive test ban treaty

    SciTech Connect (OSTI)

    Craft, R.L.; Draelos, T.J.

    1996-05-01

    The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations.

  11. V-036: EMC Smarts Network Configuration Manager Database Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass ... Tomcat and JBOSS. Addthis Related Articles V-120: EMC Smarts Network Configuration ...

  12. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC)

  13. System and method for authentication of goods

    DOE Patents [OSTI]

    Kaish, Norman; Fraser, Jay; Durst, David I.

    1999-01-01

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  14. V-231: Cisco Identity Services Engine Discloses Authentication Credentials

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Remote Users | Department of Energy 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services

  15. V-231: Cisco Identity Services Engine Discloses Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users ... Lets Remote Users Obtain Database Contents V-076: Cisco Wireless LAN Controller Bugs Let ...

  16. T-646: Debian fex authentication bypass | Department of Energy

    Energy Savers [EERE]

    PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the ...

  17. Authenticating concealed private data while maintaining concealment

    DOE Patents [OSTI]

    Thomas, Edward V. (Albuquerque, NM); Draelos, Timothy J. (Albuquerque, NM)

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  18. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-08-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  19. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-01-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  20. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  1. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  2. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  3. Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using HSPD-12 Badge. PDF icon HSPD-12 Badge Instructions More Documents & Publications User Guide for Remote Access to VDI/Workplace Using PIV Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Audit Report: IG-0860

  4. Jen Carter | Department of Energy

    Energy Savers [EERE]

    Energy Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser

  5. Instructions to Print Monthly P-card Statement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser

  6. Instructions for Using Secure Email via Outlook Web Access | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser

  7. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  8. Proposed DSS-specific fields for the generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-06

    This contribution proposes the format of the ``Algorithm-Specific Information`` and ``Signature`` fields within the ``Proposed Generic Authentication Information Element`` for authentication IEs based on the Digital Signature Standard (DSS). These fields are designed to allow various levels of authentication ``strength`` (or robustness), and many of these fields may be omitted in systems that optimize authentication performance by sharing common (public) Digital Signature Algorithm (DSA) parameters. This allows users and site security officers to design their authenticated signaling according to site security and performance requirements.

  9. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:www.nnsa.energy.govaboutusouroperationsmanagementandbudget

  10. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:nnsa.energy.govaboutusouroperationsmanagementandbudget

    P...

  11. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect (OSTI)

    Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K; Thron, Jonathan L; Budlong - Sylvester, Kory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  12. Hardware device to physical structure binding and authentication

    DOE Patents [OSTI]

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  13. Group key management

    SciTech Connect (OSTI)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  14. Simultaneous Authentication and Certification of Arms-Control Measurement Systems

    SciTech Connect (OSTI)

    MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

    2012-07-09

    Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

  15. Provably Secure Password-based Authentication in TLS

    SciTech Connect (OSTI)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  16. Authenticated group Diffie-Hellman key exchange: theory and practice

    SciTech Connect (OSTI)

    Chevassut, Olivier

    2002-10-03

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  17. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  18. STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    STEM Mentoring Caf- Engaging Young Women in an Authentic Mentoring Experience Melinda Higgins Albert Einstein Distinguished Educator Fellow, NASA Office of Education, ...

  19. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, ... - Using Technology to Increase Transparency V-057: eXtplorer "extfinduser()" ...

  20. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2000-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  1. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2001-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  2. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  3. INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS:  An EITS provided Exchange email account  A DOE issued HSPD-12 badge  DOEnet or Internet access and a supported web browser  A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be

  4. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C.; Trolinger, James D.

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  5. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  6. A key management concept for the CTBT International Monitoring System

    SciTech Connect (OSTI)

    Herrington, P.; Draelos, T.; Craft, R.; Brickell, E.; Frankel, Y.; Silvestri, M.

    1997-08-01

    Cryptographic authentication (commonly referred to as ``technical authentication`` in Working Group B) is an enabling technology which ensures the integrity of sensor data and security of digital networks under various data security compromise scenarios. The use of cryptographic authentication,however, implies the development of a key management infrastructure for establishing trust in the generation and distribution of cryptographic keys. This paper proposes security and operational requirements for a CTBT (Comprehensive Test Ban Treaty) key management system and, furthermore, presents a public key based solution satisfying the requirements. The key management system is instantiated with trust distribution technologies similar to those currently implemented in industrial public key infrastructures. A complete system solution is developed.

  7. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operators and the IAEAs interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using joint use equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEAs ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  8. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  9. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    SciTech Connect (OSTI)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    2014-07-21

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for the addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.

  10. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions.

  11. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  12. Key management for large scale end-to-end encryption

    SciTech Connect (OSTI)

    Witzke, E.L.

    1994-07-01

    Symmetric end-to-end encryption requires separate keys for each pair of communicating confidants. This is a problem of Order N{sup 2}. Other factors, such as multiple sessions per pair of confidants and multiple encryption points in the ISO Reference Model complicate key management by linear factors. Public-key encryption can reduce the number of keys managed to a linear problem which is good for scaleability of key management, but comes with complicating issues and performance penalties. Authenticity is the primary ingredient of key management. If each potential pair of communicating confidants can authenticate data from each other, then any number of public encryption keys of any type can be communicated with requisite integrity. These public encryption keys can be used with the corresponding private keys to exchange symmetric cryptovariables for high data rate privacy protection. The Digital Signature Standard (DSS), which has been adopted by the United States Government, has both public and private components, similar to a public-key cryptosystem. The Digital Signature Algorithm of the DSS is intended for authenticity but not for secrecy. In this paper, the authors will show how the use of the Digital Signature Algorithm combined with both symmetric and asymmetric (public-key) encryption techniques can provide a practical solution to key management scaleability problems, by reducing the key management complexity to a problem of order N, without sacrificing the encryption speed necessary to operate in high performance networks.

  13. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  14. Integrating end-to-end encryption and authentication technology into broadband networks

    SciTech Connect (OSTI)

    Pierson, L.G.

    1995-11-01

    BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

  15. Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication

    SciTech Connect (OSTI)

    Karpius, Peter J; Williams, Richard B

    2009-01-01

    During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

  16. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  17. Usibelli Coal Mine - Cleaner Energy, Brighter Future

    Energy Savers [EERE]

    Department of Energy User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token PDF icon VDI_WP_RSA_Remote_Guide_Final.pdf More Documents & Publications User Guide for Remote Access to VDI/Workplace Using PIV Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Citrix_2FA_Authentication_09.09

    Bureau of Indian Affairs Providers Conference The

  18. Utility Energy Service Contracts Frequently Asked Questions!

    Office of Environmental Management (EM)

    Using Two-Factor RSA Token with WebVPN Using Two-Factor RSA Token with WebVPN Your RSA token is used to esbablish a connection to the Internet and connect to https://connect.doe.gov . PDF icon Using-TwoFactorRSA-Token w VPN.pdf More Documents & Publications Instructions for WebVPN Connectivity Citrix_2FA_Authentication_09.09 Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc

    regulations.gov to find dockets and documents Regulations.gov is a web-based repository of Federal regulatory

  19. Safety Walkthrough Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Walkthrough Management

  20. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  1. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    SciTech Connect (OSTI)

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on an analysis of relevant patents in the area.

  2. Chemical Management

    Energy Savers [EERE]

    DOE-HDBK-11391-2006 May 2006 DOE HANDBOOK CHEMICAL MANAGEMENT (Volume 1 of 3) U.S. ... and contractor managers in assessing chemical hazard management and is approved for ...

  3. Project Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project Management Project Management MaRIE is the experimental facility needed to control the time-dependent properties of materials for national security science missions. It ...

  4. Deactivation Management

    Broader source: Energy.gov [DOE]

    The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project...

  5. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-03

    To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

  6. Hybrid cryptography key management.

    SciTech Connect (OSTI)

    Draelos, Timothy John; Torgerson, Mark Dolan; Neumann, William Douglas; Gallup, Donald R.; Collins, Michael Joseph; Beaver, Cheryl Lynn

    2003-11-01

    Wireless communication networks are highly resource-constrained; thus many security protocols which work in other settings may not be efficient enough for use in wireless environments. This report considers a variety of cryptographic techniques which enable secure, authenticated communication when resources such as processor speed, battery power, memory, and bandwidth are tightly limited.

  7. MANAGEMENT ALERT

    Broader source: Energy.gov (indexed) [DOE]

    COMMISSION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Management Alert: Review of Allegations of Improper Disclosure of Confidential, Nonpublic...

  8. DEACTIVATION MANAGEMENT

    Office of Environmental Management (EM)

    MANAGEMENT The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project management approach, and as such is not addressed. The following specific topics are based on lessons learned during deactivation of DOE facilities.  The Deactivation Mission  The Stabilization/Deactivation "Customer"  Project Approach for a Complex Facility  Establishing the

  9. Environmental Management Waste Management Facility (EMWMF) at...

    Office of Environmental Management (EM)

    Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge ... INTRODUCTION The Environmental Management Waste Management Facility (EMWMF) is a land ...

  10. Teaching Managers How to Manage

    SciTech Connect (OSTI)

    Hylko, J.M.

    2006-07-01

    Following graduation from a college or university with a technical degree, or through years of experience, an individual's training and career development activities typically focus on enhancing technical problem-solving skills. However, as these technical professionals, herein referred to as 'Techies', advance throughout their careers, they may be required to accept and adapt to the role of being a manager, and must undergo a transition to learn and rely on new problem-solving skills. However, unless a company has a specific manager-trainee class to address this subject and develop talent from within, an employee's management style is learned and developed 'on the job'. Both positive and negative styles are nurtured by those managers having similar qualities. Unfortunately, a negative style often contributes to the deterioration of employee morale and ultimate closing of a department or company. This paper provides the core elements of an effective management training program for 'Teaching Managers How to Manage' derived from the Department of Energy's Integrated Safety Management System and the Occupational Safety and Health Administration 's Voluntary Protection Program. Discussion topics and real-life examples concentrate on transitioning an employee from a 'Techie' to a manager; common characteristics of being a manager; the history and academic study of management; competition, change and the business of waste management; what to do after taking over a department by applying Hylko's Star of Success; command media; the formal and informal organizational charts; chain of command; hiring and developing high-degree, autonomous employees through effective communication and delegation; periodic status checks; and determining if the program is working successfully. These common characteristics of a strong management/leadership culture and practical career tips discussed herein provide a solid foundation for any company or department that is serious about developing an effective management training program for its employees. In turn, any employee in any work environment can begin using this information immediately if they want to become a better manager. (authors)

  11. Evaluation of the Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Hart, Darren M.

    2008-05-01

    Sandia National Laboratories has tested and evaluated Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of the Geotech Smart24 digitizer with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy, analog bandwidth and calibrator performance.

  12. Bibliographic Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and more from varied resources and databases to organize references, keep notes to stay ahead of the game. Questions? 505-667-5809 Email Bibliographic management tools allow...

  13. acquisition management

    National Nuclear Security Administration (NNSA)

    the science, technology, and engineering base; and,

  14. Continue NNSA management reforms.
  1. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Aldridge, Hal; Duren, Mike; Ricci, Tracy; Bertino, Elisa; Kulatunga, Athula; Navaratne, Uditha Sudheera

    2011-01-01

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  2. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-01-25

    The Order establishes requirements and responsibilities for managing conferences sponsored or co-sponsored by the Department of Energy, including the National Nuclear Security Administration. Cancels DOE O 110.3. Canceled by DOE N 251.97.

  3. Management Reminders

    Broader source: Energy.gov [DOE]

    This document is normally shared by the HQ Program Manager a week prior to the scheduled mediation and is intented to serve as a reminder of the pertinent aspects of the mediation process.

  4. PROJECT MANAGEMENT PLANS Project Management Plans

    Office of Environmental Management (EM)

    MANAGEMENT PLANS Project Management Plans Overview Project Management Plan Suggested Outline Subjects Crosswalk between the Suggested PMP Outline Subjects and a Listing ...

  5. Summary - Environmental Management Waste Management Facility...

    Office of Environmental Management (EM)

    Waste Management Facility (EMWMF) at Oak Ridge, TN Why DOE-EM Did This Review The Environmental Management Waste Management Facility (EMWMF) is a land disposal facility for ...

  6. T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The BlackBerry Web Desktop Manager not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the BlackBerry Web Desktop Manager software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  7. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Data Management PDSF and IHEP, in Beijing, China, are the two main computing facitilies for the Daya Bay experiment with PDSF being used primarily by North American collaborators and IHEP by Asian collaborators. All raw data from the experimental facility is first transferred to IHEP and then transferred to PDSF. Data transfer rates of 5 to 10 MB/s result in up to about 500GB transferred daily. The tool used to transfer the data is called SPADE and has also been used at PDSF by

  8. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Data Management Data Transfer STAR makes use of grid-based file transfers between PDSF and Brookhaven for two main purposes. The first is to transfer input/output files for simulation jobs submitted from Brookhaven to/from PDSF. The jobs come in through pdsfgrid.nersc.gov making use of the OSG software installation and the files are transferred through pdsfdtn1.nersc.gov to and from /project/projectdirs/osg. The second purpose is for bulk replication of microDST's from

  9. Oracle Management Tool Suite

    Energy Science and Technology Software Center (OSTI)

    2007-06-01

    The Oracle Management Tool Suite is used to automatically manage Oracle based systems. This includes startup and shutdown of databases and application servers as well as backup, space management, workload management and log file management.

  10. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  11. Environmental Management

    SciTech Connect (OSTI)

    2014-11-12

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  12. Environmental Management

    ScienceCinema (OSTI)

    None

    2015-01-07

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  13. Management & Administration | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management & Administration Management & Administration Management & Administration The Office of Management and Administration directs the development, coordination, and execution ...

  14. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management System Environmental Management System An Environmental Management System (EMS) is a set of processes and practices that enable an organization to reduce its...

  15. ORISE: Emergency Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Emergency Management Effective emergency management relies on thorough integration of preparedness plans at all levels of government. The Oak Ridge Institute for Science...

  16. M E Environmental Management Environmental Management

    Energy Savers [EERE]

    safety  performance  cleanup  closure M E Environmental Management Environmental Management safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management Office of Site Restoration, EM-10 Office of D&D and Facility Engineering, EM-13 Facility Deactivation & Decommissioning (D&D) D&D Program Map Addendum: Impact of American Recovery and Reinvestment Act (ARRA) on EM's D&D

  17. Best Management Practice #1: Water Management Planning

    Broader source: Energy.gov [DOE]

    A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

  18. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Please remove ALL data from /house! Do you still have data in /house/homedirs? Do you know if you have data in /house/homedirs? Please check now and make a plan for moving that data to the archiver or one of the NERSC file systems (for more information on these filesystems go to File storage and I/O). Moving data from house to DnA The DnA file system is primarily for finished projects, data that is ready to be archived, or data that is shared between groups. It is mounted

  19. 2016 DOE Project Management Workshop - "Enhancing Project Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Workshop - "Enhancing Project Management" 2016 DOE Project Management Workshop - "Enhancing Project Management" 20160407-doe-project-management-workshop-ADJUST-slide.png ...

  20. Risk Management Process Overview

    Broader source: Energy.gov [DOE]

    The cybersecurity risk management process explained in the Electricity Sector Cybersecurity Risk Management Process (RMP) Guideline has two primary components: the risk management model and the the risk management cycle.

