Powered by Deep Web Technologies
Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Executive Director  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Director Executive Director Rich Marquez, Executive Director, leads institutional initiatives and provides oversight for the Laboratory's organizations for Ethics and Audits, Prime Contract, Chief Financial Officer, Chief Information Officer, Ombuds, and Communications and Government Affairs. Contact Operator Los Alamos National Laboratory (505) 667-5061 Marquez has received a number of significant awards and recognitions, including the Presidential Rank Award for Meritorious Service. Rich Marquez Executive Director Rich Marquez, Executive Director Richard A. (Rich) Marquez currently serves Los Alamos National Laboratory as executive director reporting to the Laboratory director. Marquez leads institutional initiatives and provides oversight for several Laboratory organizations, including

2

Executive Resources  

Energy.gov (U.S. Department of Energy (DOE))

The Executive Resources Division provides integrated executive policy and operational personnel support services in a centralized location to the Senior Executive Service (SES), Senior-Level (SL), Scientific and Professional (ST), Excepted Service and political appointees. Additional SES information can be found on the SES website which is located on the Office of Personnel Management’s (OPM) website.

3

EXECUTIVE OVERVIEW  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

at the Waste Management Conference ("Visible, Endurable, Enforceable Institutional Controls: Weldon Spring Site-A 10-Year Journey"). EXECUTIVE OVERVIEW U.S. Department of Energy...

4

Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Summary Executive Summary Highway-based excise taxes are paid by highway users, and the tax revenues are distributed to States for supporting highways, safety, and transit programs. The processes for collecting these taxes and redistributing them to the States are very complex. The U.S. Treasury collects most of the taxes from a relatively small number of large corporations located in only a few States. The Internal Revenue Service (IRS) does not have an accurate picture of where the motor fuel is eventually consumed. Because the actual State-by-State contributions are not available, detailed analyses are required to estimate a State's on-highway motor fuel use. The attribution process uses State-reported data and nationally applied statistical models to determine how much fuel is used on highways in each State and the proportion of each State's usage in comparison to the total motor fuel usage for all States.

5

EXECUTIVE SUMMARY  

National Nuclear Security Administration (NNSA)

FUSION ENERGY SCIENCE ADVISORY COMMITTEE FUSION ENERGY SCIENCE ADVISORY COMMITTEE Panel on High Energy Density Laboratory Plasmas ADVANCING THE SCIENCE OF HIGH ENERGY DENSITY LABORATORY PLASMAS January 2009 UNITED STATES DEPARTMENT OF ENERGY 1 TABLE OF CONTENTS EXECUTIVE SUMMARY.......................................................................................... 5 1 HIGH ENERGY DENSITY LABORATORY PLASMA SCIENCE .................................... 15 2 THE CHARGE TO FESAC ...................................................................................... 19 3 THE PANEL PROCESS ............................................................................................ 20 4 STEWARDSHIP OF THE JOINT PROGRAM ............................................................... 23

6

Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) Worker Safety and Health Program Lawrence Berkeley National Laboratory LBNL Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) This page intentionally left blank. LBNL Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) i Contents Executive Summary .............................................................................................. v 1. Introduction................................................................................................... 1 1.1 Work Activities .............................................................................................. 1

7

EXECUTIVE SUMMARY  

NLE Websites -- All DOE Office Websites (Extended Search)

EXECUTIVE SUMMARY This document contains an assessment of the first project to be completed under the U.S. Department of Energy Clean Coal Technology Program. The project was selected under Round I and is known officially as "The Demonstration of an Advanced Cyclone Coal Combustor, with Internal Sulfur, Nitrogen, and Ash Control for the Conversion of a 23 MMBtu/hour Oil-Fired Boiler to Pulverized Coal." The project was carried out by the Coal Tech Corporation over the period March 1987 February 1991 at the site of the Keeler/Dorr-Oliver Boiler Company in Williamsport, Pennsylvania. The project was a three-year demonstration scale test of a 30 MMBtu/hr air-cooled ceramic slagging cyclone combustor retrofitted to a horizontal 23-MMBtu/hr oil or natural gas-fired Keeler/Dorr-Oliver DS-9

8

Executive Summary  

E-Print Network (OSTI)

Air traffic is partly reopening., based on more accurate risk assessments using data collected in a number of test flights that have been conducted on Saturday 17 and Sunday 18 April. Lufthansa and Air France’s KLM unit reported successful testing of flights without passengers during the weekend, and Air France said an inspection of an Airbus A320 flown yesterday from Paris to Toulouse showed “no anomalies. ” The Association of European Airlines, which represents 36 carriers, said it wants an “immediate ” assessment of the airspace restrictions. (Business week) Additional flights authorized by Italian ENAC and have found no measureable traces of the ash in the Italian air space. This is a statement by the Italian Civil Protection Italy is constantly monitoring the fallout of ashes produced by the eruption of the Icelandic volcano. Following a preliminary assessment made on the Alps snow surface, no ashes fallout has been detected. To this regard, we will be grateful to the Participating States involved in the phenomenon if they would kindly provide us with information on the ashes fallout in their respective countries. The Italian scientific community and the national Agencies responsible of flight control and safety has requested detailed information regarding the threshold values adopted by the scientific models currently under analysis of the VAAC (Volcanic Ash Advisory Centre) based in London. In fact, the VAAC reports are increasingly precise in their delineation of the area covered by ash (thinner polygons). Yet, the criteria for this delineation (ash concentration thresholds) are unknown. The satellite image below shows the ash plume as of 18 April 2010, as seen from MODIS optical satellite imagery.

unknown authors

2010-01-01T23:59:59.000Z

9

Higher-order symbolic execution via contracts  

Science Conference Proceedings (OSTI)

We present a new approach to automated reasoning about higher-order programs by extending symbolic execution to use behavioral contracts as symbolic values, thus enabling symbolic approximation of higher-order behavior. Our approach is based on the idea ... Keywords: higher-order contracts, reduction semantics, symbolic execution

Sam Tobin-Hochstadt; David Van Horn

2012-11-01T23:59:59.000Z

10

Staged symbolic execution  

Science Conference Proceedings (OSTI)

Recent advances in constraint solving technology and raw computation power have led to a substantial increase in the effectiveness of techniques based on symbolic execution for systematic bug finding. However, scaling symbolic execution remains a challenging ...

Junaid Haroon Siddiqui; Sarfraz Khurshid

2012-03-01T23:59:59.000Z

11

Specification-enhanced execution  

E-Print Network (OSTI)

Our goal is to provide a framework that allows the programmer to easily shift responsibility for certain aspects of the program execution to the runtime system. We present specification- enhanced execution, a programming ...