  1. Your Records Management Responsibilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Your Records Management Responsibilities Table of Contents INTRODUCTION RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT RECORDS MANAGEMENT IN THE DEPARTMENT OF ENERGY IMPORTANCE OF RECORDS MANAGEMENT YOUR RECORDS MANAGEMENT RESPONSIBILITIES RECORDS MANAGEMENT LIFE CYCLE ELECTRONIC RECORDS & RECORDKEEPING LAW, REGULATION, AND POLICY ASSISTANCE RECORDS MANAGEMENT TERMS 2 INTRODUCTION If you are a government employee or contractor working for a federal agency, records management is part of your

  2. Energy Management and Financing

    Office of Energy Efficiency and Renewable Energy (EERE)

    This Tuesday Webcast for Industry covers how to become a Certified Energy Manager and Certified Practitioner in Energy Management Systems

  3. John Angelis named Manager, Information Resource Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Names John S. Angelis Manager of Information Resource Management CARLSBAD, N.M., March 22, 2000 - The Westinghouse Waste Isolation Division (WID) has named John S. Angelis of Carlsbad as Manager of Information Resource Management at the Waste Isolation Pilot Plant (WIPP). "John's extensive computer technology and telecommunications experience, combined with his progressive attitude, make him an ideal choice for this increasingly important position," said WID General Manager Joe

  4. Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy SMail_Secure_Web-Based_Email_v3 _2_.doc Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc PDF icon Instructions for Using Secure Email via Outlook Web Access More Documents & Publications Using Two-Factor RSA Token with WebVPN Citrix_2FA_Authentication_09.09 Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc

  5. DOE Jobs Online (Hiring Manager), Office of Human Capitol Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and ...

  6. Project Manager's Guide to Managing Impact and Process Evaluation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Manager's Guide to Managing Impact and Process Evaluation Studies Project Manager's Guide to Managing Impact and Process Evaluation Studies This report provides a...

  7. AWWA Utility Management Conference

    Broader source: Energy.gov [DOE]

    Hosted by the American Water Works Association (AWWA), the Utility Management Conference is one of the leading management conferences to share experiences and learn from others in similar situations to the most pressing management issues of the day.

  8. Managing Your User Account

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Managing Your Account Managing Your User Account Use the NERSC Information Management (NIM) system to customize your user account and keep your personal information up-to-date. See...

  9. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

  10. Integrated Safety Management Policy

    Broader source: Energy.gov [DOE]

    This Integrated Safety Management (ISM) System Description (ISMSD) defines how the U.S. Department of Energy (DOE) Office of Environmental Management (EM) integrates environment, safety, and health...

  11. Land Management - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Land Management About Us About Hanford Cleanup Hanford History Hanford Site Wide Programs Contact Us Land Management Email Email Page | Print Print Page |Text Increase Font Size...

  12. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Third Quarter Overall Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Forecast FY ...

  13. PRC Contract Management Plan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Integrated Performance Evaluation Management System in RIMS, which includes DOE Orders 226.1B and 414.1D. The Contractor Integrated Performance Evaluation Management System ...

  14. Data Management Policy The

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Policy The guidelines below describe Data Management procedures, processes and resources that need to be understood by both user projects and in-house research. 1....

  15. End Points Management

    Broader source: Energy.gov [DOE]

    The policy of the EM is that a formal project management approach be used for the planning, managing, and conducting of its projects.

  16. Supply Management Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Logistics Management organization (NSL), Supply Chain Services (NS), Chief Administrative Office (N). NSL manages the warehousing of materials; the investment...

  17. COMPREHENSIVE LEGACY MANAGEMENT

    Office of Legacy Management (LM)

    Fernald Preserve, Fernald, Ohio Comprehensive Legacy Management and Institutional Controls ... blank LMSFERS03496-8.0 Comprehensive Legacy Management and Institutional Controls ...

  18. Contract/Project Management

    Office of Environmental Management (EM)

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast ...

  19. Contract/Project Management

    Office of Environmental Management (EM)

    Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 ...

  20. Contract/Project Management

    Office of Environmental Management (EM)

    3 First Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2013 Target FY 2013 Final FY ...

  1. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 ...

  2. Contract/Project Management

    Energy Savers [EERE]

    Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Final FY ...

  3. Contract/Project Management

    Energy Savers [EERE]

    First Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast ...

  4. Ross Management | Open Energy Information

    Open Energy Info (EERE)

    Management Jump to: navigation, search Name: Ross Management Place: Goldendale, Washington State Product: Ross Management is the management parent for a group of family owned...

  5. Fleet Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Property Fleet Management Fleet Management Fleet management includes commercial and agency owned motor vehicles such as cars, vans, trucks, and buses. Fleet (vehicle) management ...

  6. Operational Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Operational Management Operational Management Operational Management Leadership Contact Information Office of Resource Management and Planning U.S. Department of Energy, MA-1.1 ...

  7. Evaluation of the Geotech SMART24BH 20Vpp/5Vpp data acquisition system with active fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Rembold, Randy Kai; Hart, Darren M.

    2009-09-01

    Sandia National Laboratories has tested and evaluated Geotech SMART24BH borehole data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of two Geotech SMART24BH digitizers with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy/statistics/drift, analog bandwidth.

  8. Chemical Management Contacts

    Broader source: Energy.gov [DOE]

    Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

  9. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts of those activities, prioritizing improvements, and measuring results. May 30, 2012 The continuous improvement cycle Our Environmental Management System encourages continuous improvement of our environmental performance. Contact Environmental Communication & Public Involvement P.O. Box 1663 MS M996 Los Alamos, NM

  10. Manager`s views of public involvement

    SciTech Connect (OSTI)

    Branch, K.M.; Heerwagen, J.; Bradbury, J.

    1995-12-01

    Four issues commonly form the framework for debates about the acceptability of proposed projects or technologies--the substantive decision or technological choice; the treatment of the community by the proponent organization; the way the decision-making process has been structured and managed; and the status of institutional safeguards and protection. One of the clear messages of cultural theory is that differences in perspectives are a normal and inevitable part of society, and that attempts to resolve differences by persuasion are not likely to work. These findings are useful when considering the goals and possibilities of public involvement as a decision-making tool, and when designing or evaluating public involvement training programs for managers. The research reported here examines the viewpoints and concerns of managers and decision-makers about the four issues identified above, with particular emphasis on their perspectives and concerns about opening decision-making processes to the public and about managers` roles and responsibilities for structuring and managing open decision-making processes. Implications of these findings for public involvement training for managers is also discussed. The data presented in this paper were obtained from face-to-face interviews with managers and decision-makers with experience managing a variety of hazardous waste management decision-making processes. We conducted these interviews in the course of four separate research projects: needs assessments to support the design and development of a public involvement training program for managers; a study of community residents` and managers` perspectives on the chemical stockpile disposal program; an evaluation of the effectiveness of public involvement training for managers in the Department of Energy; and a study to develop indicators of the benefits and costs of public involvement.

  11. 2014 DOE Project Management Workshop

    Broader source: Energy.gov [DOE]

    What:  2014 DOE Project Management Workshop (Meeting the Challenge—Integrated Acquisition & Project Management)

  12. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-01-12

    The purpose of this guide is to describe effective risk management processes. The continuous and iterative process includes updating project risk documents and the risk management plan and emphasizes implementation communication of the risks and actions taken.

  13. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 Actual & Forecast FY 2011 Pre- & Post-CAP Comment 1a. ...

  14. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-01-18

    This Guide provides non-mandatory risk management approaches for implementing the requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets. Supersedes DOE G 413.3-7.

  15. Loan Specialist (Risk Management)

    Broader source: Energy.gov [DOE]

    This position is located in the U.S. Department of Energy (DOE), Loan Programs Office (LPO), Risk Management Division (RMD), and Enterprise Risk Management & Compliance Branch. The LPO mission...

  16. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Admin Chg 1 dated 4-10-2014, supersedes DOE O 410.2.

  17. Management Associate I

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an analyst and advisor to an organization's manager and other managers within the organization within BPA. The position serves as a point of...

  18. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Admin Chg 1, dated 1-16-2013, supersedes DOE O 415.1.

  19. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

  20. NERSC Data Management Policies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Policies NERSC Data Management Policies Introduction NERSC provides its users with the means to store, manage, and share their research data products. In addition to systems specifically tailored for data-intensive computations, we provide a variety of storage resources optimized for different phases of the data lifecycle; tools to enable users to manage, protect, and control their data; high-speed networks for intra-site and inter-site (ESnet) data transfer; gateways and portals

  1. emergency management systems

    National Nuclear Security Administration (NNSA)

    9%2A en Building International Emergency Management Systems http:nnsa.energy.govaboutusourprogramsemergencyoperationscounterterrorisminternationalprograms-1

  2. Project Management Plan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Career Development Program Project Management Career Development Program The Project Management Career Development Program (PMCDP) in Office of Project Management Oversight and Assessments was established in 2001 by a Congressional mandate to ensure the Department of Energy (DOE) has well qualified and experienced Federal Project Directors (FPDs) to oversee the agency's diverse portfolio of highly-technical construction, experimental equipment and environmental cleanup projects. The

  3. System Management Software

    Energy Science and Technology Software Center (OSTI)

    2013-02-22

    MacPatch is Mac OS X system management software solution. It's used for patching, software distribution and inventory.

  4. Project Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Project Management Some of the Project Management Division’s many functions involve developing risk management plans, managing project risks, and providing input on prime contractor performance. Some of the Project Management Division's many functions involve developing risk management plans, managing project risks, and providing input on prime contractor performance. Employees in our Project Management Division address projects' planning and execution, as specified in

  5. Energy, Data Management, Reporting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Design the Strategy | Deliver Efficiency | Sustain Results Energy, Data Management, Reporting This presentation does not contain any proprietary, confidential, or otherwise restricted information. - - Agenda ● About Schneider Electric ● Enterprise wide Data Management ● Outputs ● Foundation and results ● Part of a complete energy management solution Schneider Electric Sustainability Services 2014 2 - - Schneider Electric Sustainability Services 2014 3 Schneider Electric - the global

  6. Energy Manager Webinar Series

    Broader source: Energy.gov [DOE]

    Energy Managers from leading manufacturing companies share lessons learned from implementing energy savings projects in these one-hour webinars. Topics include real-world challenges like creating a climate for successful project implementation, gaining management support, and obtaining financing. Each webinar highlights a different topic and features an energy manager from a different Better Plants Partner.

  7. Financial Management Oversight

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-08-31

    The Order defines requirements for effective financial management and adherence to DOE and applicable external financial management requirements and sets forth standards for ensuring the integrity and responsiveness of financial management and the accuracy and reliability of DOEs financial statements. Supersedes DOE O 2200.13.

  8. Records Management | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Records Management Records and Files The Department of Energy (DOE) Records Management Program provides oversight, guidance, and direction to ensure proper documentation...

  9. LTS Information Management - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Management About Us LTS Home Page LTS Project Management LTS Transition and Timeline LTS Execution LTS Background LTS Information Management LTS Fact Sheets Briefings ...

  10. LTS Project Management - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project Management About Us LTS Home Page LTS Project Management LTS Transition and Timeline LTS Execution LTS Background LTS Information Management LTS Fact Sheets Briefings LTS ...

  11. Managing a Process Safety Management inspection

    SciTech Connect (OSTI)

    Mulvey, N.P. [AcuTech Consulting, Inc., Princeton, NJ (United States)

    1995-12-31

    The Occupational Safety and Health Administration (OSHA) Process Safety Management (PSM) regulations (29 CFR {section} 1910.119) have been in effect for almost three years. State level risk management programs, in New Jersey, California, and Delaware have been in effect for over six years. More recently, Nevada and Louisiana have enacted process safety management programs. These regulations have had a significant impact on all phases of plant operations, including preliminary design, construction, startup, and operations. Through proper planning and the commitment of resources, many facilities are beginning to realize the benefits of well developed PSM programs. This paper will discuss in greater detail some of these benefits, and in particular, the subject of governmental inspections of facilities for process safety management programs.

  12. Multimedia environmental management

    SciTech Connect (OSTI)

    Soesilo, J.A.; Wiley, W.D.

    1999-09-01

    This book explores and supports the argument that effective environmental management must be based on a multimedia approach, which focuses simultaneously on air, water, and waste and enables managers to assess the resulting financial, operation, and management benefits. The multimedia approach, which can be used to design an effective compliance program, includes proper waste and material handling management, systematic monitoring, and record keeping requirements. This approach integrates a wide array of environmental requirements and decision processes, which the authors examine in sixteen chapters, organized into four parts: the role of environmental management; environmental aspects of business operation, environmental processes; and environmental management trends. Within these parts, the authors highlight the development of modern environmental management and provide an overview of federal laws pertinent to multimedia environmental management. They examine such issues as chemical storage and transportation, tank system operations and requirements, waste determination, spill response procedures, and employee training. Environmental processes addressed in the book include the management of solid and hazardous waste, wastewater treatment systems, stormwater management, air emission control, and site remediation. The authors also briefly discuss significant initiatives in US environmental management and look toward corporate sustainable development.

  13. DOE Jobs Online (Hiring Manager), Office of Human Capitol Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Innovation and Solutions | Department of Energy Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions PDF icon DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions More Documents & Publications PIA - GovTrip (DOE data) PIA -

  14. ORO Names New Assistant Manager for Environmental Management

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy Oak Ridge Office names John Eschenberg as its Assistant Manager for Environmental Management.

  15. DOE - Office of Legacy Management -- Fernald Environmental Management...

    Office of Legacy Management (LM)

    Fernald Environmental Management Project - 027 FUSRAP Considered Sites Site: Fernald Environmental Management Project (027) Designated Name: Alternate Name: Location: Evaluation ...

  16. Strategies for Successful Energy Management

    Broader source: Energy.gov [DOE]

    This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on energy management for the portfolio manager initiative

  17. Office of Personnel Management

    Energy Savers [EERE]

    Personnel Management October 2014 Questions & Answers 1 Pathways Programs 5 CFR Parts 213, 302, 315, and 362 Questions and Answers Background Executive Order 13562 Recruiting and Hiring Students and Recent Graduates dated December 27, 2010, authorized two new excepted service hiring authorities and consolidated them with a revised Presidential Management Fellows Program to establish the Pathways Programs for students and recent graduates. The U.S. Office of Personnel Management (OPM)

  18. Configuration Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-27

    The purpose of this standard is to define the objectives of a configuration management process for DOE nuclear facilities (including activities and operations), and to provide detailed examples and supplementary guidance on methods of achieving those objectives. Configuration management is a disciplined process that involves both management and technical direction to establish and document the design requirements nd the physical configuration of the nuclear facility and to ensure that they remain consistent with each other and the documentation.

  19. Sensor Authentication: Embedded Processor Code

    Energy Science and Technology Software Center (OSTI)

    2012-09-25

    Described is the c code running on the embedded Microchip 32bit PIC32MX575F256H located on the INL developed noise analysis circuit board. The code performs the following functions: Controls the noise analysis circuit board preamplifier voltage gains of 1, 10, 100, 000 Initializes the analog to digital conversion hardware, input channel selection, Fast Fourier Transform (FFT) function, USB communications interface, and internal memory allocations Initiates high resolution 4096 point 200 kHz data acquisition Computes complex 2048more » point FFT and FFT magnitude. Services Host command set Transfers raw data to Host Transfers FFT result to host Communication error checking« less

  20. Sensor Authentication: Embedded Processor Code

    SciTech Connect (OSTI)

    2012-09-25

    Described is the c code running on the embedded Microchip 32bit PIC32MX575F256H located on the INL developed noise analysis circuit board. The code performs the following functions: Controls the noise analysis circuit board preamplifier voltage gains of 1, 10, 100, 000 Initializes the analog to digital conversion hardware, input channel selection, Fast Fourier Transform (FFT) function, USB communications interface, and internal memory allocations Initiates high resolution 4096 point 200 kHz data acquisition Computes complex 2048 point FFT and FFT magnitude. Services Host command set Transfers raw data to Host Transfers FFT result to host Communication error checking

  1. Management Control Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-04-18

    To establish requirements and responsibilities for the Department of Energy Management Control Program. Cancels DOE O 413.1. Canceled by DOE O 413.1B.

  2. High Performance Energy Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Performance Energy Management Reduce energy use and meet your business objectives By applying continuous improvement practices similar to Lean and Six Sigma, the BPA Energy Smart...

  3. Asset Management Strategies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Efficiency and Fish and Wildlife asset categories. The CAB, in consultation with affected business units and the Asset Management Executive Sponsors, determines whether and how...

  4. Management's Discussion & Analysis Profile

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in conformity with generally accepted accounting principles (GAAP) requires management to make estimates and assumptions that affect the reported amounts of assets and...

  5. Management's Discussion & Analysis Profile

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Adjusted Net Revenue is net revenue after removing the effects of certain debt management actions, in particular the Debt Service Reassignment, from prior years. These debt...

  6. Asset Management Strategies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Asset-Management-Strategies Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects & Initiatives...

  7. BETO Active Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Contributes to setting goals * In-depth knowledge of project statusaccomplishmentsissues ... Project Project Program eere.energy.gov Management Lifecycle Budget & Procurement Planning ...

  8. Managing Increased Charging Demand

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Managing Increased Charging Demand Carrie Giles ICF International, Supporting the Workplace Charging Challenge Workplace Charging Challenge Do you already own an EV? Are you...

  9. Logistics Management Specialist

    Broader source: Energy.gov [DOE]

    The Deputy Assistant Secretary for the Office of Petroleum Reserves (OPR) manages the Strategic Petroleum Reserve (SPR) and is responsible for establishing policies, goals, and priorities for the...

  10. Acquisition Career Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-05-14

    The order sets forth requirements and responsibilities for the Department of Energy (DOE) Acquisition Career Management Program. Supersedes DOE O 361.1B.

  11. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-11-02

    The Order establishes policy and assigns roles and responsibilities for the Department of Energy (DOE) Emergency Management System. Supersedes DOE O 151.1B.

  12. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-11-21

    This revised Order is needed to clarify the roles and responsibilities, policies, and procedures for effectively managing IT investments to ensure mission success.

  13. Procurement and Materials Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Washington River Protection Solutions | Hanford.gov | Energy.gov Procurement and Materials Management Small Business Resources Small ... There are no upcoming events in the system. ...

  14. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ...Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset ...

  15. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ...Project Management Performance Metric FY 2013 Target FY 2013 Forecast FY 2013 Pre- & Post-CAP* Forecast Comment Capital Asset Project Success: Complete 90% of capital asset ...

  16. Chemical Industry Corrosion Management

    SciTech Connect (OSTI)

    2003-02-01

    Improved Corrosion Management Could Provide Significant Cost and Energy Savings for the Chemical Industry. In the chemical industry, corrosion is often responsible for significant shutdown and maintenance costs.

  17. NIF & Photon Science Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program Director, Laser S&T and Systems Engineering NIF Mark Herrmann Director, National Ignition Facility Doug Larson NIF Facility Manager and Chief Engineer, NIF & Photon Science ...

  18. ORISE: Peer Review Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Man participating in a peer review The Oak Ridge Institute for Science and Education (ORISE) ensures that scientific reviews are conducted in a professional manner and...

  19. Waste management progress report

    SciTech Connect (OSTI)

    1997-06-01

    During the Cold War era, when DOE and its predecessor agencies produced nuclear weapons and components, and conducted nuclear research, a variety of wastes were generated (both radioactive and hazardous). DOE now has the task of managing these wastes so that they are not a threat to human health and the environment. This document is the Waste Management Progress Report for the U.S. Department of Energy dated June 1997. This progress report contains a radioactive and hazardous waste inventory and waste management program mission, a section describing progress toward mission completion, mid-year 1997 accomplishments, and the future outlook for waste management.

  20. Parallel integrated thermal management

    DOE Patents [OSTI]

    Bennion, Kevin; Thornton, Matthew

    2014-08-19

    Embodiments discussed herein are directed to managing the heat content of two vehicle subsystems through a single coolant loop having parallel branches for each subsystem.

  1. Efficient Water Use & Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Use Goal 4: Efficient Water Use & Management Aware of the arid climate of northern New Mexico, water reduction and conservation remains a primary concern at LANL. Energy...

  2. Digital Data Management Plans

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    energy physics through experiments that strengthen our fundamental understanding of matter, energy, space, and time. Plans HAWC gamma-Ray Observatory Data Management Plan (pdf)...

  3. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of those activities, prioritizing improvements, and measuring results. May 30, 2012 The continuous improvement cycle Our Environmental Management System encourages continuous...

  4. NREL Announces Management Changes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    technologies such as solar energy, wind energy, fuels development and building research. ... He will manage service and support activities such environment, safety and health, finance ...

  5. Managing Increased Charging Demand

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Managing Increased Charging Demand Carrie Giles ICF International, Supporting the Workplace Charging Challenge Workplace Charging Challenge Do you already own an EV? Are you ...

  6. Grants Management Specialist

    Broader source: Energy.gov [DOE]

    The Office of Science manages fundamental research programs in basic energy sciences, biological and environmental sciences, and computational science. In addition, the Office of Science is the...

  7. Enterprise Risk Management Framework

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Framework The Enterprise Risk Management (ERM) framework includes four steps: identify the risks, determine the probability and impact of each one, identify controls that are...

  8. Advisory Committee Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-10-22

    The Manual provides detailed DOE requirements, responsibilities, processes, and procedures for the establishment, operation, and management of advisory committees. Supersedes DOE M 510.1-1.

  9. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in the Program Management Scorecard. The Department has maintained performance measures for key project (Federal Project ... of FY11, on a program portfolio basis, 90% of all ...

  10. International Commitments Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-11-18

    This Order establishes a process to manage the Department's International Commitments under the administrative direction of the Office of Policy and International Affairs. No cancellation.

  11. Information Exchange management site

    Energy Science and Technology Software Center (OSTI)

    2012-08-01

    Django site used to manage the approved information exchanges (content models) after creation and public comment at https://github.com/usgin-models.

  12. Project Management Practices

    Broader source: Energy.gov (indexed) [DOE]

    Version) See Figure 3-3. 19. Administrative Controls 1. Provisions relating to organization and management, procedures, recordkeeping, assessment, and reporting necessary to...

  13. Office of Legacy Management

    Office of Legacy Management (LM)

    Energy Office of Legacy Management JUL 1 0 2008 Alonso Ramirez, Scientific Director EI Verde Research Station Institute for Tropical Ecosystem Studies University of Puerto Rico...

  14. Dreissenid Mussel Prevention, Management...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management, Research, Coordination, and Outreach for the Columbia River Basin A Roadmap to Make Strategic Investments in Federal Columbia River Power System and Technology...

  15. Dreissenid Mussel Prevention, Management, ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management, Research, Coordination, and Outreach for the Columbia River Basin A Roadmap to Make Strategic Investments in Federal Columbia River Power System and Technology...

  16. Turbine Thermal Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Key Contacts Turbine Thermal Management The gas turbine is the workhorse of power generation, and technology ... could result in a 4 - 6 percent gain in overall system efficiency. ...

  17. Radioactive Waste Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1984-02-06

    To establish policies and guidelines by which the Department of Energy (DOE) manages tis radioactive waste, waste byproducts, and radioactively contaminated surplus facilities.

  18. Records Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-02-03

    The Order sets forth requirements and responsibilities for implementing and maintaining a cost-effective records management program throughout the Department of Energy.

  19. Change Control Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-29

    The Guide provides a suggested approach and uniform guidance for managing project and contract changes through applying the requirements of DOE O 413.3B. No cancellation.

  20. Records Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-26

    The Order sets forth requirements and responsibilities for establishing and maintaining a program for the efficient and economical management of records and information assets.

  1. DOE Office of Environmental Management Project and Contract Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Improvement Timeline | Department of Energy Acquisition » DOE Office of Environmental Management Project and Contract Management Improvement Timeline DOE Office of Environmental Management Project and Contract Management Improvement Timeline Improving DOE contract and project management is a top priority of the Department's senior management and entire organization. View some highlights of EM's improvement actions here. PDF icon DOE Office of Environmental Management Contract and Project

  2. Environmental Management Waste Management Facility (EMWMF) at Oak Ridge |

    Energy Savers [EERE]

    Department of Energy Waste Management Facility (EMWMF) at Oak Ridge Environmental Management Waste Management Facility (EMWMF) at Oak Ridge Full Document and Summary Versions are available for download PDF icon Environmental Management Waste Management Facility (EMWMF) at Oak Ridge PDF icon Summary - Environmental Management Waste Management Facility (EMWMF) at Oak Ridge, TN More Documents & Publications Proposed On-Site Waste Disposal Facility (OSWDF) at the Portsmouth Gaseous Diffusion

  3. Metadata management staging system

    Energy Science and Technology Software Center (OSTI)

    2013-08-01

    Django application providing a user-interface for building a file and metadata management system. An evolution of our Node.js and CouchDb metadata management system. This one focuses on server functionality and uses a well-documented, rational and REST-ful API for data access.

  4. Quality Procedure- Records Management

    Broader source: Energy.gov [DOE]

    This procedure establishes the responsibilities and process for identifying and managing records, including quality records, generated by EM Headquarters Office of Standards and Quality Assurance personnel as well as Office of Standards and Quality Assurance representatives located in DOE EM Field Offices in accordance with EM-QA-001, Environmental Management Quality Assurance Program.

  5. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-09-16

    This Guide provides a framework for identifying and managing key technical, schedule, and cost risks through applying the requirements of DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, dated 7-28-06. Canceled by DOE G 413.3-7A, dated 1-12-11. Does not cancel other directives.

  6. Energy Management Webinar Series

    Broader source: Energy.gov [DOE]

    Boost your knowledge on how to implement an energy management system through this four-part webinar series from the Superior Energy Performance program. Each webinar introduces various elements of the ISO 50001 energy management standard—based on the Plan-Do-Check-Act approach—and the associated steps of DOE's eGuide for ISO 50001 software tool.

  7. Information Collection Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-11

    This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

  8. Tribal Financial Management Symposium

    Broader source: Energy.gov [DOE]

    The 3rd Annual Tribal Financial Management Symposium is a two-day event will focus on one of the most important aspects of a tribe's financial management. Attendees will learn about the state of the economy, building a financial constitution, both long- and short-term investments, alternative investment options, and much more.

  9. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-01

    To establish policy and to assign and describe roles and responsibilities for the Department of Energy (DOE) Emergency Management System. The Emergency Management System provides the framework for development, coordination, control, and direction of all emergency planning, preparedness, readiness assurance, response, and recovery actions. Canceled by DOE O 151.1B. Cancels DOE O 151.1.

  10. Property Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Property Management Personal Property Management and Accountability for Headquarters Management Personal property management includes all functions necessary for the proper determination of need, source, acquisition, receipt, accountability, utilization, maintenance, rehabilitation, storage, distribution and disposal of property. Authorized Property Representatives Effective April 1, 2016: Authorized Property Pass Signers List and Accountable Property Representatives List Personal

  11. Berkeley Storage Manager

    Energy Science and Technology Software Center (OSTI)

    2007-03-01

    Storage Resource Managers (SRMs) are middleware components whose function is to provide dynamic space allocation and file management of shared storage components on the Grid, They provide storage availability for the planning and execution of a Grid job. SRMs manage two types of resources: space and files. When managing space, SRMs negotiate space allocation with the requesting client, andlor assign default space quotas. When managing files, SRMs allocate space for files, invoke file transfer servicesmore » to move files into the space. phi files for a certain lifetime, release files upon the clients’ request, and use file replacement policies to optimize the use of the shared space. SPMs can be designed to provide effective sharing of files, by monitoring the activity of shared files, and make dynamic decisions on which files to replace when space is needed. In addition, SRMs perform automatic gathage collection of unused files by removing selected files whose lifetime has expired when space is needed. BeStMan is a Java implementation of SRM functionality by the Scientific Data Management Group at LBNL. It manages multiple disks as well as the HPSS mass storage system, and can be adapted to other storage systems. The BeStMan package contains the SRM server, the SRM client tools, and SRM testing tools.« less

  12. Manager's Desk Reference on Human Capital Management Flexibilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Manager's Desk Reference on Human Capital Management Flexibilities Manager's Desk Reference on Human Capital Management Flexibilities The purpose of this document is to provide DOE managers and supervisors with information on available flexibilities that can be used in day-to-day human capital management activities, especially those bearing on the recruitment and retention of high-quality staff. Each section of the document includes a basic description of a particular

  13. Nuclear materials management overview

    SciTech Connect (OSTI)

    DiGiallonardo, D.A. )

    1988-01-01

    The true goal of Nuclear Materials MANAGEMENT (NMM) is the strategical and economical management of all nuclear materials. Nuclear Materials Management's role involves near-term and long-term planning, reporting, forecasting, and reviewing of inventories. This function is administrative in nature. it is a growing area in need of future definition, direction, and development. Improvements are required in program structure, the way residues and wastes are determined, how ''what is and what if'' questions are handled, and in overall decision-making methods.

  14. Nuclear materials management overview

    SciTech Connect (OSTI)

    DiGiallonardo, D.A.

    1988-01-01

    The true goal of Nuclear Materials Management (NMM) is the strategical and economical management of all nuclear materials. Nuclear Materials Management's role involves near-term and long-term planning, reporting, forecasting, and reviewing of inventories. This function is administrative in nature. It is a growing area in need of future definition, direction, and development. Improvements are required in program structure, the way residues and wastes are determined, how /open quotes/What is and what if/close quotes/ questions are handled, and in overall decision-making methods. 2 refs.

  15. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  16. Radioactive Waste Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. The purpose of the Manual is to catalog those procedural requirements and existing practices that ensure that all DOE elements and contractors continue to manage DOE's radioactive waste in a manner that is protective of worker and public health and safety, and the environment. Does not cancel other directives.

  17. Line Management Perspective: Office of Environmental Management (EM)

    Broader source: Energy.gov [DOE]

    Slide Presentation by Matthew Moury, Deputy Assistant Secretary for Safety, Security and Quality Programs, Office of Environmental Management. EFCOG Integrated Safety Management Work Planning and Control.

  18. Management Not Available 12 MANAGEMENT OF RADIOACTIVE AND NON...

    Office of Scientific and Technical Information (OSTI)

    87 Oak Ridge model conference: Proceedings: Volume I, Part 3, Waste Management Not Available 12 MANAGEMENT OF RADIOACTIVE AND NON-RADIOACTIVE WASTES FROM NUCLEAR FACILITIES; 11...

  19. Waste Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Waste Management Oak Ridge has an onsite CERCLA disposal facility, the Environmental Management Waste Management Facility, that reduces cleanup and transportation costs. Oak Ridge has an onsite CERCLA disposal facility, the Environmental Management Waste Management Facility, that reduces cleanup and transportation costs. Years of diverse research and uranium and isotope production led to numerous forms of waste in Oak Ridge. However, our EM program has worked to identify,

  20. Carlsbad Field Office Manager Selected

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Carlsbad Field Office Manager Selected CARLSBAD, N.M., November 10, 2011 - The U.S. Department of Energy's (DOE) Richland Operations Office (RL) Assistant Manager for the River Corridor Joe Franco was selected as Manager for the Carlsbad Field Office (CBFO), which oversees the Waste Isolation Pilot Plant (WIPP). CBFO Deputy Manager Ed Ziemianski has been acting in the CBFO Manager's position for the past year and will continue to serve as Deputy Manager. In operation since 1999, WIPP is a DOE

  1. Paducah Site Management Plan

    Broader source: Energy.gov [DOE]

    The annual Paducah Gaseous Diffusion Plant Site Management Plan (SMP) outlines DOE’s strategic approach for achieving cleanup under the Federal Facility Agreement. The purpose of the SMP is to...

  2. Human Resource Management Delegation

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-06-28

    The notice is to clarifies and updates existing Human Resource Management Delegation Authorities and the levels to which they are delegated. Expired 6-28-97. Does not cancel any directives.

  3. ENVIRONMENTAL MANAGEMENT ADVISORY BOARD

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EM Update and Discussion of Charges to the Board Mark Whitney, Principal Deputy Assistant Secretary for Environmental Management 2:30 p.m. Break 2:45 p.m. Public Comment Period ...

  4. Office of Information Management

    Broader source: Energy.gov [DOE]

    The Office of Information Management provides a broad range of information technology services in support of the Associate Under Secretary for the Office of Environment, Health, Safety and Security (AU).

  5. Acquisition and Project Management

    National Nuclear Security Administration (NNSA)

    4%2A en Acquisition and Project Management Office volunteers get up-close look at Office of Secure Transportation exercise http:nnsa.energy.govblogacquisition-and-project-mana...

  6. Integrated Safety Management Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Section 6.0 of this System Description shows how EM Headquarters (HQ) utilizes its management systems to leverage learning and knowledge throughout the entire EM complex. The EM HQ ...

  7. Site Management Guide

    Broader source: Energy.gov [DOE]

    The main purpose of the LM Site Management Guide is to be a reference document for LM and its contractor(s) and to provide accurate and consistent information across the LM organization. The guide is updated annually.