Yang, Jean, S.M. Massachusetts Institute of Technology

2010-01-01T23:59:59.000Z

12

Fermilab Users' Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

- 1171 1970 USERS EXECUTIVE COMMITTEE ELECTION C. Baltay, Columbia 870 - 572 E. C. Fowler, Purdue (Chairman 1270-572) 870 - 572 G. Masek, UCSD 870 - 572 L. Pondrom,...

13

EXECUTIVE ORDER 13111  

NLE Websites -- All DOE Office Websites (Extended Search)

PM EXECUTIVE ORDER 13111 January 12, 1999 - - - - - - - USING TECHNOLOGY TO IMPROVE TRAINING OPPORTUNITIES FOR FEDERAL GOVERNMENT EMPLOYEES Advances in technology and increased...

14

Executing Modular Exponentiation on a Graphics Accelerator  

E-Print Network (OSTI)

to be reprogrammed. Vector shaders are programs that transform 3D vectors within the graphics pipeline by custom projections and calculations. Pixel shaders allow the value of pixels to be specified by the programmer-precision floating-point values. In the GPU programming model a single pixel shader is executed over a 2D rectangle

International Association for Cryptologic Research (IACR)

15

Relevant Executive Orders and Policies  

NLE Websites -- All DOE Office Websites (Extended Search)

please click here. Executive Order 13514: Federal Leadership in Environmental, Energy, and Economic Performance (2009) In October 2009, President Obama issued Executive...

16

1. executive committee bylaws  

Science Conference Proceedings (OSTI)

teer requests uthorized. and execute nonvoting, all ng). Technical Div ng and organ recommenda ficant action in ors. m time-to-tim ing non-inclu nd the procedu.

17

Budget Formulation & Execution  

Energy.gov (U.S. Department of Energy (DOE))

The mission of the Office of Budget (CF-30) is to plan for, formulate, execute, analyze, and defend the Department of Energy's budget; to manage the corporate funds control process; and to serve as...

18

INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 29, 2007 INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE ORDER 13423 "Strengthening Federal Environmental, Energy, and Transportation Management" i Contents I. Introduction ......................................................................................................................1 A. Purpose..................................................................................................................1 B. Authority ...............................................................................................................1 C. Organization and Oversight ..................................................................................1 D. Overarching Policy and Directives .......................................................................4

19

Executive Order 13423 Implementing Instructions  

Energy.gov (U.S. Department of Energy (DOE))

INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE ORDER 13423“Strengthening Federal Environmental, Energy, and Transportation Management”

20

Detection of malicious computer executables  

SciTech Connect

A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

Cai, Dongming M. (Los Alamos, NM); Gokhale, Maya (Los Alamos, NM)

2009-04-14T23:59:59.000Z

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Project Execution Plan RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Execution Plan (PEP) Review Module Project Execution Plan (PEP) Review Module March 2010 CD-0 O 0 OFFICE OF P C CD-1 F ENVIRO Standard R Project E Rev Critical Decis CD-2 M ONMENTAL Review Plan Execution view Module sion (CD) Ap CD March 2010 L MANAGE n (SRP) n Plan e pplicability D-3 EMENT CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-1189-2008,

22

Integrating Program Component Executables  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrating Integrating Program Component Executables on Distributed Memory Architectures via MPH Chris Ding and Yun He Computational Research Division, Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720, USA chqding@lbl.gov, yhe@lbl.gov Abstract A growing trend in developing large and complex ap- plications on today's Teraflop computers is to integrate stand-alone and/or semi-independent program components into a comprehensive simulation package. One example is the climate system model which consists of atmosphere, ocean, land-surface and sea-ice. Each component is semi- independent and has been developed at different institu- tions. We study how this multi-component multi-executable application can run effectively on distributed memory archi- tectures. We identify five effective execution modes and de- velop the MPH library to support

23

Certifying execution time  

Science Conference Proceedings (OSTI)

In this paper we present the framework Abstraction-Carrying CodE Platform for Timing validation (ACCEPT), designed for timing analysis of embedded real-time systems using the worst-case execution time (WCET) as the safety parameter. In the context ...

Vítor Rodrigues; João Pedro Pedroso; Mário Florido; Simão Melo de Sousa

2011-05-01T23:59:59.000Z

24

FY2005 SSRLUO Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

5 Executive Committee 5 Executive Committee corner corner Environmental Sciences Graduate Student LCLS Macromolecular Crystallography Materials Chemistry SSRL Liaison Structural Molecular Biology corner corner Juana Acrivos CSU San Jose, Chemistry, 1 Washington Square, SanJose, CA 95192-0101 Juana Acrivos has done experiments at SSRL since 1978. She is a chemist at SJSU (Professor). Her students first work at SSRL (Alan Robertson, Kevin Hathaway) showed how metal (Rb and Ba) in ammonia solutions change valence from 0 (in metallic solutions) to ionic values as the dilution is increased. The dynamics of intercalation chemistry was investigated in the '80s for TaS2 exposed to N2H4 in the beam (John Reynolds, Stuart S P Parkin). Battery action was revealed by investigating the Se edge shifts in (C(graphite|Cx(H2SeO4)|Cx

25

FY2006 SSRLUO Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

6 Executive Committee 6 Executive Committee corner corner Environmental Sciences Graduate Student LCLS Macromolecular Crystallography Materials Chemistry SSRL Liaison Biospectroscopy corner corner Juana Acrivos CSU San Jose, Chemistry, 1 Washington Square, SanJose, CA 95192-0101 Juana Acrivos has done experiments at SSRL since 1978. She is a chemist at SJSU (Professor). Her students first work at SSRL (Alan Robertson, Kevin Hathaway) showed how metal (Rb and Ba) in ammonia solutions change valence from 0 (in metallic solutions) to ionic values as the dilution is increased. The dynamics of intercalation chemistry was investigated in the '80s for TaS2 exposed to N2H4 in the beam (John Reynolds, Stuart S P Parkin). Battery action was revealed by investigating the Se edge shifts in (C(graphite|Cx(H2SeO4)|Cx

26

Executive Secretariat | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Secretariat Energy Reduction at HQ Facilities and Infrastructure Federal Advisory Committee Management Freedom of Information Act Financial Assistance Information...

27

Executive information system  

DOE Green Energy (OSTI)

The Executive Information System (EIS) is a computer-based information handling system. The system has been designed and implemented for Energy Conversion and Utilization Technologies to allow program managers easy access and tracking of certain types of reporting at various levels of management interaction, to simplify the handling of program-related data, and to streamline the preparation of reporting documents and responses to requests for information from the program. The EIS is especially useful in assisting DOE program managers in the routine dissemination of reports and information. The characteristics of each component of the EIS are discussed. A user's guide to the EIS is included in this report.

Vitullo, M.; Winter, C.; Johnson, D.R.

1984-07-01T23:59:59.000Z

28

Office of the Executive Secretariat  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Secretariat, MA-70 Executive Secretariat, MA-70 Acting Director Carol A. Matthews Special Projects Security Policy and Analysis Group Programmatic Expertise High-level Review and Analysis Correspondence Management Group Correspondence Control & Assignment Correspondence Support FOIA Management Special Projects Receiving and Delivery Administration and Executive Commitments Group eDOCS Executive Commitments Information Management Budget Personnel Administration Office of History and Heritage Resources Institutional Memory History Activities Historic Preservation Litigation Research Customer Research Archives Administration May 2013 Deputy Director Carol A. Matthews Federal Advisory Committee Management

29

Fermilab Users' Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

2012-2013 UEC and GSA Members at October meeting 2012-2013 UEC and GSA Members at October meeting Current Members of the Fermilab Users Executive Committee 2012-2013 Name and Organization Term Email Nikos Varelas, Chair University of Illinois at Chicago 9/11 - 8/13 varelas AT uic.edu Mary Anne Cummings Muons, Inc. 9/12 - 8/14 macc AT fnal.gov Craig Group University of Virginia 9/12 - 8/14 group AT fnal.gov Sergo Jindariani Fermilab 9/11 - 8/13 sergo AT fnal.gov Daniel Kaplan Illinois Institute of Technology 9/11 - 8/13 kaplan AT iit.edu Ryan Patterson California Institute of Technology 9/11 - 8/13 rbpatter AT caltech.edu Greg Pawloski University of Minnesota 9/11 - 8/13 pawloski AT umn.edu Breese Quinn University of Mississippi 9/12 - 8/14 quinn AT phy.olemiss.edu Lee Roberts Boston University 9/12 - 8/14 roberts AT bu.edu Mandy Rominsky

30

Fire Executive Council  

E-Print Network (OSTI)

Dear Reader, The Quadrennial Fire Review (QFR) is a strategic assessment process that is conducted every four years to evaluate current mission strategies and capabilities against best estimates of the future environment for fire management. This integrated review is a joint effort of the five federal natural resource management agencies and their state, local, and tribal partners that constitute the wildland fire community. The objective is to create an integrated strategic vision document for fire management. The 2009 QFR presents incoming federal policy leadership and the agency senior executives with the driving forces for change, suggested mission strategies, and analyses of workforce and operational capabilities. The document provides a solid foundation for policy discussions within the federal agencies and, importantly, among the federal agencies and state, local, tribal, and other partners. While the QFR is not a formal policy or decision document, it sets the stage for a “strategic conversation ” about future direction and change in fire management. Our thanks goes to the QFR Integration Panel members who led the two-year analysis and review process and who prepared the final report, along with those members of the wildland fire community who submitted information, commentary, and suggestions during the process. We look forward to joining our wildland fire colleagues in using the QFR to chart and implement a national approach to wildland fire management.

Jeff Jahnke; Abigail Kimbell; U. S. Fish; Wildlife Service; James Caswell; Mary A. Bomar; Jerry Gidner

2008-01-01T23:59:59.000Z

31

Caltech campus executive LDRD.  

Science Conference Proceedings (OSTI)

The environment most brain systems of humans and other animals are almost constantly confronted with is complex and continuously changing, with each time step updating a potentially bewildering set of opportunities and demands for action. Far from the controlled, discrete trials used in most neuro- and psychological investigations, behavior outside the lab at Caltech is a seamless and continuous process of monitoring (and error correction) of ongoing action, and of evaluating persistence in the current activity with respect to opportunities to switch tasks as alternatives become available. Prior work on frontopolar and prefrontal task switching, use tasks within the same modality (View a stream of symbols on a screen and perform certain response mappings depending on task rules). However, in thesetask switches' the effector is constant: only the mapping of visual symbols to the specific button changes. In this task, the subjects are choosing what kinds of future action decisions they want to perform, where they can control either which body part will act, or which direction they will orient an instructed body action. An effector choice task presents a single target and the subject selects which effector to use to reach the target (eye or hand). While the techniques available for humans can be less spatially resolved compared to non-human primate neural data, they do allow for experimentation on multiple brain areas with relative ease. Thus, we address a broader network of areas involved in motor decisions. We aim to resolve a current dispute regarding the specific functional roles of brain areas that are often co-activated in studies of decision tasks, dorsal premotor cortex(PMd) and posterior parietal cortex(PPC). In one model, the PPC distinctly drives intentions for action selection, whereas PMd stimulation results in complex multi-joint movements without any awareness of, nor subjective feeling of, willing the elicited movement, thus seems to merely help execute the chosen action.

Shepodd, Timothy J.; Knudsen, Tamara

2013-01-01T23:59:59.000Z

32

Caltech campus executive LDRD.  

SciTech Connect

The environment most brain systems of humans and other animals are almost constantly confronted with is complex and continuously changing, with each time step updating a potentially bewildering set of opportunities and demands for action. Far from the controlled, discrete trials used in most neuro- and psychological investigations, behavior outside the lab at Caltech is a seamless and continuous process of monitoring (and error correction) of ongoing action, and of evaluating persistence in the current activity with respect to opportunities to switch tasks as alternatives become available. Prior work on frontopolar and prefrontal task switching, use tasks within the same modality (View a stream of symbols on a screen and perform certain response mappings depending on task rules). However, in thesetask switches' the effector is constant: only the mapping of visual symbols to the specific button changes. In this task, the subjects are choosing what kinds of future action decisions they want to perform, where they can control either which body part will act, or which direction they will orient an instructed body action. An effector choice task presents a single target and the subject selects which effector to use to reach the target (eye or hand). While the techniques available for humans can be less spatially resolved compared to non-human primate neural data, they do allow for experimentation on multiple brain areas with relative ease. Thus, we address a broader network of areas involved in motor decisions. We aim to resolve a current dispute regarding the specific functional roles of brain areas that are often co-activated in studies of decision tasks, dorsal premotor cortex(PMd) and posterior parietal cortex(PPC). In one model, the PPC distinctly drives intentions for action selection, whereas PMd stimulation results in complex multi-joint movements without any awareness of, nor subjective feeling of, willing the elicited movement, thus seems to merely help execute the chosen action.