  8. Change Control Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-29

    The Guide provides a suggested approach and uniform guidance for managing project and contract changes through applying the requirements of DOE O 413.3B. Admin Chg 1 dated 10-22-2015.

  9. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 Forecast FY 2011 Pre- & Post-CAP Forecast Comment 1a. ...

  10. Strategic Energy Management

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy (DOE) SEE Action Network and Weatherization and Intergovernmental Program Technical Assistance Program sponsored this webinar about strategic management in the public sector on November 7, 2012.

  11. SLURM Resource Manager is

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    resource management (such as Torque) and job scheduling (such as Moab) into one system. ... Cori Phase 1. * Hopper stays with TorqueMoab un?l re?re. * Edison stays with Torque...

  12. managing the stockpile

    National Nuclear Security Administration (NNSA)

    managed by the National Nuclear Security Administration within the U. S. Department of Energy.

    OST is responsible for the safe and secure transport in the contiguous United...

  13. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-12-23

    The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Supersedes DOE O 200.1.

  14. Loan Specialist (Portfolio Management)

    Broader source: Energy.gov [DOE]

    This position is located in the Portfolio Management Division of the U. S. Department of Energy's (DOE) Loan Programs Office (LPO). The incumbent in this position will serve as a Loan Specialist,...

  15. Office of Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-27

    Designates the Director, Office of Management as the DOE official responsible to perform the duties set forth in 22 CFR , sections 62.11 and 41.63 pertaining to the DOE Exchange Visitor Program,

  16. Project Management Lessons Learned

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-05

    The guide supports DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, and aids the federal project directors and integrated project teams in the execution of projects.

  17. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-05-26

    To establish requirements and procedures for the management of nuclear materials within the Department of Energy (DOE). Cancels DOE 5660.1A. Canceled by DOE O 410.2.

  18. Earned Value Management

    Broader source: Energy.gov [DOE]

    Earned Value Management (EVM) is a systematic approach to the integration and measurement of cost, schedule, and technical (scope) accomplishments on a project or task. It provides both the...

  19. Your Records Management Responsibilities

    Broader source: Energy.gov [DOE]

    As a DOE federal or contractor employee, you will create or receive official records, and you are responsible for managing those records as part of accomplishing the Department's mission and...

  20. CURTKOEGEN Business Manager

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    624-670 FAX (509) 624-5554 AFL-CIO ;risdiction pstern Woshmgton ;rid CURTKOEGEN Business Manager tate ofldoho < .. ,. ': . 64 AVl:JIMIU. Pi1t'Hl'iN December l l 2015...

  1. Item Management Control System

    Energy Science and Technology Software Center (OSTI)

    1993-08-06

    The Item Management Control System (IMCS) has been developed at Idaho National Engineering Laboratory to assist in organizing collections of documents using an IBM-PC or similar DOS system platform.

  2. Headquarters Personal Property Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-10-25

    To establish procedures for managing Government personal property owned or leased by the Department of Energy and in the custody of DOE Headquarters employees, including those in the National Nuclear Security Administration. Cancels DOE HQ O 580.1A

  3. Transportation Management Workshop: Proceedings

    SciTech Connect (OSTI)

    Not Available

    1993-10-01

    This report is a compilation of discussions presented at the Transportation Management Workshop held in Gaithersburg, Maryland. Topics include waste packaging, personnel training, robotics, transportation routing, certification, containers, and waste classification.

  4. Better Buildings Neighborhood Program Grant Recipient Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Grant Recipient Management Handbook Better Buildings Neighborhood Program Grant Recipient Management Handbook Better Buildings Neighborhood Program Grant Recipient Management ...

  5. Personal Property Management Program Brochure | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Personal Property Management Program Brochure Personal Property Management Program Brochure PDF icon Personal Property Management Program Brochure More Documents & Publications...

  6. Acquisition and Project Management Continuous Improvement Presentation...

    Office of Environmental Management (EM)

    and Project Management Continuous Improvement Presentation Acquisition and Project Management Continuous Improvement Presentation Presentation on Acquisition and Project Management ...

  7. Information and Records Management Transition Guidance | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information and Records Management Transition Guidance Information and Records Management Transition Guidance Information and Records Management Transition Guidance (March 2004)...

  8. Environmental Management Associates | Open Energy Information

    Open Energy Info (EERE)

    Environmental Management Associates Jump to: navigation, search Name: Environmental Management Associates Abbreviation: EMA Website: www.emacorp.com Environmental Management...

  9. Program Management Review Opening Presentation | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Review Opening Presentation Program Management Review Opening Presentation BETO Program Management Review Opening Presentation, July 2013 PDF icon programmanagementrev...

  10. Project Management Career Development Program | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    are here Home Operational Management Certifications and Professional Development Project Management Career Development Program Project Management Career Development...

  11. Management Control Cover

    Energy Savers [EERE]

    Assess- ing Natural Resource Damage at Rocky Flats OAS-M-06-02 November 2005 REPORT ON MANAGEMENT CONTROLS OVER ASSESSING NATURAL RESUORCE DAMAGE AT ROCKY FLATS TABLE OF CONTENTS Natural Resource Damage Assessment at Rocky Flats Details of Finding 1 Recommendation and Comments 3 Appendices Objective, Scope, and Methodology 5 Prior Audit Reports 6 Management Comments 7 NATURAL RESURCE DAMAGE ASSESSMENT AT ROCKY FLATS Page 1 Details of Finding Natural Resource The Rocky Flats Project Office

  12. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Environmental Management Scientist Sets His Sights on Mars Environmental Management Scientist Sets His Sights on Mars September 4, 2012 - 3:29pm Addthis Curiosity, left, at NASA’s Jet Propulsion Laboratory in Pasadena, California, in late November 2011. Shown here is the flight hardware that was being assembled prior to shipment to Cape Canaveral Air Force Station in Florida for the launch. | Photo Credit Dr. Robert C. Nelson Curiosity, left, at NASA's Jet Propulsion Laboratory

  13. Turbine Thermal Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Turbine Thermal Management Fact Sheets Research Team Members Key Contacts Turbine Thermal Management The gas turbine is the workhorse of power generation, and technology advances to current land-based turbines are directly linked to our country's economic and energy security. Technical advancement for any type of gas turbine generally implies better performance, greater efficiency, and extended component life. From the standpoint of cycle efficiency and durability, this suggests that a continual

  14. Safety Management System Policy

    Energy Savers [EERE]

    Health, Safety and Security U.S. Department of Energy POLICY Washington, D.C. Approved: 4-25-11 SUBJECT: INTEGRATED SAFETY MANAGEMENT POLICY PURPOSE AND SCOPE To establish the Department of Energy's (DOE) expectation for safety, 1 including integrated safety management that will enable the Department's mission goals to be accomplished efficiently while ensuring safe operations at all departmental facilities and activities. This Policy cancels and supersedes DOE Policy (P) 411.1, Safety

  15. TWRS safety management plan

    SciTech Connect (OSTI)

    Popielarczyk, R.S., Westinghouse Hanford

    1996-08-01

    The Tank Waste Remediation System (TWRS) Safety Management Program Plan for development, implementation and maintenance of the tank farm authorization basis is described. The plan includes activities and procedures for: (a) Updating the current Interim Safety Basis, (b) Development,implementation and maintenance of a Basis for Interim Operations, (c) Development, implementation and maintenance of the Final Safety Analyses Report, (d) Development and implementation of a TWRS information Management System for monitoring the authorization basis.

  16. Issues Management Tool

    Energy Science and Technology Software Center (OSTI)

    2010-12-31

    IMTool performs the following: • The IMTool can manage issues, actions, and activities from one screen. • Provides enhanced and intuitive searching, sorting, and filtering capabilities. Grids allow for filtering any column instantly by any data heading. • IMTool uses drop-down menus to ensure date is entered accurately with consistency. • User-friendly system – highly utilized commitment tracking screen functions. Information is viewed on the left side of the screen and managed on the right.

  17. E M Environmental Management

    Office of Environmental Management (EM)

    Drew Bittner About Us Drew Bittner - Writer/Editor, Office of Energy Efficiency and Renewable Energy Drew Bittner is the writer/editor and blog coordinator for the DOE's Office of Energy Efficiency and Renewable Energy. He is a former Presidential Management Intern (PMI) and a former web project manager for EERE. Most Recent EERE and Earth Day--A Partnership in Pictures April 22 National Bat Appreciation Day April 15 Women's History Month: Ebony Vauss, Solar Energy Technologies Office March 25

  18. Radioactive Waste Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. Change 1 dated 6/19/01 removes the requirement that Headquarters is to be notified and the Office of Environment, Safety and Health consulted for exemptions for use of non-DOE treatment facilities. Certified 1-9-07.

  19. Lithium battery management system

    DOE Patents [OSTI]

    Dougherty, Thomas J.

    2012-05-08

    Provided is a system for managing a lithium battery system having a plurality of cells. The battery system comprises a variable-resistance element electrically connected to a cell and located proximate a portion of the cell; and a device for determining, utilizing the variable-resistance element, whether the temperature of the cell has exceeded a predetermined threshold. A method of managing the temperature of a lithium battery system is also included.

  20. Friendly Skies Waste Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Friendly Skies Waste Management AGOS keeps watch above the NNSS. Hyde Park goes undefeated en route to Middle School title. Nevada attends waste management symposium in Arizona. See page 8. See page 4. See page 6. RSL Goes Behind-the- Scenes During the 57th Presidential Inauguration An estimated one million people flooded the nation's capital on Jan. 21, 2013, to witness the 57th Presidential Inauguration and the historic second inauguration of Barack Obama. The event was designated as a

  1. The Utility Management Conference

    Broader source: Energy.gov [DOE]

    The Utility Management Conference™ 2016 in San Diego is the place to be for leading utility and consulting staff. The technical program has been expanded to 36 sessions running in four concurrent rooms in order to provide utility leaders with the latest tools, techniques, best practices, and emerging solutions you need for effective utility management. This event will empower attendees, leading the water sector “On the Road to the Utilities of the Future.”

  2. Vantage Management | Open Energy Information

    Open Energy Info (EERE)

    Management Jump to: navigation, search Name: Vantage Management Place: New York Product: US-based firm which provides business and technical consulting to growing companies....

  3. Claridge Management | Open Energy Information

    Open Energy Info (EERE)

    Claridge Management Jump to: navigation, search Name: Claridge Management Place: United Kingdom Product: Claridge is focusing on setting up incubatortechnology development hubs in...

  4. Environmental Management Advisory Board Subcommittees

    Broader source: Energy.gov [DOE]

    SUBCOMMITTEE PURPOSE: The Subcommittee will provide advice, information, and recommendations to the Assistant Secretary for Environmental Management (EM) relating to project management. Although,...

  5. Project Management Policies & Principles Memo

    Broader source: Energy.gov [DOE]

    Memo enhances and clarifies departmental policy related to project management as a result of the Improving Project Management Study and subsequent Secretarial Memo dated December 2014.

  6. Labor-Management Relations (LMR)

    Broader source: Energy.gov [DOE]

    Department of Energy (DOE) Labor Management Relations (LMR), provides direction and oversight of the Departments labor-management relations programs and appraises the effectiveness of DOE labor...

  7. Deactivation & Decommissioning Knowledge Management Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Knowledge Management Information Tool (D&D KM-IT) Deactivation & Decommissioning Knowledge Management Information Tool (D&D KM-IT) Deactivation & Decommissioning Knowledge ...

  8. Data Management at the ALS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management at the ALS Print Users of the ALS are responsible for meeting their data management obligations to their home institutions and granting agencies. Except as noted ...

  9. Fleet Management | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Fleet management includes commercial and agency owned motor vehicles such as cars, vans, trucks, and buses. Fleet (vehicle) management at the headquarters level includes a range of...

  10. Safety Management System Policy | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Program Management Safety Safety Management System Policy Safety Management System Policy Safety Management Systems provide a formal, organized process whereby people plan, ...

  11. Information Management Conference | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Management Conference Information Management Conference Information Management Conference The 34th Information Management Conference (IMC) sponsored by the Office of ...

  12. Executive Branch Management Scorecard | Department of Energy

    Energy Savers [EERE]

    Branch Management Scorecard Executive Branch Management Scorecard PDF icon Executive Branch Management Scorecard More Documents & Publications Executive Branch Management Scorecard Slide 1 Three Year Rolling Timeline

  13. Waste Management Update by Frank Marcinowski

    Office of Environmental Management (EM)

    U.S. DOE Environmental Management Update on Waste Management (and other EM Mission Units) Frank Marcinowski Deputy Assistant Secretary for Waste Management ENVIRONMENTAL MANAGEMENT ...

  14. OFFICE OF ENVIRONMENTAL MANAGEMENT NAMES NEW IDAHO CLEANUP MANAGER

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Danielle Miller (208) 526-5709 For Immediate Release May 30, 2014 OFFICE OF ENVIRONMENTAL MANAGEMENT NAMES NEW IDAHO CLEANUP MANAGER Idaho Falls, ID - The U.S. Department of Energy Office of Environmental Management today announced that John (Jack) Zimmerman has been named Deputy Manager of its highly-successful Idaho Cleanup program, which oversees the environmental cleanup and waste management mission at DOE's Idaho site. Mr. Zimmerman has more than 25 years of experience in nuclear

  15. Environmental Requirements Management

    SciTech Connect (OSTI)

    Cusack, Laura J.; Bramson, Jeffrey E.; Archuleta, Jose A.; Frey, Jeffrey A.

    2015-01-08

    CH2M HILL Plateau Remediation Company (CH2M HILL) is the U.S. Department of Energy (DOE) prime contractor responsible for the environmental cleanup of the Hanford Site Central Plateau. As part of this responsibility, the CH2M HILL is faced with the task of complying with thousands of environmental requirements which originate from over 200 federal, state, and local laws and regulations, DOE Orders, waste management and effluent discharge permits, Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) response and Resource Conservation and Recovery Act (RCRA) corrective action documents, and official regulatory agency correspondence. The challenge is to manage this vast number of requirements to ensure they are appropriately and effectively integrated into CH2M HILL operations. Ensuring compliance with a large number of environmental requirements relies on an organization’s ability to identify, evaluate, communicate, and verify those requirements. To ensure that compliance is maintained, all changes need to be tracked. The CH2M HILL identified that the existing system used to manage environmental requirements was difficult to maintain and that improvements should be made to increase functionality. CH2M HILL established an environmental requirements management procedure and tools to assure that all environmental requirements are effectively and efficiently managed. Having a complete and accurate set of environmental requirements applicable to CH2M HILL operations will promote a more efficient approach to: • Communicating requirements • Planning work • Maintaining work controls • Maintaining compliance

  16. Analytical Services Management System

    Energy Science and Technology Software Center (OSTI)

    2005-03-30

    Analytical Services Management System (ASMS) provides sample management services. Sample management includes sample planning for analytical requests, sample tracking for shipping and receiving by the laboratory, receipt of the analytical data deliverable, processing the deliverable and payment of the laboratory conducting the analyses. ASMS is a web based application that provides the ability to manage these activities at multiple locations for different customers. ASMS provides for the assignment of single to multiple samples for standardmore » chemical and radiochemical analyses. ASMS is a flexible system which allows the users to request analyses by line item code. Line item codes are selected based on the Basic Ordering Agreement (BOA) format for contracting with participating laboratories. ASMS also allows contracting with non-BOA laboratories using a similar line item code contracting format for their services. ASMS allows sample and analysis tracking from sample planning and collection in the field through sample shipment, laboratory sample receipt, laboratory analysis and submittal of the requested analyses, electronic data transfer, and payment of the laboratories for the completed analyses. The software when in operation contains business sensitive material that is used as a principal portion of the Kaiser Analytical Management Services business model. The software version provided is the most recent version, however the copy of the application does not contain business sensitive data from the associated Oracle tables such as contract information or price per line item code.« less

  17. Management control system description

    SciTech Connect (OSTI)

    Bence, P. J.