Shepodd, Timothy J.; Knudsen, Tamara

2013-01-01T23:59:59.000Z

33

Toxic Hazard  

Science Conference Proceedings (OSTI)

... cu the zones at each or tll(' ve-nts lx-twccn ... The ani- mal test for acute toxicity would then ... of the needed data would be provided by analytical testing. ...

2009-05-05T23:59:59.000Z

34

Federal Energy Management Program: Executive Order 13514  

NLE Websites -- All DOE Office Websites (Extended Search)

514 to someone by E-mail Share Federal Energy Management Program: Executive Order 13514 on Facebook Tweet about Federal Energy Management Program: Executive Order 13514 on Twitter...

35

Federal Energy Management Program: Executive Order 13221  

NLE Websites -- All DOE Office Websites (Extended Search)

Fleet Reporting Executive Order 13221 Executive Order (E.O.) 13221, Energy Efficient Standby Power Devices, calls for Federal agencies to purchase products that use minimal...

36

Regulatory constraints on executive compensation  

E-Print Network (OSTI)

This paper explores the influence of economic regulation on the level and structure of executive compensation. We find substantial and persistent differences in CEO compensation between firms subject to economic regulation ...

Joskow, Paul L.

1993-01-01T23:59:59.000Z

37

Federal Energy Management Program: Executive Order 13423  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Order Executive Order 13423 to someone by E-mail Share Federal Energy Management Program: Executive Order 13423 on Facebook Tweet about Federal Energy Management Program: Executive Order 13423 on Twitter Bookmark Federal Energy Management Program: Executive Order 13423 on Google Bookmark Federal Energy Management Program: Executive Order 13423 on Delicious Rank Federal Energy Management Program: Executive Order 13423 on Digg Find More places to share Federal Energy Management Program: Executive Order 13423 on AddThis.com... Requirements by Subject Requirements by Regulation National Energy Conservation Policy Act Executive Order 13514 Energy Independence & Security Act Executive Order 13423 Energy Policy Act of 2005 Executive Order 13221 Energy Policy Act of 1992 Notices & Rules

38

FY2008 SSRLUO Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

8 Executive Committee 8 Executive Committee corner corner Environmental Sciences Graduate Student LCLS Macromolecular Crystallography Materials Chemistry SSRL Liaison Biospectroscopy corner corner Joy Andrews California State University East Bay, Chemistry, 25800 Carlos Bee Blvd., Hayward, CA 94542 Professor in the Department of Chemistry and Biochemistry at California State University, East Bay, where she has taught since 1996. Her B.A. degree is in biochemistry from Barnard College, and Ph.D. in Biophysical Chemistry from UC Berkeley. Her research is on the detection, speciation and remediation of heavy metal contamination at various environmental sites, using atomic absorption spectroscopy, ion chromatography, and x-ray absorption spectroscopy. She is also conducting continuous monitoring of water quality parameters in SF Bay, funded by CICORE/NOAA. She was Chair, Executive Committee, Stanford Synchrotron Radiation Laboratory User's Organization Oct 2005-Oct 2006; and Chair, Synchrotron and Neutron User's Group Advocacy Committee since October 2005.

39

EIA - AEO2010 - Executive Summary  

Gasoline and Diesel Fuel Update (EIA)

Executive Summary Executive Summary Annual Energy Outlook 2010 with Projections to 2035 Executive Summary In 2009, U.S. energy markets continued to show the impacts of the economic downturn that began in late 2007. After falling by 1 percent in 2008, total electricity generation dropped by another 3 percent in 2009. Although other factors, including weather, contributed to the decrease, it was the first time in the 60-year data series maintained by the EIA that electricity use fell in two consecutive years. Over the next few years, the key factors influencing U.S. energy markets will be the pace of the economic recovery, any lasting impacts on capital-intensive energy projects from the turmoil in financial markets, and the potential enactment of legislation related to energy and the environment.

40

Business Development Executive (BDE) Program  

SciTech Connect

The IPST BDE (Institute of Paper Science and Technology Business Development Executive) program was initiated in 1997 to make the paper industry better aware of the new manufacturing technologies being developed at IPST for the U.S. pulp and paper industry's use. In April 2000, the BDE program management and the 20 BDEs, all retired senior level industry manufacturing and research executives, were asked by Ms. Denise Swink of OIT at DOE to take the added responsibility of bringing DOE developed energy conservation technology to the paper industry. This project was funded by a DOE grant of $950,000.

Rice, E.J. "Woody"; Frederick, W. James

2005-12-05T23:59:59.000Z

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

From an executive network to executive control: A computational model of the n-back task  

Science Conference Proceedings (OSTI)

A paradigmatic test of executive control, the n-back task, is known to recruit a widely distributed parietal, frontal, and striatal "executive network," and is thought to require an equally wide array of executive functions. The mapping of functions ...

Christopher H. Chatham; Seth A. Herd; Angela M. Brant; Thomas E. Hazy; Akira Miyake; Randy O'Reilly; Naomi P. Friedman

2011-11-01T23:59:59.000Z

42

VALUE ENGINEERING.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 6 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS FOLLOW-ON INSPECTION OF THE DEPARTMENT OF ENERGY'S VALUE ENGINEERING PROGRAM DECEMBER 2001 U.S. DEPARTMENT OF ENERGY Washington, DC 20585 December 20, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Follow-on Inspection of the Department of Energy's Value Engineering Program" BACKGROUND Value Engineering is a recognized management tool which, if properly implemented and executed, can streamline operations, improve quality, and reduce costs. Through the use of methodologies such as Value Engineering, Federal agencies are realizing an average of more than $20 in savings/costs avoidance for each dollar spent on performing the value effort.

43

Data-oriented transaction execution  

Science Conference Proceedings (OSTI)

While hardware technology has undergone major advancements over the past decade, transaction processing systems have remained largely unchanged. The number of cores on a chip grows exponentially, following Moore's Law, allowing for an ever-increasing ... Keywords: DORA, data-oriented transaction execution, latch contention, lock manager, multicore transaction processing

Ippokratis Pandis; Ryan Johnson; Nikos Hardavellas; Anastasia Ailamaki

2010-09-01T23:59:59.000Z

44

WASC PREPARATORY REVIEW EXECUTIVE SUMMARY  

E-Print Network (OSTI)

in its culture of diversity, creativity and discovery. In the final essay, we indicate how sharedWASC PREPARATORY REVIEW EXECUTIVE SUMMARY Fiat Lux University of California motto he four essays, administrators, and alumni to determine the topics to be covered in the essays and to review the many drafts

California at Santa Cruz, University of

45

Other Executive Positions | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Executive Positions | National Nuclear Security Administration Executive Positions | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Other Executive Positions Home > Federal Employment > Our Jobs > Executive Positions > Other Executive Positions Other Executive Positions NNSA seeks highly qualified senior professionals to apply their knowledge,

46

Implementing for Implementing Executive Order 13423  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPLEMENTING EXECUTIVE IMPLEMENTING EXECUTIVE ORDER 13423 "Strengthening Federal Environmental, Energy, and Transportation Management" March 29, 2007 0 Contents I. Introduction ......................................................................................................................1 A. Purpose..................................................................................................................1 B. Authority ...............................................................................................................1 C. Organization and Oversight ..................................................................................1 D. Overarching Policy and Directives .......................................................................4

47

Northwest Energy Efficiency Taskforce Executive Committee  

E-Print Network (OSTI)

#12;Northwest Energy Efficiency Taskforce Executive Committee Chairs Tom Karier, Washington Member, Northwest Energy Efficiency Alliance Bill Gaines, Director/Chief Executive Officer, Tacoma Public Utilities, Cowlitz County Public Utility District Cal Shirley, Vice President for Energy Efficiency Service, Puget

48

Department of Energy Acquisition System - A Guide for Executives |  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy Acquisition System - A Guide for Executives Department of Energy Acquisition System - A Guide for Executives Department of Energy Acquisition System - A Guide for Executives The principal purposes of the Department's acquisition system are to: Deliver on a timely basis the best value product or service to the customer by, for example, Maximizing the use of commercial products and services. Using contractors who have a track record of successful past performance or who demonstrate a current superior ability to perform. Promoting competition. Maintain the public's trust by conducting business with integrity, fairness, openness, and compliance with statutory and regulatory requirements. Minimize administrative operating costs Fulfill public policy objectsives, such as Providing opportunities for small and small disadvantaged business.

49

Executive Order 13423- Strengthening Federal Environmental, Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It...

50

Boeing Company Executive Joins NIST Advisory Committee  

Science Conference Proceedings (OSTI)

... to serving on Boeing's Executive Council, Tracy oversees the development and implementation of its enterprise technology investment strategy and ...

2013-01-09T23:59:59.000Z

51

PIA - Savannah River Operations Office Executive Commitment Action...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Commitment Action Tracking System PIA - Savannah River Operations Office Executive Commitment Action Tracking System PIA - Savannah River Operations Office Executive...

52

EMSL User Executive Committe Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

User Executive User Executive Committee Meeting July 13, 2011 Recommendations Valerie Copie, UEC Chair User Meetings/Workshops EUC Comments & Recommendations: The UEC supports EMSL's focus on specific areas for User meetings and workshops rather than organizing a generalized User Meeting Focused meetings may provide opportunities for users to visit EMSL more often and to participate in team building as envisaged by the new vision of EMSL2.0 The UEC would like EMSL to have broad representations at these workshops to avoid having too many internal participants. The Pore-scale workshop may be a good model to follow for focused workshops While the UEC supports focused workshops, the entire user community should be welcome to attend them and informed about these activities

53

ADEQUACY REPORT Â… EXECUTIVE SUMMARY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08 08 ADEQUACY REPORT - EXECUTIVE SUMMARY The electricity industry has gone through major changes in structure, shape, and form over the last decade. All signs indicate that business is far from "as usual". It is prudent at this time to ask if the present approaches can ensure reliable and cost effective supply of electricity over the next two decades and if not, then what is needed to achieve that. This was the prime reason for the formation of the Electricity Advisory Committee (EAC) for which this report was done. The answer to that key question is "no, unless....". A concise set of recommendations is included in this executive summary but more detailed lists are listed in the report. Today, the warning signs are here. Fuel transportation, particularly by rail, is congested,

54

Linear obfuscation to combat symbolic execution  

Science Conference Proceedings (OSTI)

Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful techniques in discovering such malicious code and analyzing the trigger condition. ... Keywords: malware analysis, software obfuscation, symbolic execution

Zhi Wang; Jiang Ming; Chunfu Jia; Debin Gao

2011-09-01T23:59:59.000Z

55

Budget Formulation & Execution | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Budget Formulation & Execution Budget Formulation & Execution Budget Formulation & Execution The mission of the Office of Budget (CF-30) is to plan for, formulate, execute, analyze, and defend the Department of Energy's budget; to manage the corporate funds control process; and to serve as the external liaison for the Department of Energy on matters related to its budget. Functions: Coordinate and manage the Department's budget formulation, presentation, and execution processes. Provide central administration of Departmental appropriations, allotments, and financial controls. Formulate procedures for budgetary allocations and controls, reprogrammings, deferrals, and other financial actions. Develop budget tables, histories, statistics, and other data required for budget planning and control.

56

Budget Formulation and Execution | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Formulation and Execution Formulation and Execution Budget Formulation and Execution The Office of Budget works on the Office of Energy Efficiency and Renewable Energy (EERE) corporate budget formulation and defense, annual performance plan facilitation, quarterly program performance reporting, accountability submissions, the Program Assessment Rating Tool (PART), and related President's Management Agenda (PMA) topics. The Office produces budget funding action documents, procurement and loan guarantee procedures, annual operating plans, fund transfers to laboratories, and contractor budget data analysis. The Office leads the budgeting process through two primary functions-formulation and execution: Budget Formulation The Office of Budget facilitates corporate budget formulation through

57

Behavior-based remote executing agents  

E-Print Network (OSTI)

remote execution semantics, and intermediary commu- nication handling)remote, more advantageous, location. ReAgents simplify the use of mobile agent technology by transparently handling

Hung, Eugene

2006-01-01T23:59:59.000Z

58

Executive Order 13514: Implementation Status Update  

NLE Websites -- All DOE Office Websites (Extended Search)

Larry Stirling Office of Environmental Policy & Assistance (HS-22) Environmental Sustainability Network February 18, 2010 Executive Order 13514 (October 5, 2009) "To establish an...

59

NREL: Energy Executive Leadership Academy - Leadership Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Leadership Program NREL's Executive Energy Leadership Program is an in-depth training program conducted over five three-day sessions from May through September. The classroom...