    1990-10-01

    This Management Control System (MCS) description describes the processes used to manage the cost and schedule of work performed by Westinghouse Hanford Company (Westinghouse Hanford) for the US Department of Energy, Richland Operations Office (DOE-RL), Richland, Washington. Westinghouse Hanford will maintain and use formal cost and schedule management control systems, as presented in this document, in performing work for the DOE-RL. This MCS description is a controlled document and will be modified or updated as required. This document must be approved by the DOE-RL; thereafter, any significant change will require DOE-RL concurrence. Westinghouse Hanford is the DOE-RL operations and engineering contractor at the Hanford Site. Activities associated with this contract (DE-AC06-87RL10930) include operating existing plant facilities, managing defined projects and programs, and planning future enhancements. This document is designed to comply with Section I-13 of the contract by providing a description of Westinghouse Hanford's cost and schedule control systems used in managing the above activities. 5 refs., 22 figs., 1 tab.

  18. TWRS Configuration management program plan

    SciTech Connect (OSTI)

    Vann, J.M.

    1996-06-03

    The TWRS Configuration Management Program Plan (CMPP) integrates technical and administrative controls to establish and maintain consistency among requirements, product configuration, and product information for TWRS products during all life cycle phases. This CMPP will be used by TWRS management and configuration management personnel to establish and manage the technical and integrated baselines and controls and status changes to those baselines.

  19. DOE Project Management Update (Metrics)

    Office of Energy Efficiency and Renewable Energy (EERE)

    Michael Peek, Deputy Director, Office of Project Management Oversight and Assessments March 22, 2016

  20. Oil field management system

    DOE Patents [OSTI]

    Fincke, James R.

    2003-09-23

    Oil field management systems and methods for managing operation of one or more wells producing a high void fraction multiphase flow. The system includes a differential pressure flow meter which samples pressure readings at various points of interest throughout the system and uses pressure differentials derived from the pressure readings to determine gas and liquid phase mass flow rates of the high void fraction multiphase flow. One or both of the gas and liquid phase mass flow rates are then compared with predetermined criteria. In the event such mass flow rates satisfy the predetermined criteria, a well control system implements a correlating adjustment action respecting the multiphase flow. In this way, various parameters regarding the high void fraction multiphase flow are used as control inputs to the well control system and thus facilitate management of well operations.

  1. Computer memory management system

    DOE Patents [OSTI]

    Kirk, III, Whitson John

    2002-01-01

    A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

  2. Berkeley Disk Resource Manager

    SciTech Connect (OSTI)

    2004-02-27

    The Berkeley Disk Resource Manager (B-DRM) is a middleware component whose function is to provide dynamic space allocation and file management of a shared disk system on the Grid. It provides space allocation and dynamic information on storage availability for the planning and execution of Grid jobs. The B-DRM manages two types of resources: space and files. Vi1en managing space, the B-DRM allocates space to the requesting client based on a default space quota, Then managing files, the B-DRM allocates space for files, invokes file transfer services to move files into the space, pins files for a certain lifetime, releases files upon the client?s request, and uses file replacement policies to optimize the use of the shared space. The B-DRM is designed to provide effective sharing of files, by monitoring the activity of shared files, and making dynamic decisions on which files to replace when space is needed. In addition, the B-DRM performs automatic garbage collection of unused files when space is needed by removing selected files that were released by the client or whose lifetime has expired. The BDRM supports requests to get multiple files in a single call, manages a queue of the requested files, brings in as many files as the space quota permits, and continues to reuse the space when files are released to stream files to the client until the entire request is satisfied. Similarly, the B-DRM supports requests to put multiple files into its space, streaming files into the allocated space and reusing the space if necessary.

  3. Berkeley Disk Resource Manager

    Energy Science and Technology Software Center (OSTI)

    2004-02-27

    The Berkeley Disk Resource Manager (B-DRM) is a middleware component whose function is to provide dynamic space allocation and file management of a shared disk system on the Grid. It provides space allocation and dynamic information on storage availability for the planning and execution of Grid jobs. The B-DRM manages two types of resources: space and files. Vi1en managing space, the B-DRM allocates space to the requesting client based on a default space quota, Thenmore » managing files, the B-DRM allocates space for files, invokes file transfer services to move files into the space, pins files for a certain lifetime, releases files upon the client’s request, and uses file replacement policies to optimize the use of the shared space. The B-DRM is designed to provide effective sharing of files, by monitoring the activity of shared files, and making dynamic decisions on which files to replace when space is needed. In addition, the B-DRM performs automatic garbage collection of unused files when space is needed by removing selected files that were released by the client or whose lifetime has expired. The BDRM supports requests to get multiple files in a single call, manages a queue of the requested files, brings in as many files as the space quota permits, and continues to reuse the space when files are released to stream files to the client until the entire request is satisfied. Similarly, the B-DRM supports requests to put multiple files into its space, streaming files into the allocated space and reusing the space if necessary.« less

  4. Aviation Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management » Aviation Management Aviation Management The Department of Energy, Aviation Program is the management function for all fleet aircraft and contracted aviation services for the Department. The program and its management personnel operate world-wide. To take advantage of the best communications and information services available, we have chosen the Net as one of our mainstays. The services provided from this page are designed to support our operating personnel. Except for our licensed

  5. NERSC Information Management (NIM) portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NERSC Information Management (NIM) portal The NERSC Information Management (NIM) system is a web portal used to view and modify user account, usage, and allocations information. Link to NIM interface NIM Guide for Users The NERSC Information Management (NIM) system is a web portal used to view and modify user account, usage, and allocations information. Read More » NIM Guide for PIs and Project Managers This Guide explains how to manage users in a project account (called a repository or repo).

  6. Fleet Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Property » Fleet Management Fleet Management Fleet management includes commercial and agency owned motor vehicles such as cars, vans, trucks, and buses. Fleet (vehicle) management at the headquarters level includes a range of functions, such as vehicle data base management of the FAST, FMVRS, FedFMS, and UNICOR systems, annual motor vehicle utilization and budget forecast data, as well as the use and monitoring of GSA systems in their Fleet DriveThru data base. Fleet Briefings DOE Fleet

  7. Operational Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Operational Management The Office of Management supports many leadership responsibilities for the Department of Energy (DOE), providing support for project and contract management and other administrative functions. For example, the office oversees more than $22 billion in annual contract obligations and $2 billion in financial assistance obligations. It supports the management of the Department's multi-billion dollar project portfolio, and provides the Secretary of Energy and senior

  8. Hoffman Joins Safety Management Elite

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hoffman Joins Safety Management Elite CARLSBAD, N.M., June 21, 2001 - Paul Hoffman of Westinghouse TRU Solutions LLC (WTS) has joined the ranks of the safety management elite in the United States by earning his Certificate in Safety Management. WTS is the management and operating contractor for the U.S. Department of Energy at the Waste Isolation Pilot Plant (WIPP). The Certificate in Safety Management is awarded by the American Society of Safety Engineers (ASSE) to recognize completion of

  9. Program Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Program Management The Oak Ridge Office of Environmental Management is located in the Joe L. Evins Federal Building in Oak Ridge, Tennessee. The Oak Ridge Office of Environmental Management is located in the Joe L. Evins Federal Building in Oak Ridge, Tennessee. While the Oak Ridge Office of EM's primary mission is to clean up environmental threats, the office has many different support functions that are necessary to conduct these projects. Our Planning and Baseline Management

  10. Monitoring and Managing Jobs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Jobs Monitoring and Managing Jobs Monitoring and Managing Batch Jobs These are some basic commands for monitoring and modifiying batch jobs while they're queued or running. NERSC has developed a new tool for monitoring and viewing the state of batch jobs for genepool called qs. Please read about Monitoring jobs with qs Action How to do it Comment Get a listing of your jobs and their states qs -u If you skip the -u option, you'll get all the jobs on Genepool/Phoebe. qstat -u user_name If you skip

  11. Monitoring and Managing Jobs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Monitoring and Managing Jobs Monitoring and Managing Jobs Commonly Used Commands Action How to do it Comment Get a summary of all batch jobs sgeusers Shows a tally of all jobs for all users including their states. This is a script that parses the output of qstat and is maintained by PDSF staff (located in /common/usg/bin). Do "sgeusers -h" for usage info. Get a listing of your jobs and their states qstat -u user_name If you skip the -u option, you'll get all the jobs on PDSF. Get

  12. Radioactive Waste Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    This Manual further describes the requirements and establishes specific responsibilities for implementing DOE O 435.1, Radioactive Waste Management, for the management of DOE high-level waste, transuranic waste, low-level waste, and the radioactive component of mixed waste. Change 1 dated 6/19/01 removes the requirement that Headquarters is to be notified and the Office of Environment, Safety and Health consulted for exemptions for use of non-DOE treatment facilities. Certified 1-9-07. Admin Chg 2, dated 6-8-11, supersedes DOE M 435.1-1 Chg 1.

  13. Management Rachana Ananthakrishnan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Globus for Data Management Rachana Ananthakrishnan (ranantha@uchicago.edu) Computation Institute Data Management Challenges * "Transfers often take longer than expected based on available network capacities" * "Lack of an easy to use interface to some of the high-performance tools" * "Tools [are] too difficult to install and use" * "Time and interruption to other work required to supervise large data transfers" * "Need data transfer tools that are

  14. Contract/Project Management

    Energy Savers [EERE]

    8 4 th Quarter Metrics Final Overall Contract and Project Management Performance Metrics and Targets Contract/Project Management Performance Metrics FY 2008 Target FY 2008 Actual Comment 1. Capital Asset Line Item Projects: 90% of projects completed within 110% of CD-2 TPC by FY11. 75% 76% This is a 3-year rolling average Data includes FY06 to FY08. (37/48) 2. EM Cleanup (Soil and Groundwater Remediation, D&D, and Waste Treatment and Disposal) Projects: 90% of EM cleanup projects complete

  15. Contract/Project Management

    Energy Savers [EERE]

    1 st Quarter Overall Contract and Project Management Performance Metrics and Targets Contract/Project Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1. Capital Asset Line Item Projects: 90% of projects completed within 110% of CD-2 TPC by FY11. 80% - No 1 st Qtr FY09 completions. This is a 3-year rolling average (FY07 to FY09). 2. EM Cleanup (Soil and Groundwater Remediation, D&D, and Waste Treatment and Disposal) Projects: 90% of EM cleanup projects complete 80% of

  16. Contract/Project Management

    Energy Savers [EERE]

    2 nd Quarter Overall Contract and Project Management Performance Metrics and Targets Contract/Project Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1. Capital Asset Line Item Projects: 90% of projects completed within 110% of CD-2 TPC by FY11. 80% - Two projects completed in the 2 nd Qtr FY09. This is a 3-year rolling average (FY07 to FY09). 2. EM Cleanup (Soil and Groundwater Remediation, D&D, and Waste Treatment and Disposal) Projects: 90% of EM cleanup projects

  17. Contract/Project Management

    Energy Savers [EERE]

    3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets Contract/Project Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1. Capital Asset Line Item Projects: 90% of projects completed within 110% of CD-2 TPC by FY11. 80% 72% This is a 3-year rolling average (FY07 to FY09). No 3 rd qtr FY09 completions. 2. EM Cleanup (Soil and Groundwater Remediation, D&D, and Waste Treatment and Disposal) Projects: 90% of EM cleanup projects complete 80% of

  18. Contract/Project Management

    Energy Savers [EERE]

    Second Quarter Overall Contract and Project Management Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY 2010 Pre- & Post-CAP Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) 90% of projects completed within 110% of CD-2 TPC by FY11. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 85% Line Item 73% Line Item 70% Pre-CAP 100% Post-CAP This is a projection based on a 3-year rolling average (FY08 to FY10).

  19. Contract/Project Management

    Energy Savers [EERE]

    Third Quarter Overall Contract and Project Management Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2010 Target FY 2010 Forecast FY 2010 Pre- & Post-CAP Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) 90% of projects completed within 110% of CD-2 TPC by FY11. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 85% Line Item 71% Line Item 70% Pre-CAP 100% Post-CAP This is a projection based on a 3-year rolling average (FY08 to FY10).

  20. Contract/Project Management

    Energy Savers [EERE]

    Fourth Quarter Overall Contract and Project Management Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY 2010 Pre- & Post-CAP Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) 90% of projects completed within 110% of CD-2 TPC by FY11. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 85% Line Item 69% Line Item 67% Pre-CAP 100% Post-CAP This is based on a 3-year rolling average (FY08 to FY10). TPC is Total

  1. Contract/Project Management

    Energy Savers [EERE]

    First Quarter Overall Contract and Project Management Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2011 Target FY 2011 Actual & Forecast FY 2011 Pre- & Post-CAP Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) Projects completed within 110% of CD-2 TPC. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 90% Line Item 79% Line Item 71% Pre-CAP 100% Post-CAP This is based on a 3-year rolling average (FY09 to FY11). TPC is Total

  2. Contract/Project Management

    Energy Savers [EERE]

    Second Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2011 Target FY 2011 Forecast FY 2011 Pre- & Post-CAP Forecast Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) Projects completed within 110% of CD-2 TPC. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 90% Line Item 84% Line Item 78% Pre-CAP 100% Post-CAP This is based on a 3-year rolling average (FY09 to FY11). TPC

  3. Contract/Project Management

    Energy Savers [EERE]

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2011 Target FY 2011 Forecast FY 2011 Pre- & Post-CAP Forecast Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) Projects completed within 110% of CD-2 TPC. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 90% Line Item 84% Line Item 78% Pre-CAP 100% Post-CAP This is based on a 3-year rolling average (FY09 to FY11). TPC is

  4. Contract/Project Management

    Energy Savers [EERE]

    Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Primary Performance Metrics FY 2011 Target FY 2011 Actual FY 2011 Pre- & Post-CAP Actual Comment 1a. Capital Asset Line Item Projects: (Pre-RCA/CAP) Projects completed within 110% of CD-2 TPC. 1b. Capital Asset Line Item Projects: (Post-RCA/CAP) 90% Line Item 84% Line Item 77% Pre-CAP 100% Post-CAP This is based on a 3-year rolling average (FY09 to FY11). TPC is

  5. Contract/Project Management

    Energy Savers [EERE]

    First Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 84% Construction 83% Cleanup 85% 77% Pre-CAP 86% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost.

  6. Contract/Project Management

    Energy Savers [EERE]

    Second Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 88% Construction 87% Cleanup 89% 77% Pre-CAP 92% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost.

  7. Contract/Project Management

    Energy Savers [EERE]

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 87% Construction 87% Cleanup 87% 77% Pre-CAP 90% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost.

  8. Contract/Project Management

    Energy Savers [EERE]

    Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Final FY 2012 Pre- & Post-CAP Final Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 86% Construction 87% Cleanup 84% 77% Pre-CAP 89% Post-CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost.

  9. 2014 DEPARTMENT OF ENERGY PROJECT MANAGEMENT WORKSHOP

    Broader source: Energy.gov [DOE]

    What:  2014 DOE Project Management Workshop (Meeting the Challenge—Integrated Acquisition & Project Management)

  10. Emergency Management Concepts, Existing Guidance, and Changes

    Broader source: Energy.gov [DOE]

    Presenter: David Freshwater, Emergency Management Specialist, Office of Emergency Management, National Nuclear Security Administration

  11. Radioactive Waste Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    The objective of this Order is to ensure that all Department of Energy (DOE) radioactive waste is managed in a manner that is protective of worker and public health and safety and the environment. Supersedes DOE O 5820.2A. Chg 1 dated 8-28-01. Certified 1-9-07.

  12. Purge water management system

    DOE Patents [OSTI]

    Cardoso-Neto, J.E.; Williams, D.W.

    1995-01-01

    A purge water management system is described for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

  13. Purge water management system

    DOE Patents [OSTI]

    Cardoso-Neto, Joao E.; Williams, Daniel W.

    1996-01-01

    A purge water management system for effectively eliminating the production of purge water when obtaining a groundwater sample from a monitoring well. In its preferred embodiment, the purge water management system comprises an expandable container, a transportation system, and a return system. The purge water management system is connected to a wellhead sampling configuration, typically permanently installed at the well site. A pump, positioned with the monitoring well, pumps groundwater through the transportation system into the expandable container, which expands in direct proportion with volume of groundwater introduced, usually three or four well volumes, yet prevents the groundwater from coming into contact with the oxygen in the air. After this quantity of groundwater has been removed from the well, a sample is taken from a sampling port, after which the groundwater in the expandable container can be returned to the monitoring well through the return system. The purge water management system prevents the purge water from coming in contact with the outside environment, especially oxygen, which might cause the constituents of the groundwater to oxidize. Therefore, by introducing the purge water back into the monitoring well, the necessity of dealing with the purge water as a hazardous waste under the Resource Conservation and Recovery Act is eliminated.

  14. Position Management and Classification

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-04-01

    The order establishes departmental requirements and responsibilities for classifying positions using the general schedule (GS) and federal wage system (FWS) standards and to develop and administer a sound position management and classification program. Supersedes DOE O 325.2, dated 4-1-15.

  15. OFFICE FOR EMERGENCY MANAGEMENT

    Office of Legacy Management (LM)

    OFFICE FOR EMERGENCY MANAGEMENT 155OP STREETNW. WiSHINGTON. D.C. ' , iQns 25,19&L At-t :. I' .' at l530 P Btmat, IO&, XtwMn&m, 0. 6., at 9130 A.Jb Sa 1 llmbemupoftbaaomlttaal8f...

  16. Radioactive Waste Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-07-09

    The objective of this Order is to ensure that all Department of Energy (DOE) radioactive waste is managed in a manner that is protective of worker and public health and safety and the environment. Cancels DOE O 5820.2A

  17. Position Management and Classification

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-04-01

    The order establishes departmental requirements and responsibilities for classifying positions using general schedule (GS) and federal wage system (FWS) standards and for developing and administering a sound position management and classification program within the Department. Cancels Chapter VII of DOE O 320.1. Canceled by DOE O 325.2 Chg 1 (Admin Chg), 9-1-15.

  18. Integrated Safety Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-04-25

    The policy establishes DOE's expectation for safety, including integrated safety management that will enable the Department’s mission goals to be accomplished efficiently while ensuring safe operations at all departmental facilities and activities. Supersedes DOE P 450.4, DOE P 411.1, DOE P 441.1, DOE P 450.2A, and DOE P 450.7

  19. Integrated Safety Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-04-25

    The order ensures that DOE/NNSA, systematically integrates safety into management and work practices at all levels, so that missions are accomplished efficiently while protecting the workers, the public, and the environment. Supersedes DOE M 450.4-1 and DOE M 411.1-1C

  20. Mobile Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-05-15

    The order establishes requirements, assigns responsibilities, and provides guidance for federal mobile technology management and employee use of both government furnished and personally-owned mobile devices within DOE and NNSA. Establishes requirements for use of User Agreements to govern mobile devices used for official duties. Does not cancel other directives.

  1. Comprehensive stormwater management study

    SciTech Connect (OSTI)

    Morrison, T. ); Alter, M. ); Wassum, R.H. )

    1994-02-01

    This article examines Tucson, Arizona's approach to stormwater management. The topics of the article include the quantity and quality of stormwater, developing the stormwater master plan, meeting environmental and regulatory constraints. Tucson's comprehensive, watershed by watershed approach to public works planning and stormwater program development is described.

  2. Office of Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management develops and interprets Government-wide policies and procedures and conducts training to ensure the accurate identification of information and documents that must be classified or controlled under statute or Executive order to protect the national security and controlled unclassified Official Use Only information for the effective operation of the Government.

  3. Contractor Legal Management Requirements

    Broader source: Energy.gov [DOE]

    The purpose of this flash is to inform you of the issuance of two new Acquisition Guide Chapters, Chapters 70-31 C and 31.3, both titled "Contractor Legal Management Requirements." (Chapter 31.3 simply refers you to Chapter 70-31 C.)

  4. Risk Assessment & Management Information

    Broader source: Energy.gov [DOE]

    NRC - A Proposed Risk Management Regulatory Framework, April 2012 Risk Assessment Technical Experts Working Group (RWG) web page DOE Standard on Development and Use of Probabilistic Risk Assessment in DOE Nuclear Safety Applications (draft), December 2010 Consortium for Risk Evaluation with Stakeholder Participation Workshop on Risk Assessment and Safety Decision Making Under Uncertainty

  5. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-08-21

    The Order establishes policy and assigns and describes roles and responsibilities for the DOE Emergency Management System. Cancels DOE 5500.1B, DOE 5500.2B, DOE 5500.3A, DOE 5500.4A, 5500.5A,5500.7B, 5500.8A, 5500.9A, DOE 5500.10

  6. Comprehensive Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-29

    To establish policy and to assign and describe roles and responsibilities for the Department of Energy (DOE) Emergency Management System. (This is an administrative change to DOE O 151.1A). Canceled by DOE O 151.1C. Cancels DOE O 151.1A.

  7. Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions

    SciTech Connect (OSTI)

    Maiden, Wendy M.

    2009-12-01

    Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

  8. NS&T MANAGEMENT OBSERVATIONS

    SciTech Connect (OSTI)

    Gianotto, David

    2014-06-01

    The INL Management Observation Program (MOP) is designed to improve managers and supervisors understanding of work being performed by employees and the barriers impacting their success. The MOP also increases workers understanding of managements expectations as they relate to safety, security, quality, and work performance. Management observations (observations) are designed to improve the relationship and trust between employees and managers through increased engagement and interactions between managers and researchers in the field. As part of continuous improvement, NS&T management took initiative to focus on the participation and quality of observations in FY 14. This quarterly report is intended to (a) summarize the participation and quality of managements observations, (b) assess observations for commonalities or trends related to facility or process barriers impacting research, and (c) provide feedback and make recommendations for improvements NS&Ts MOP.

  9. NS&T Management Observations

    SciTech Connect (OSTI)

    Gianotto, David

    2014-09-01

    The INL Management Observation Program (MOP) is designed to improve managers and supervisors understanding of work being performed by employees and the barriers impacting their success. The MOP also increases workers understanding of managements expectations as they relate to safety, security, quality, and work performance. Management observations (observations) are designed to improve the relationship and trust between employees and managers through increased engagement and interactions between managers and researchers in the field. As part of continuous improvement, NS&T management took initiative to focus on the participation and quality of observations in FY 14. This quarterly report is intended to (a) summarize the participation and quality of managements observations, (b) assess observations for commonalities or trends related to facility or process barriers impacting research, and (c) provide feedback and make recommendations for improvements NS&Ts MOP.

  10. Use of Management and Operating or Other Facility Management...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    50.2C, Use of Management and Operating or Other Facility Management Contractor Employees for Services to DOE in the Washington, D.C. Area by Andrew Geary Functional areas: Work for...

  11. Best Management Practice #1: Water Management Planning | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 1: Water Management Planning Best Management Practice #1: Water Management Planning A successful water management program starts with a comprehensive strategic plan. The process for developing a strategic plan is generally the same for an individual facility or an agency. The plan provides information about current water uses and charts a course for water efficiency improvements, conservation activities, and water-reduction goals. A strategic plan establishes the priorities and helps

  12. DOE - Office of Legacy Management -- Fernald Environmental Management

    Office of Legacy Management (LM)

    Project - 027 Fernald Environmental Management Project - 027 FUSRAP Considered Sites Site: Fernald Environmental Management Project (027) Designated Name: Alternate Name: Location: Evaluation Year: Site Operations: Site Disposition: Radioactive Materials Handled: Primary Radioactive Materials Handled: Radiological Survey(s): Site Status: The Fernald Environmental Management Project (FEMP), formerly known as the Feed Materials Production Center, is located about 18 miles northwest of

  13. Environmental Management System Plan

    SciTech Connect (OSTI)

    Fox, Robert; Thorson, Patrick; Horst, Blair; Speros, John; Rothermich, Nancy; Hatayama, Howard

    2009-03-24

    Executive Order 13423, Strengthening Federal Environmental, Energy, and Transportation Management establishes the policy that Federal agencies conduct their environmental, transportation, and energy-related activities in a manner that is environmentally, economically and fiscally sound, integrated, continually improving, efficient, and sustainable. The Department of Energy (DOE) has approved DOE Order 450.1A, Environmental Protection Program and DOE Order 430.2B, Departmental Energy, Renewable Energy and Transportation Management as the means of achieving the provisions of this Executive Order. DOE Order 450.1A mandates the development of Environmental Management Systems (EMS) to implement sustainable environmental stewardship practices that: (1) Protect the air, water, land, and other natural and cultural resources potentially impacted by facility operations; (2) Meet or exceed applicable environmental, public health, and resource protection laws and regulations; and (3) Implement cost-effective business practices. In addition, the DOE Order 450.1A mandates that the EMS must be integrated with a facility's Integrated Safety Management System (ISMS) established pursuant to DOE P 450.4, 'Safety Management System Policy'. DOE Order 430.2B mandates an energy management program that considers energy use and renewable energy, water, new and renovated buildings, and vehicle fleet activities. The Order incorporates the provisions of the Energy Policy Act of 2005 and Energy Independence and Security Act of 2007. The Order also includes the DOE's Transformational Energy Action Management initiative, which assures compliance is achieved through an Executable Plan that is prepared and updated annually by Lawrence Berkeley National Laboratory (LBNL, Berkeley Lab, or the Laboratory) and then approved by the DOE Berkeley Site Office. At the time of this revision to the EMS plan, the 'FY2009 LBNL Sustainability Executable Plan' represented the most current Executable Plan. These DOE Orders and associated policies establish goals and sustainable stewardship practices that are protective of environmental, natural, and cultural resources, and take a life cycle approach that considers aspects such as: (1) Acquisition and use of environmentally preferable products; (2) Electronics stewardship; (3) Energy conservation, energy efficiency, and renewable energy; (4) Pollution prevention, with emphasis on toxic and hazardous chemical and material reduction; (5) Procurement of efficient energy and water consuming materials and equipment; (6) Recycling and reuse; (7) Sustainable and high-performance building design; (8) Transportation and fleet management; and (9) Water conservation. LBNL's approach to sustainable environmental stewardship required under Order 450.1A poses the challenge of implementing its EMS in a compliance-based, performance-based, and cost-effective manner. In other words, the EMS must deliver real and tangible business value at a minimal cost. The purpose of this plan is to describe Berkeley Lab's approach for achieving such an EMS, including an overview of the roles and responsibilities of key Laboratory parties. This approach begins with a broad-based environmental policy consistent with that stated in Chapter 11 of the LBNL Health and Safety Manual (PUB-3000). This policy states that Berkeley Lab is committed to the following: (1) Complying with applicable environmental, public health, and resource conservation laws and regulations. (2) Preventing pollution, minimizing waste, and conserving natural resources. (3) Correcting environmental hazards and cleaning up existing environmental problems, and (4) Continually improving the Laboratory's environmental performance while maintaining operational capability and sustaining the overall mission of the Laboratory. A continual cycle of planning, implementing, evaluating, and improving processes will be performed to achieve goals, objectives, and targets that will help LBNL carry out this policy. Each year, environmental aspects will be identified and their impacts to the environm

  14. ENERGY STAR Portfolio Manager 101

    Broader source: Energy.gov [DOE]

    Join us as we introduce and demonstrate the core functionality of EPA’s ENERGY STAR Portfolio Manager tool. Attendees will learn how to: navigate Portfolio Manager; add a property and enter details...

  15. ENERGY STAR Portfolio Manager 201

    Broader source: Energy.gov [DOE]

    Continue to learn about EPA’s new ENERGY STAR Portfolio Manager tool, with a deeper dive into more advanced functionalities such as: managing and tracking changes to your property uses over time;...

  16. Facilities Information Management System (FIMS)

    Broader source: Energy.gov [DOE]

     FIMS is DOE’s corporate database for real property as required by DOE Order 430.1B, Real Property Asset Management. The system provides DOE with an accurate inventory and management tool that...

  17. Program Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Systems (ISMS) in the EM complex and to serve as a focal point for EM ... EM provides program management support across the EM complex that support a varied array ...

  18. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  19. Environmental Management (EM) Cleanup Projects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-09-24

    The guide supports DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, and provides guidance on environmental management cleanup projects. Canceled by DOE N 251.105.

  20. Project Management Policy & Guidance Documents

    Broader source: Energy.gov [DOE]

    Project Management Policy & Guidance documents from Department of Energy, other Government organization and adopted industry best practices fro managing design and construction of capital assets from Initiation through Closeout.

  1. Contractor Human Resource Management Programs

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-30

    The purpose of this directive is to establish Department of Energy (DOE) responsibilities and requirements for the management and oversight of contractor Human Resource Management (HR) programs. Chg 1, 5-8-98; Chg 2, 11-22-09.

  2. Earned Value Management System (EVMS)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-05-06

    The Guide supports the Departments initiatives to improve program, project, and contract management through the implementation and surveillance of contractors earned value management systems. Canceled by DOE G 413.3-10A.

  3. Contractor Human Resource Management Programs

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-30

    The purpose of this directive is to establish Department of Energy (DOE) responsibilities and requirements for the management and oversight of contractor Human Resource Management (HR) programs. Chg 1, 5-8-98; Chg 2, 11-22-09

  4. Management Control Cover

    Energy Savers [EERE]

    the Hanford Site Transuranic Mixed Tank Waste OAS-M-06-01 November 2005 REPORT ON MANAGEMENT CONTROLS OVER THE HANFORD SITE TRANSURANIC MIXED TANK WASTE TABLE OF CONTENTS Hanford Site Transuranic Mixed Tank Waste Details of Finding 1 Recommendations and Comments 3 Appendices Objective, Scope, and Methodology 6 Prior Audit Reports 8 Hanford Site Transuranaic Mixed Tank Waste Page 1 Details of Finding Regulation and The Office of River Protection (ORP) pursued the Transuranic Permits Mixed Tank

  5. Enterprise Risk Management Framework

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Framework The Enterprise Risk Management (ERM) framework includes four steps: identify the risks, determine the probability and impact of each one, identify controls that are already in place that mitigate that risk, and propose additional controls if needed. Step 1: Identify Risks - What can go wrong? This step should identify the negative outcomes that could result from an action or decision . It is important to consider a wide range of risks, and so the Department's ERM framework includes

  6. Enterprise Risk Management Model

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Model The Enterprise Risk Management (ERM) Model is a system used to analyze the cost and benefit of addressing risks inherent in the work performed by the Department of Energy. This system measures risk using a combination of qualitative and quantitative methods to set a standard method for analyzing risk across the many functions within the department. Risks generally fall within five categories regardless ofthe subject matter ofthe subsystem. These categories are (1) risks to people, (2)

  7. EFRC Management Reference Document

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    EFRC management reference document Energy Frontier Research Centers Acknowledgments of Support (v.1, October 2009) Office of Basic Energy Sciences Office of Science US Department of Energy How to Acknowledge Basic Energy Sciences-Energy Frontier Research Center (BES-EFRC) funding in papers, presentations, and other materials: For a publication on work supported wholly under your EFRC, the acknowledgement should at a minimum state that "This material is based upon work supported as part of

  8. Island Wide Management Corporation

    Office of Legacy Management (LM)

    9 1986 Island Wide Management Corporation 3000 Marcus Avenue Lake Success, New York 11042 Dear Sir or Madam: I am sending you this letter and the enclosed information as you have been identified by L. I. Trinin of Glick Construction Company as the representatives of the owners of the property that was formerly the site of the Sylvania-Corning Nuclear Corporation in Bayside, New York. The Department of Energy is evaluating the radiological condition of sites that were utilized under the Manhattan

  9. Chemical Management System

    Energy Science and Technology Software Center (OSTI)

    1998-10-30

    CMS provides an inventory of all chemicals on order or being held in the laboratory, to provide a specific location for all chemical containers, to ensure that health and safety regulatory codes are being upheld, and to provide PNNL staff with hazardous chemical information to better manage their inventories. CMS is comprised of five major modules: 1) chemical purchasing, 2) chemical inventory, 3) chemical names, properties, and hazard groups, 4) reporting, and 5) system administration.

  10. Conditional data watchpoint management

    DOE Patents [OSTI]

    Burdick, Dean Joseph; Vaidyanathan, Basu

    2010-08-24

    A method, system and computer program product for managing a conditional data watchpoint in a set of instructions being traced is shown in accordance with illustrative embodiments. In one particular embodiment, the method comprises initializing a conditional data watchpoint and determining the watchpoint has been encountered. Upon that determination, examining a current instruction context associated with the encountered watchpoint prior to completion of the current instruction execution, further determining a first action responsive to a positive context examination; otherwise, determining a second action.