60

SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation of Formal Training SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal Training Form is used to evaluate formal training courses in the...

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Federal Energy Management Program: Executive Order 13221  

NLE Websites -- All DOE Office Websites (Extended Search)

221 Executive Order (E.O.) 13221, Energy Efficient Standby Power Devices, calls for Federal agencies to purchase products that use minimal standby power when possible. It was...

62

SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assignment Evaluation Form allows ESE candidates to evaluate assignments in terms of the executive core qualities the assignment was intended to meet, how well it met...

63

2009 Wind Technologies Market Report: Executive Summary  

SciTech Connect

This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report (DOE/GO-102010-3107).

Wiser, R.; Bolinger, M.

2010-08-01T23:59:59.000Z

64

ORNL Neutron Sciences Directorate Executive Office  

NLE Websites -- All DOE Office Websites (Extended Search)

Neutron Sciences Directorate Executive Office Kelly Beierschmitt ORNL Associate Laboratory Director for Neutron Sciences Kelly Beierschmitt. The Neutron Sciences Directorate (NScD)...

65

Project review for the acquisition executive  

Science Conference Proceedings (OSTI)

A set of view graphs for briefing the acquisition executive for the Uranium Mill Tailings Remedial Action (UMTRA) Project are presented.

NONE

1986-10-01T23:59:59.000Z

66

1.0EXECUTIVE SUMMARY  

NLE Websites -- All DOE Office Websites (Extended Search)

ARC-TR-03-0002 ARC-TR-03-0002 Electrochemical Noise Sensors for Detection of Localized and General Corrosion of Natural Gas Transmission Pipelines Final Report for the Period July 2001 - October 2002 December 2002 Sophie J. Bullard, Bernard S. Covino, Jr., James H. Russell, Gordon R. Holcomb, Stephen D. Cramer, and Margaret Ziomek-Moroz Albany Research Center U.S. Department of Energy Albany, OR PREPARED FOR THE UNITED STATES DEPARTMENT OF ENERGY, NATIONAL ENERGY TECHNOLOGY LABORATORY. Work Performed Under Work Package Number FE-01-06 This page left intentionally blank. 2 Electrochemical Noise Sensors for Detection of Localized and General Corrosion of Natural Gas Transmission Pipelines TABLE OF CONTENTS 1.0 EXECUTIVE SUMMARY

67

EXECUTIVE OFFICE OF THE PRESIDENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EXECUTIVE OFFICE OF THE PRESIDENT COUNCIL ON ENVIRONMENTAL QUALITY 722 JACKSON PLACE, N. W. WASHINGTON, D. C. April 30, 1981 MEMORANDUM FOR GENERAL COUNSELS, NEPA LIAISONS AND PARTICIPANTS IN SCOPING SUBJECT: Scoping Guidance As part of its continuing oversight of the implementation of the NEPA regulations, the Council on Environmental Quality has been investigating agency experience with scoping. This is the process by which the scope of the issues and alternatives to be examined in an EIS is determined. In a project led by Barbara Bramble of the General Counsel's staff the Council asked federal agencies to report their scoping experiences; Council staff held meetings and workshops in all regions of the country to discuss scoping practice; and a contract study was performed for the Council to investigate what techniques work best for

68

Advanced Fuels Campaign Execution Plan  

SciTech Connect

The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the “Grand Challenge” for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

Kemal Pasamehmetoglu

2010-10-01T23:59:59.000Z

69

Advanced Fuels Campaign Execution Plan  

SciTech Connect

The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

Kemal Pasamehmetoglu

2011-09-01T23:59:59.000Z

70

Advanced Fuels Campaign Execution Plan  

SciTech Connect

The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

Kemal Pasamehmetoglu

2011-09-01T23:59:59.000Z

71

Carlsbad Area Office Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

June 1998 June 1998 Carlsbad Area Office Executive Summary The mission of the Carlsbad Area Office (CAO) is to protect human health and the environment by opening and operating the Waste Isolation Pilot Plant (WIPP) for safe disposal of transuranic (TRU) waste and by establishing an effective system for management of TRU waste from generation to disposal. It includes personnel assigned to CAO, WIPP site operations, transportation, and other activities associated with the National TRU Program (NTP). The CAO develops and directs implementation of the TRU waste program, and assesses compliance with the program guidance, as well as the commonality of activities and assumptions among all TRU waste sites. A cornerstone of the Department of Energy's (DOE) national cleanup strategy, WIPP is

72

Value Centers  

Science Conference Proceedings (OSTI)

Value centers identify the over-reaching themes, initiatives, and opportunities in alignment with the strategic goals of AOCS. Value Centers AOCS History and Governance about us aocs committees contact us division council fats governing board hist

73

Optimized code restructuring of OS/2 executables  

Science Conference Proceedings (OSTI)

This paper describes the design and algorithms of FDPR/2 (Feedback Directed Program Restructuring of OS/2 executables), a general-purpose tool that can be used to instrument, profile, and restructure/optimize OS/2 executables for the tel x86 architecture. ...

Jyh-Herng Chow; Yong-fong Lee; Kalyan Muthukumar; Vivek Sarkar; Mauricio Serrano; Iris Garcia; John Hsu; Shauchi Ong; Honesty Young

1995-11-01T23:59:59.000Z

74

Microsoft PowerPoint - Executive Order13423rbl  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order 13423 Executive Order 13423 Executive Order 13423 Strengthening Federal Strengthening Federal Environmental, Energy and Environmental, Energy and Transportation Management Transportation Management 2 2 Executive Order 13423 Replaces the Executive Order 13423 Replaces the Greening the Government Series of Greening the Government Series of Executive Orders Executive Orders 13101 Recovered Materials 13101 Recovered Materials 13123 Energy Efficiency 13123 Energy Efficiency 13148 Environment 13148 Environment 13149 Transportation 13149 Transportation BUT BUT 13221 Standby Power was retained 13221 Standby Power was retained 3 3 Two Parts Involved Two Parts Involved Executive Order Executive Order States Policy States Policy Establishes Goals Establishes Goals Assigns Responsibilities for Agencies, CEQ, Assigns Responsibilities for Agencies, CEQ,

75

Sample Project Execution Plan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sample Project Execution Plan Sample Project Execution Plan Sample Project Execution Plan The project execution plan (PEP) is the governing document that establishes the means to execute, monitor, and control projects. The plan serves as the main communication vehicle to ensure that everyone is aware and knowledgeable of project objectives and how they will be accomplished. The plan is the primary agreement between Headquarters and the federal project director and a preliminary plan should be developed and approved at Critical Decision-1. Project objectives are derived from the mission needs statement, and an integrated project team assists in development of the PEP. The plan is a living document and should be updated to describe current and future processes and procedures, such as integrating safety

76

Executive Potential Program (EPP) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Potential Program (EPP) Executive Potential Program (EPP) Executive Potential Program (EPP) January 10, 2014 (All day) Application Procedure: Nomination packages for EPP-2015-1 and EPP 2015-DC, must be received by deadline dates of January 10, 2014 and April 8, 2014 respectively, and must include the following: -The completed Executive Potential Program Application that includes information about the applicant, the applicant's immediate supervisor, and the DOE program coordinator, Johnny McChriston. - A statement from the applicant indicating the purpose for applying and how participation in the Executive Potential Program will support the applicant's career goals. -The applicant's current resume, signed and dated by the applicant - Payment must accompany the application before it will be processed.

77

Executive Fleet Vehicles Report | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Fleet Vehicles Report Executive Fleet Vehicles Report Executive Fleet Vehicles Report On May 24, 2011, the President issued a Presidential Memorandum on Federal Fleet Performance. In accordance with Section 1 (b) of the Presidential Memorandum and pursuant to Federal Management Regulation 102-34.50 (41 CFR 102-34.50), executive fleets are required to achieve maximum fuel efficiency; be limited in motor vehicle body size, engine size, and optional equipment to what is essential to meet agency mission; and be midsize or smaller sedans, except where larger sedans are essential to the agency mission. Executive fleet vehicles that are larger than midsize sedans or are not AFVs must be disclosed on the website of the agency operating the vehicles within 180 days of the date of the memorandum (on or before November 17,

78

Project Execution Plan, Rev. 3  

Science Conference Proceedings (OSTI)

This plan addresses project activities encompassed by the U.S. Department of Energy's (DOE's), National Nuclear Security Administration Nevada Operations Office, Environmental Restoration Division and conforms to the requirements contained in the Life-Cycle Asset Management, DOE Order 430.1A; The Joint Program Office Policy on Project Management in Support of DOE Order 430.1; Program and Project Management for the Acquisition of Capital Assets, DOE Order 413.3; the Project Execution and Engineering Management Planning Guide, GPG-FM-010; and other applicable Good Practice Guides; and the FY 2001 Integrated Planning, Accountability, and Budgeting System Policy Guidance. The plan also reflects the milestone philosophies of the Federal Facility Agreement and Consent Order, as agreed to by the State of Nevada, the DOE, and the U.S. Department of Defense; and traditional project management philosophies such as the development of life-cycle costs, schedules, and work scope; identification o f roles and responsibilities; and baseline management and controls.

IT Corporation, Las Vegas

2002-08-01T23:59:59.000Z

79

SHUG Executive Committee | ORNL Neutron Sciences Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Committee Executive Committee SHUG Executive Committee Members Tyrel McQueen Tyrel McQueen mcqueen@jhu.edu Term expires December 2014 Chair: Tyrel McQueen Assistant Professor of Chemistry Johns Hopkins University Research interests: New solid state chemistry materials design and synthesis techniques; experimental condensed matter physics, quantum magnetism, heat- and light-induced charge separation through strong electron correlations; superconductivity. Greg Beaucage Greg Beaucage beaucag@uc.edu Term expires December 2014 Past Chair: Greg Beaucage University of Cincinnati Research interests: Soft condensed matter and polymers, especially quantification of molecular topology using SANS, in the hierarchical structure of ceramic and metallic aggregates, and in the study of protein

80

PIA - Savannah River Operations Office Executive Commitment Action...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PIA - Savannah River Operations Office Executive Commitment Action Tracking System PIA - Savannah River Operations Office Executive Commitment Action Tracking System PIA - Savannah...

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Executive Order 13148-Greening the Government Through Leadership...  

NLE Websites -- All DOE Office Websites (Extended Search)

You are here Home Executive Order 13148-Greening the Government Through Leadership in Environmental Management Executive Order 13148-Greening the Government Through Leadership...

82

Executive nformation Sysytems (EIS) 1 - U.S. Energy ...  

U.S. Energy Information Administration (EIA)

... Characteristics of an EIS Tailored to executive’s information needs Reports Analysis and graphics “Drill-down” process Easy to use ... Safety and Health ...

83

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

84

Clean Development Mechanism Executive Board CDM EB | Open Energy...  

Open Energy Info (EERE)

Mechanism Executive Board CDM EB Jump to: navigation, search Name Clean Development Mechanism Executive Board (CDM EB) Place Bonn, Germany Zip D-53175 Product The CDM EB supervises...

85

President Issues Executive Order Aimed at Preparing for the Impacts...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force President Issues Executive Order Aimed at Preparing for...

86

FAPAC-NM Executive Board | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Executive Board FAPAC-NM Executive Board "Promoting Equal Opportunity and Cultural Diversity for APAs in Government" Ligaya White Chairperson Administrative Support Assistant...

87

Executive Order -- Preparing the United States for the Impacts...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order -- Preparing the United States for the Impacts of Climate Change Executive Order -- Preparing the United States for the Impacts of Climate Change...

88

Department of Energy and Commercial Real Estate Executives Launch...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Energy and Commercial Real Estate Executives Launch Alliance to Reduce Energy Consumption of Buildings Department of Energy and Commercial Real Estate Executives Launch Alliance...

89

American Indian Policy and Relevant DOE and Executive Orders...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tribal Programs American Indian Policy and Relevant DOE and Executive Orders American Indian Policy and Relevant DOE and Executive Orders Waste Management Nuclear Materials &...

90

Project Execution Plan Review Module (RM)  

Energy.gov (U.S. Department of Energy (DOE))

The Project Execution Plan (PEP) Review Module (RM) is a tool that assists DOE federal project review teams in evaluating the adequacy of the PEP development and maintenance for projects of any...