  11. Senior Management - JCAP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Senior Executive Service The Senior Executive Service (SES) is an elite group of men and women meeting the highest professional standards who administer public programs at the top levels of the Federal government. SES employees' salaries are linked directly to individual performance. The U.S. Office of Personnel Management's (OPM) SES web page offsite link contains additional information. To browse current NNSA SES Vacancies, please visit NNSA SES Jobs offsite link . For general instructions and

  12. Emergency Management System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-25

    The order establishes policy, and assigns and describes roles and responsibilities for the DOE Emergency Management System. DOE 5500.1B Chg 1; DOE 5500.2B Chg 1; DOE 5500.3A Chg 1; DOE 5500.4A; DOE 5500.5A; DOE 5500.7B; DOE 5500.8A; DOE 5500.9A, and DOE 5500.10A Chg 1. Canceled by DOE O 151.1A.

  13. LEGACY MANAGEMENT REQUIRES INFORMATION

    SciTech Connect (OSTI)

    CONNELL, C.W.; HILDEBRAND, R.D.

    2006-12-14

    ''Legacy Management Requires Information'' describes the goal(s) of the US Department of Energy's Office of Legacy Management (LM) relative to maintaining critical records and the way those goals are being addressed at Hanford. The paper discusses the current practices for document control, as well as the use of modern databases for both storing and accessing the data to support cleanup decisions. In addition to the information goals of LM, the Hanford Federal Facility Agreement and Consent Order, known as the ''Tri-Party Agreement'' (TPA) is one of the main drivers in documentation and data management. The TPA, which specifies discrete milestones for cleaning up the Hanford Site, is a legally binding agreement among the US Department of Energy (DOE), the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The TPA requires that DOE provide the lead regulatory agency with the results of analytical laboratory and non-laboratory tests/readings to help guide them in making decisions. The Agreement also calls for each signatory to preserve--for at least ten years after the Agreement has ended--all of the records in its or its contractors, possession related to sampling, analysis, investigations, and monitoring conducted. The tools used at Hanford to meet TPA requirements are also the tools that can satisfy the needs of LM.

  14. Environmental management activities

    SciTech Connect (OSTI)

    1997-07-01

    The Office of Environmental Management (EM) has been delegated the responsibility for the Department of Energy`s (DOE`s) cleanup of the nuclear weapons complex. The nature and magnitude of the waste management and environmental remediation problem requires the identification of technologies and scientific expertise from domestic and foreign sources. Within the United States, operational DOE facilities, as well as the decontamination and decommissioning of inactive facilities, have produced significant amounts of radioactive, hazardous, and mixed wastes. In order to ensure worker safety and the protection of the public, DOE must: (1) assess, remediate, and monitor sites and facilities; (2) store, treat, and dispose of wastes from past and current operations; and (3) develop and implement innovative technologies for environmental restoration and waste management. The EM directive necessitates looking beyond domestic capabilities to technological solutions found outside US borders. Following the collapse of the Soviet regime, formerly restricted elite Soviet scientific expertise became available to the West. EM has established a cooperative technology development program with Russian scientific institutes that meets domestic cleanup objectives by: (1) identifying and accessing Russian EM-related technologies, thereby leveraging investments and providing cost-savings; (2) improving access to technical information, scientific expertise, and technologies applicable to EM needs; and (3) increasing US private sector opportunities in Russian in EM-related areas.

  15. Accident management information needs

    SciTech Connect (OSTI)

    Hanson, D.J.; Ward, L.W.; Nelson, W.R.; Meyer, O.R. (EG and G Idaho, Inc., Idaho Falls, ID (USA))

    1990-04-01

    In support of the US Nuclear Regulatory Commission (NRC) Accident Management Research Program, a methodology has been developed for identifying the plant information needs necessary for personnel involved in the management of an accident to diagnose that an accident is in progress, select and implement strategies to prevent or mitigate the accident, and monitor the effectiveness of these strategies. This report describes the methodology and presents an application of this methodology to a Pressurized Water Reactor (PWR) with a large dry containment. A risk-important severe accident sequence for a PWR is used to examine the capability of the existing measurements to supply the necessary information. The method includes an assessment of the effects of the sequence on the measurement availability including the effects of environmental conditions. The information needs and capabilities identified using this approach are also intended to form the basis for more comprehensive information needs assessment performed during the analyses and development of specific strategies for use in accident management prevention and mitigation. 3 refs., 16 figs., 7 tabs.

  16. Life Cycle Asset Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-10-14

    (The following directives are deleted or consolidated into this Order and shall be phased out as noted in Paragraph 2: DOE 1332.1A; DOE 4010.1A; DOE 4300.1C; DOE 4320.1B; DOE 4320.2A; DOE 4330.4B; DOE 4330.5; DOE 4540.1C; DOE 4700.1). This Order supersedes specific project management provisions within DOE O 430.1A, LIFE CYCLE ASSET MANAGEMENT. The specific paragraphs canceled by this Order are 6e(7); 7a(3); 7b(11) and (14); 7c(4),(6),(7),(11), and (16); 7d(4) and (8); 7e(3),(10), and (17); Attachment 1, Definitions (item 30 - Line Item Project, item 42 - Project, item 48 - Strategic System); and Attachment 2, Contractor Requirements Document (paragraph 1d regarding a project management system). The remainder of DOE O 430.1A remains in effect. Cancels DOE O 430.1. Canceled by DOE O 413.3.

  17. Project Management Plans | Department of Energy

    Energy Savers [EERE]

    Management Plans Project Management Plans The purpose here is to assist project managers and project planners in creating a project plan by providing examples and pointing to information that have been successfully used by others in the past. PDF icon Project Management Plans More Documents & Publications Project Management Plan Examples Project Management Plan Examples 1 - 80 Deactivation Management

  18. Categorical Exclusion Determinations: Environmental Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Consolidated Business Service Center Categorical Exclusion Determinations: Environmental Management Consolidated Business Service Center Categorical Exclusion Determinations issued ...

  19. PORTFOLIO MANAGEMENT | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PORTFOLIO MANAGEMENT PORTFOLIO MANAGEMENT PORTFOLIO MANAGEMENT Once LPO closes a loan or loan guarantee, projects are monitored and evaluated throughout project development, construction, commissioning, and operation until the loan has been repaid in full. LPO's team of financial, technical, environmental, and legal professionals is dedicated to advancing an all-of-the-above energy strategy that avoids, reduces, or sequesters greenhouse gases. PORTFOLIO MANAGEMENT DIVISION (PMD) After financial

  20. Interim Management of Nuclear Materials

    Office of Environmental Management (EM)

    Integrated Safety Management (ISM) Integrated Safety Management (ISM) The objective of ISM is to perform work in a safe and environmentally sound manner. More specifically, as described in DOE P 450.4, Safety Management System Policy: "The Department and Contractors must systematically integrate safety into management and work practices at all levels so that missions are accomplished while protecting the public, the worker, and the environment. This is to be accomplished through effective

  1. Project Management Improvements Drive Progress

    Broader source: Energy.gov [DOE]

    WASHINGTON, D.C. – Improving project management has been a top priority of EM’s senior leadership.

  2. Managing Financing Programs- Spreadsheet Models

    Broader source: Energy.gov [DOE]

    This webinar, held on Jan. 24, 2011, provides a tutorial for managing financing programs through excel spreadsheets.

  3. Office of Environmental Management (EM) Organization Chart |...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Environmental Management (EM) Organization Chart Office of Environmental Management (EM) Organization Chart PDF icon Office of Environmental Management (EM) Organization Chart More ...

  4. OFFICE OF ENVIRONMENTAL MANAGEMENT (EM) ORGANIZATION CHART |...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OFFICE OF ENVIRONMENTAL MANAGEMENT (EM) ORGANIZATION CHART OFFICE OF ENVIRONMENTAL MANAGEMENT (EM) ORGANIZATION CHART OFFICE OF ENVIRONMENTAL MANAGEMENT (EM) ORGANIZATION CHART ...

  5. Project Management Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Approach Using Earned Value ... OECM Project Management Policy and Guidance per Office of Management Project Definition Rating Index (PDRI) ...

  6. Solar International Management Inc | Open Energy Information

    Open Energy Info (EERE)

    International Management Inc Jump to: navigation, search Name: Solar International Management Inc Place: Washington,DC, Washington, DC Zip: 20006 Sector: Solar Product: Manager of...

  7. GHG Management Institute | Open Energy Information

    Open Energy Info (EERE)

    GHG Management Institute Jump to: navigation, search Name: GHG Management Institute Address: Greenhouse Gas Management Institute 9215 View Avenue NW Seattle, WA USA 98117 Place:...

  8. Ethanol Capital Management | Open Energy Information

    Open Energy Info (EERE)

    Management Jump to: navigation, search Name: Ethanol Capital Management Place: Tucson, Arizona Zip: 85711 Product: Manages funds investing in Ethanol plants in the US Coordinates:...

  9. Aviation Management Professional Award Nomination for: | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Aviation Management Professional Award Nomination for: Aviation Management Professional Award Nomination for: PDF icon Aviation Management Professional Award Nomination for: More ...

  10. Generation Investment Management LLP | Open Energy Information

    Open Energy Info (EERE)

    Investment Management LLP Jump to: navigation, search Name: Generation Investment Management LLP Place: London, Greater London, United Kingdom Zip: W1J 0AH Product: Fund manager of...

  11. Data Management Facility Operations Plan (Program Document) ...

    Office of Scientific and Technical Information (OSTI)

    Program Document: Data Management Facility Operations Plan Citation Details In-Document Search Title: Data Management Facility Operations Plan The Data Management Facility (DMF) is ...

  12. Risk Management Tool Attributes: | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Risk Management Tool Attributes: Risk Management Tool Attributes: PDF icon Risk Management Tool Attributes: More Documents & Publications Heating Ventilation and Air Conditioning ...

  13. Office of Project Management Oversight & Assessments | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Office of Project Management Oversight & Assessments Career Development Project Management Career Development Program (DOE Only) Acquisition Career Management Program (DOE Only)...

  14. Project Management Information Systems (PMIS) | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Information Systems (PMIS) Project Management Information Systems (PMIS) Project Management Information Systems (PMIS) In today's day and age, Information ...

  15. CONTACTS FOR INFORMATION MANAGEMENT: Forms & Records | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CONTACTS FOR INFORMATION MANAGEMENT: Forms & Records CONTACTS FOR INFORMATION MANAGEMENT: Forms & Records Maria Levesque, Director Enterprise Records Management Division (IM-23) ...

  16. Interagency Energy Management Task Force Members

    Broader source: Energy.gov [DOE]

    The Interagency Energy Management Task Force is led by the Federal Energy Management Program director. Members include energy and sustainability managers from federal agencies.

  17. Fermilab | Directorate | Office of Project Management Oversight...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of Project Management Oversight Fermilab ManagementNon-Scientific Projects Current Management Projects IARC OTE Building Liquid Argon Test Building (LArTB) TeV ...

  18. Acquisition and Project Management Awards Presentations - Ingrid...

    Energy Savers [EERE]

    and Project Management Awards Presentations - Ingrid Kolb, Director, Office of Management Acquisition and Project Management Awards Presentations - Ingrid Kolb, Director, Office of ...

  19. IT Project Management Profile | Department of Energy

    Energy Savers [EERE]

    Project Management Profile IT Project Management Profile This form lists positionsexperience and training relating to project management; include other positionsexperience or ...

  20. IT Project Management Profile | Department of Energy

    Energy Savers [EERE]

    Project Management Profile IT Project Management Profile This is a form that must be completed to initiate the assessment of a Project Manager to determine the level of ...

  1. Project Management Plan Examples | Department of Energy

    Office of Environmental Management (EM)

    Examples Project Management Plan Examples Examples From Project Management Plans The following material has been extracted from several project management plans. The order in which ...

  2. Project Management Perspective - Paul Bosco, Director, Office...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Perspective - Paul Bosco, Director, Office of Acquisition and Project Management Project Management Perspective - Paul Bosco, Director, Office of Acquisition and ...

  3. DOE - Office of Legacy Management -- Hallam

    Office of Legacy Management (LM)

    (D&D) Program, the Office of Legacy Management manages the Hallam ... The site transferred to the Office of Legacy Management in 2003 and requires routine ...

  4. DOE - Office of Legacy Management -- Piqua

    Office of Legacy Management (LM)

    (D&D) Program, the Office of Legacy Management manages the Piqua ... The site transferred to the Office of Legacy Management in 2003 and requires routine ...

  5. DOE - Office of Legacy Management -- GJD

    Office of Legacy Management (LM)

    Responsibility for custody and long-term management of the site transferred to DOE's Office of Legacy Management in 2003. Management responsibilities include routine inspection and ...

  6. DOE - Office of Legacy Management -- GJO

    Office of Legacy Management (LM)

    (D&D) Program, the Office of Legacy Management manages the Grand Junction ... The site transferred to the Office of Legacy Management in 2003 and requires routine ...

  7. DOE - Office of Legacy Management -- GJP

    Office of Legacy Management (LM)

    Responsibility for management and long-term custody of the site's contaminated groundwater transferred to DOE's Office of Legacy Management in 2003. Management requirements include ...

  8. Change Control Management Guide - DOE Directives, Delegations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    20, Change Control Management Guide by Ruben Sanchez Functional areas: Program Management, Project Management The Guide provides a suggested approach and uniform guidance for...

  9. Information Management Governance Council | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Governance Council Information Management Governance Council Describes the establishment of the Information Management Governance Council and What They Do. PDF icon...

  10. Federal Energy Management Program Report Template | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Energy Management Program Report Template Federal Energy Management Program Report Template Template to create reports for the Federal Energy Management Program (FEMP)...

  11. Green Capital Management | Open Energy Information

    Open Energy Info (EERE)

    Capital Management Jump to: navigation, search Name: Green Capital Management Place: London, United Kingdom Zip: SW10 0BB Sector: Services Product: The Green Capital Management...

  12. Human Capital Management Accountability Program (HCMAP) | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Human Capital Management Accountability Program (HCMAP) Human Capital Management Accountability Program (HCMAP) Human Capital Management Accountability Program (HCMAP) is an online ...

  13. Project Management Information Systems (PMIS) | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Information Systems (PMIS) Project Management Information Systems (PMIS) Project Assessment & Reporting System (PARS IIe) Office of Project Management Oversight...

  14. Guide to Scientific Management | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Guide to Scientific Management A Practical Guide to Scientifıc Management for Postdocs and New Faculty. PDF icon Guide to Scientific Management second edition.pdf

  15. TPA Project Manager's Lists - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    TPA Project Manager's Lists Tri-Party Agreement The Agreement Announcements List of Approved Changes TPA Project Manager's Lists Modifications for Public Comment Data Management...

  16. Earned Value Management System (EVMS)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-03-13

    To support DOE's initiatives to improve program, project, and contract management through the implementation and surveillance of a contractor's Earned Value Management System (EVMS) that is in conformance with DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets, the American National Standards Institute/Electronic Industries Alliance (ANSI/EIA)-748-B, Earned Value Management System (or as required by contract), and Federal Acquisition Regulation (FAR) 52.234-4, Earned Value Management System (EVMS). Admin Chg 1 dated 10-22-2015.

  17. PROJECT MANAGEMENT PLAN

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PROJECT MANAGEMENT PLAN Energy and Water in the Western and Texas Interconnects October 15, 2010 WORK PERFORMED UNDER AGREEMENT RC-BM-2010 SUBMITTED BY Sandia National Laboratories PO Box 5800; MS1377 Albuquerque, New Mexico 87185-1377 PRINCIPAL INVESTIGATOR Vincent Tidwell Phone: (505)844-6025 Fax: (505)844-8558 E-mail: vctidwe@sandia.gov SUBMITTED TO U.S. Department of Energy National Energy Technology Laboratory Ray Lopez Raymond.Lopez@NETL.DOE.GOV Sandia National Laboratories is a

  18. Power management system

    DOE Patents [OSTI]

    Algrain, Marcelo C.; Johnson, Kris W.; Akasam, Sivaprasad; Hoff, Brian D.

    2007-10-02

    A method of managing power resources for an electrical system of a vehicle may include identifying enabled power sources from among a plurality of power sources in electrical communication with the electrical system and calculating a threshold power value for the enabled power sources. A total power load placed on the electrical system by one or more power consumers may be measured. If the total power load exceeds the threshold power value, then a determination may be made as to whether one or more additional power sources is available from among the plurality of power sources. At least one of the one or more additional power sources may be enabled, if available.

  19. Depleted uranium management alternatives

    SciTech Connect (OSTI)

    Hertzler, T.J.; Nishimoto, D.D.

    1994-08-01

    This report evaluates two management alternatives for Department of Energy depleted uranium: continued storage as uranium hexafluoride, and conversion to uranium metal and fabrication to shielding for spent nuclear fuel containers. The results will be used to compare the costs with other alternatives, such as disposal. Cost estimates for the continued storage alternative are based on a life-cycle of 27 years through the year 2020. Cost estimates for the recycle alternative are based on existing conversion process costs and Capital costs for fabricating the containers. Additionally, the recycle alternative accounts for costs associated with intermediate product resale and secondary waste disposal for materials generated during the conversion process.

  20. Real Property Asset Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-09-24

    The directive establishes an integrated corporate-level, performance based approach to the life-cycle management of our real property assets. It links real property asset planning, programming, budgeting and evaluation to the Department's multi-faceted missions. Successful implementation of this order will enable the Department to carry out our stewardship responsibilities, and will ensure that our facilities and infrastructure are properly sized and in a condition to meet our mission requirements today and in the future. Chg 1, dated 2-8-08. Chg 2, dated 4-25-11

  1. Real Property Asset Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-09-24

    The directive establishes an integrated corporate-level, performance based approach to the life-cycle management of our real property assets. It links real property asset planning, programming, budgeting and evaluation to the Department's multi-faceted missions. Successful implementation of this order will enable the Department to carry out our stewardship responsibilities, and will ensure that our facilities and infrastructure are properly sized and in a condition to meet our mission requirements today and in the future. Cancels: DOE O 430.1A. Chg 1, dated 2-8-08. Chg 2, dated 4-25-11

  2. Information Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-30

    Provides a framework for managing information, information resources, and information technology investment, which supports the operating elements of the Department in the accomplishment of its missions and functions in both an efficient and effective manner and in accordance with Departmental policy. Cancels: DOE 1324.5B, DOE 5900.1A, DOE 1130.8A, DOE 1330.1D, DOE 1410.2, DOE 1450.3A, DOE 1700.1, DOE 1800.1A, DOE 5300.1C

  3. Measuring Process Safety Management

    SciTech Connect (OSTI)

    Sweeney, J.C. (ARCO Chemical Co., Newtown Square, PA (United States))

    1992-04-01

    Many companies are developing and implementing Process Safety Management (PSM) systems. Various PSM models, including those by the Center for Chemical Process Safety (CCPS), the American Petroleum Institute (API), the Chemical Manufacturers Association (CMA) and OSHA have emerged to guide the design, development and installation of these systems. These models represent distillations of the practices, methods and procedures successfully used by those who believed that a strong correlation exists between sound PSM practices and achieving reductions in the frequency and severity of process incidents. This paper describes the progress of CCPS research toward developing a PSM performance measurement model. It also provides a vision for future CCPS research to define effectiveness indices.

  4. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  5. Contract/Project Management

    Energy Savers [EERE]

    Second Quarter Overall Root Cause Analysis (RCA)/Corrective Action Plan (CAP) Performance Metrics 1 Contract/Project Management Performance Metric FY 2013 Target FY 2013 Forecast FY 2013 Pre- & Post-CAP* Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 83% Construction 85% Cleanup 80% 70% Pre-CAP 84% Post-CAP This is based on a 3- year rolling average (FY11 to FY13). TPC is Total Project Cost.

  6. Contract/Project Management

    Energy Savers [EERE]

    Fourth Quarter Overall Root Cause Analysis (RCA)/Corrective Action Plan (CAP) Performance Metrics 1 Contract/Project Management Performance Metric FY 2013 Target FY 2013 Actual FY 2013 Pre- & Post-CAP* Actual Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90% 83% Construction 84% Cleanup 82% 70% Pre-CAP 84% Post-CAP Based on 3-year rolling period (FY11 to FY13) of 93 projects. TPC is Total Project Cost.

  7. AVLIS production plant waste management plan

    SciTech Connect (OSTI)

    Not Available

    1984-11-15

    Following the executive summary, this document contains the following: (1) waste management facilities design objectives; (2) AVLIS production plant wastes; (3) waste management design criteria; (4) waste management plan description; and (5) waste management plan implementation. 17 figures, 18 tables.

  8. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  9. (Managing the global environment)

    SciTech Connect (OSTI)

    Rayner, S.F.

    1989-10-03

    The conference was stimulated by concern that policy makers increasingly have to make environmental management decisions in the absence of solidly established scientific consensus about ecological processes and the consequences of human actions. Often, as in the case of climate change, some decisions may have to be made in the absence of information that is desirable but may not be available for years to come, if ever. Six topics were identified as running throughout the Congress. These were: the epistemology and history of the sciences or disciplines concerned with the environment, including the scientific basis of rationality and modes of dealing with uncertainty and complexity; the social, economic, and institutional conditions for the production of knowledge bearing on the environment, including the politics of research and the improvement of scientific data; the structuring and institutionalization of expert assessments on national and international levels, including the global distribution of expertise; the means of establishing scientific information, the role of the media in transmitting and processing knowledge about the environment, and the organization of public environmental debate; and decision making and management under conditions of uncertainty; and, finally the relationship between science and ethics. 13 refs.

  10. Environmental Management American Recovery & Reinvestment Act...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Environmental Management American Recovery & Reinvestment Act (ARRA) Lessons Learned Environmental Management American Recovery & Reinvestment Act (ARRA) Lessons Learned EM has ...

  11. Federal Spectrum Management at the National Telecommunications...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Spectrum Management at the National Telecommunications and Information Administration Federal Spectrum Management at the National Telecommunications and Information ...

  12. Material Management and Minimization | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Management and Minimization | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering...

  13. Law Enforcement & Emergency Management Liaison | National Nuclear...

    National Nuclear Security Administration (NNSA)

    Law Enforcement & Emergency Management Liaison | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  14. Project Management Institute Highlights Savannah River Nuclear...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Institute Highlights Savannah River Nuclear Solutions in Publication Project Management Institute Highlights Savannah River Nuclear Solutions in Publication ...

  15. Environmental Management Headquarters Corrective Action Plan...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    II Environmental Management Headquarters Corrective Action Plan - Radiological Release ... for addressing Office of Environmental Management (EM) Headquarters (HQ) issues ...

  16. Environmental Management Headquarters Corrective Action Plan...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    I Environmental Management Headquarters Corrective Action Plan - Radiological Release ... for addressing Office of Environmental Management (EM) Headquarters (HQ) issues ...

  17. Electronic Records Management Software Applications Design Criteria...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Electronic Records Management Software Applications Design Criteria Standard Electronic Records Management Software Applications Design Criteria Standard This Standard is reissued ...

  18. Acquisition Career Management Handbook Change - Revised Contracting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Career Management Handbook Change - Revised Contracting Officer's Representative ... More Documents & Publications OPAM Policy Acquisition Guides Personal Property Management ...

  19. Comprehensive Legacy Management and Institutional Controls Plan

    Office of Legacy Management (LM)

    Department of Energy Comprehensive Legacy Management and Institutional Controls Plan Doc. .........32 Comprehensive Legacy Management and Institutional Controls ...

  20. Miamisburg Environmental Management Project Archived Soil & Groundwate...

    Office of Environmental Management (EM)

    Miamisburg Environmental Management Project Archived Soil & Groundwater Master Reports Miamisburg Environmental Management Project Archived Soil & Groundwater Master Reports ...

  1. Fernald Environmental Management Project Archived Soil & Groundwater...

    Office of Environmental Management (EM)

    Fernald Environmental Management Project Archived Soil & Groundwater Master Reports Fernald Environmental Management Project Archived Soil & Groundwater Master Reports Fernald ...

  2. Environmental Management Associates | Open Energy Information

    Open Energy Info (EERE)

    Environmental Management Associates (Redirected from EMA Associates) Jump to: navigation, search Name: Environmental Management Associates Abbreviation: EMA Website:...

  3. Comprehensive Legacy Management and Institutional Controls Plan

    Office of Legacy Management (LM)

    Department of Energy Comprehensive Legacy Management and Institutional Controls Plan Doc. .........49 Comprehensive Legacy Management and Institutional Controls ...

  4. Comprehensive Legacy Management and Institutional Controls Plan

    Office of Legacy Management (LM)

    Department of Energy Comprehensive Legacy Management and Institutional Controls Plan Doc. .........52 Comprehensive Legacy Management and Institutional Controls ...

  5. Comprehensive Legacy Management and Institutional Controls Plan

    Office of Legacy Management (LM)

    Department of Energy Comprehensive Legacy Management and Institutional Controls Plan Doc. .........33 Comprehensive Legacy Management and Institutional Controls ...

  6. Comprehensive Legacy Management and Institutional Controls Plan

    Office of Legacy Management (LM)

    Department of Energy Comprehensive Legacy Management and Institutional Controls Plan Doc. .........34 Comprehensive Legacy Management and Institutional Controls ...

  7. Acquisition Career Management Program Handbook, Partial Revision...

    Broader source: Energy.gov (indexed) [DOE]

    Procurement and Assistance Management SUBJECT: Acquisition Career Management Program Handbook, Partial Revision of Chapter 11, Contracting Officer's Representative SUMMARY: The...

  8. Business Opportunities Session Office of Environmental Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Opportunities Session Office of Environmental Management Business Opportunities Session Office of Environmental Management Environmental Clean up PDF icon Business Opportunities ...

  9. Waste shipment engineering data management plan

    SciTech Connect (OSTI)

    Marquez, D.L.

    1995-05-01

    This plan documents current data management practices and future data management improvements for TWRS Waste Shipment Engineering.

  10. Best Management Practice #10: Cooling Tower Management | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 0: Cooling Tower Management Best Management Practice #10: Cooling Tower Management Cooling towers dissipate heat from recirculating water used to cool chillers, air conditioners, or other process equipment to the ambient air. Heat is rejected to the environment from cooling towers through the process of evaporation. Therefore, by design, cooling towers use significant amounts of water. Overview The thermal efficiency and longevity of the cooling tower and equipment depend on the

  11. June 2013, FTCP Senior Technical Safety Manager (STSM) Status...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Manager, & qualified STSMs. Assistant Manager for Environmental Management Scott A. Wade Yes Yes Yes Complete Deputy Assistant Manager for Environmental Management Janet L. ...

  12. EERE Program Management Guide - About the Program Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy (DOE) missions. This need drives some standardization ... and Analysis and Evaluation. To the extent that EERE programs speak the same (program management) language, the ...

  13. Configuration Management Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Configuration Management Plan Configuration Management Plan This template is used for documenting the configuration management methodology, tools, techniques, roles and responsibilities and tasks for a systems development project. PDF icon Configuration Management Plan More Documents & Publications SOFTWARE QUALITY & SYSTEMS ENGINEERING PROGRAM: Software Configuration Management Checklist NMMSS Software Quality Assurance Plan Software Configuration Management (SCM) A Practical Guid

  14. Environmental Management Advisory Board (EMAB) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management

  15. FLUOR HANFORD SAFETY MANAGEMENT PROGRAMS

    SciTech Connect (OSTI)

    GARVIN, L J; JENSEN, M A

    2004-04-13

    This document summarizes safety management programs used within the scope of the ''Project Hanford Management Contract''. The document has been developed to meet the format and content requirements of DOE-STD-3009-94, ''Preparation Guide for US. Department of Energy Nonreactor Nuclear Facility Documented Safety Analyses''. This document provides summary descriptions of Fluor Hanford safety management programs, which Fluor Hanford nuclear facilities may reference and incorporate into their safety basis when producing facility- or activity-specific documented safety analyses (DSA). Facility- or activity-specific DSAs will identify any variances to the safety management programs described in this document and any specific attributes of these safety management programs that are important for controlling potentially hazardous conditions. In addition, facility- or activity-specific DSAs may identify unique additions to the safety management programs that are needed to control potentially hazardous conditions.

  16. Shopping for outage management systems

    SciTech Connect (OSTI)

    Chou, Y.C.; Konneker, L.K.; Watkins, T.R.

    1995-12-31

    Customer service is becoming increasingly important to electric utilities. Outage management is an important part of customer service. Good outage management means quickly responding to outages and keeping customers informed about outages. Each outage equals lost customer satisfaction and lost revenue. Outage management is increasingly important because of new competition among utilities for customers, pressure from regulators, and internal pressure to cut costs. The market has several existing software products for outage management. How does a utility judge whether these products satisfy their specific needs? Technology is changing rapidly to support outage management. Which technology is proven and cost-effective? The purpose of this paper is to outline the procedure for evaluating outage management systems, and to discuss the key features to look for. It also gives our opinion of the features that represent state of the art. This paper will not discuss specific products or list vendors names.

  17. OFFICE FOR EMERGENCY MANAGEMENT

    Office of Legacy Management (LM)

    OFFICE FOR EMERGENCY MANAGEMENT 155OP STREETNW. WiSHINGTON. D.C. ' , iQns 25,19&L At-t :. I' .' ~ at l530 P Btmat, IO&, XtwMn&m, 0. 6., at 9130 A.Jb Sa 1 llmbemupoftbaaomlttaal8~f~r :::i.: :;::j:/ :::.,:.,::: . . . -2, . -3- .,... .:.:. . . ,::;:: 2. lktlv4rsityof-ta ?oral8rtbnsfoaofth4~cnlLmd farumd4rContraotO~~9 t4a : lwlnde the d4v4logmullt. construotion j andop4ratloaofadditl~auls, s~tNm4t4ln. /; ./ 3. alllY4rsltyofcb.l4s&o on4fth4w*callyd sar tmdor OoBtroct OEUS~ 7 :;::.

  18. Computerized training management system

    DOE Patents [OSTI]

    Rice, H.B.; McNair, R.C.; White, K.; Maugeri, T.

    1998-08-04

    A Computerized Training Management System (CTMS) is disclosed for providing a procedurally defined process that is employed to develop accreditable performance based training programs for job classifications that are sensitive to documented regulations and technical information. CTMS is a database that links information needed to maintain a five-phase approach to training-analysis, design, development, implementation, and evaluation independent of training program design. CTMS is designed using R-Base{trademark}, an-SQL compliant software platform. Information is logically entered and linked in CTMS. Each task is linked directly to a performance objective, which, in turn, is linked directly to a learning objective; then, each enabling objective is linked to its respective test items. In addition, tasks, performance objectives, enabling objectives, and test items are linked to their associated reference documents. CTMS keeps all information up to date since it automatically sorts, files and links all data; CTMS includes key word and reference document searches. 18 figs.

  19. Computerized training management system

    DOE Patents [OSTI]

    Rice, Harold B.; McNair, Robert C.; White, Kenneth; Maugeri, Terry

    1998-08-04

    A Computerized Training Management System (CTMS) for providing a procedurally defined process that is employed to develop accreditable performance based training programs for job classifications that are sensitive to documented regulations and technical information. CTMS is a database that links information needed to maintain a five-phase approach to training-analysis, design, development, implementation, and evaluation independent of training program design. CTMS is designed using R-Base.RTM., an-SQL compliant software platform. Information is logically entered and linked in CTMS. Each task is linked directly to a performance objective, which, in turn, is linked directly to a learning objective; then, each enabling objective is linked to its respective test items. In addition, tasks, performance objectives, enabling objectives, and test items are linked to their associated reference documents. CTMS keeps all information up to date since it automatically sorts, files and links all data; CTMS includes key word and reference document searches.

  20. Records Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Records Management Records and Files The Department of Energy (DOE) Records Management Program provides oversight, guidance, and direction to ensure proper documentation of the Department's functions, decisions, policies and proceedures, and essential transactions. WHAT'S NEW: The National Archives and Records Administration (NARA) now provides access to scanned images of Federal agency records schedules. The National Archives Records Control Schedule (RCS) web site contains scanned