91

Senior Executive Fellows | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Overview: The Senior Executive Fellows program is designed for upper-level Overview: The Senior Executive Fellows program is designed for upper-level managers. The curriculum incorporates the executive core qualifications (ECQs) for SES and it is the program of choice for participants in SES Candidate Development Programs and other professionals looking to strengthen skills in problem solving, strategic analysis, persuasion and negotiation. Target Audience: The program focuses on skills associated with the Office of Personnel Management's (OPM) executive core qualifications (ECQs) and is designed for federal government employees at the GS-14/GS-15 levels. Program Cost: Is $19,800 and includes tuition, housing, curricular materials, and most meals. Program Session(s) and Application Deadline(s): Session Date: February 9, 2014 - March 7, 2014, Application

92

Generating and executing programs for a floating point single instruction multiple data instruction set architecture  

DOE Patents (OSTI)

Mechanisms for generating and executing programs for a floating point (FP) only single instruction multiple data (SIMD) instruction set architecture (ISA) are provided. A computer program product comprising a computer recordable medium having a computer readable program recorded thereon is provided. The computer readable program, when executed on a computing device, causes the computing device to receive one or more instructions and execute the one or more instructions using logic in an execution unit of the computing device. The logic implements a floating point (FP) only single instruction multiple data (SIMD) instruction set architecture (ISA), based on data stored in a vector register file of the computing device. The vector register file is configured to store both scalar and floating point values as vectors having a plurality of vector elements.

Gschwind, Michael K

2013-04-16T23:59:59.000Z

93

Probabilistic Risk Assessment - Insights for Executives  

Science Conference Proceedings (OSTI)

This report describes the development and use of a new Probabilistic Risk Assessment (PRA) training resource, Probabilistic Risk Assessment – Insights for Executives.  It consists of a slide package with speaker notes, for use by EPRI members to expand understanding of PRA and its applications among executives and nuclear power plant leadership teams.BackgroundWhile many technical disciplines in the nuclear industry have gained acceptance and are ...

2013-07-31T23:59:59.000Z

94

Memorandum for Chief Acquisition Officers, Senior Procurement Executives  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 6, 2008 June 6, 2008 MEMORANDUM FOR CHIEF ACQUISITION OFFICERS SENIOR PROCUREMENT EXECUTIVES FROM: Paul A. Denett Administrator SUBJECT: Improving the Management and Use of Interagency Acquisitions Interagency acquisitions offer important benefits to federal agencies, including economies and efficiencies and the ability to leverage resources. The attached guidance is intended to help agencies achieve the greatest value possible from interagency acquisitions. Effective management and use of interagency acquisitions is a shared responsibility, especially for assisted acquisitions. Lack of clear lines of responsibility between agencies with requirements (requesting agencies) and the agencies which provide acquisition support and

95

Optimal portfolio liquidation with execution cost and risk  

E-Print Network (OSTI)

We study the optimal portfolio liquidation problem over a finite horizon in a limit order book with bid-ask spread and temporary market price impact penalizing speedy execution trades. We use a continuous-time modeling framework, but in contrast with previous related papers (see e.g. [24] and [25]), we do not assume continuous-time trading strategies. We consider instead real trading that occur in discrete-time, and this is formulated as an impulse control problem under a solvency constraint, including the lag variable tracking the time interval between trades. A first important result of our paper is to show that nearly optimal execution strategies in this context lead actually to a finite number of trading times, and this holds true without assuming ad hoc any fixed transaction fee. Next, we derive the dynamic programming quasi-variational inequality satisfied by the value function in the sense of constrained viscosity solutions. We also introduce a family of value functions converging to our value function...

Kharroubi, Idris

2009-01-01T23:59:59.000Z

96

VALUE STUDY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PREPARED FOR: DEPARTMENT OF ENERGY OFFICE OF CONTRACT RESOURCES AND RESOURCE MANAGEMENT SEPTEMBER 2008 UPDATE BY: AON CONSULTING INC. FEBRUARY 1999 UPDATED SEPTEMBER 29, 2008 VALUE STUDY DESK MANUAL Prepared for: DEPARTMENT OF ENERGY By: BUCK CONSULTANTS Under DE-AC01-96AD38107 Update Prepared for: DOE By: AON CONSULTING, INC. Under Delivery Order DE-BP01-08MA345678, Contract No. DE-AB01-08-ME11881 Contents PART I Overview of Value Study Illustrative Flow Charts...................................................................................................................................... 1 1. Purpose................................................................................................................................................... 4

97

DOE-LM Executable Plan Cover Page  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30.2B Executable Plan for LM 30.2B Executable Plan for LM (DOE FEMP Draft) Signature for Site Office Concurrence_______________________________ Digitally signed by Raymond M. Plieness DOE ORDER 430.2B EXECUTABLE PLAN TEAM GOAL SUMMARY Please mark the appropriate box below with an "X" Goal Elements Plan Meets Goal Plan Exceeds Goal Plan Falls Short of Goal Comments Energy Efficiency X LM currently falls short of the goal and shows an increase of energy usage per square foot; however, this is due to the removal of buildings, and plans are in place to ensure that the goal is met by 2015 (by reducing groundwater treatment). Renewable Energy X Water X Transportation/Fleet Management X High Performance and Sustainable Buildings X This page intentionally left blank Page i Contents 1.0

98

2009 Wind Technologies Market Report: Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

1 1 2009 Wind Technologies Market Report Executive Summary Primary authors Ryan Wiser, Lawrence Berkeley National Laboratory Mark Bolinger, Lawrence Berkeley National Laboratory With contributions from Galen Barbose, Naïm Darghouth, Ben Hoen, and Andrew Mills (Berkeley Lab) Kevin Porter and Sari Fink (Exeter Associates) Suzanne Tegen (National Renewable Energy Laboratory) This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report available at http://www.nrel.gov/docs/fy10osti/48666.pdf (PDF 3.1 MB) 2 2009 Wind Technologies Market Report Executive Summary Despite grim predictions at the close of 2008, the U.S. wind power industry experienced yet another record year in 2009, once again surpassing even optimistic growth projections from years past. At the

99

Senior Executive Fellows | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Senior Executive Fellows Senior Executive Fellows Senior Executive Fellows February 7, 2014 (All day) Application Deadline(s): February 7, 2014 and July 12, 2014 Application Process: Please forward your name, organizational name, and program interest date to the DOE Career Development Program Manager via email to; Johnny McChriston not later than February 7, 2014 for the April 13, 2014 program date, and July 12, 2014 for the October 12, 2014 program date. Please go to the link below to complete an application. In addition, please be advised that early submission of your application are encouraged because the program is often filled to capacity. SEF Application Completed application packages should be emailed to the DOE program coordinator, Johnny McChriston or packages can be sent via FedEx, or UPS

100

Executive Leadership Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leadership Program Leadership Program Executive Leadership Program Program Overview: This program is based on the U.S. Office of Personnel Management's Leadership Effectiveness Framework (LEF), a model for effective leadership/managerial performance. The program helps participants acquire or enhance the LEF competencies needed to become a successful government leader and manager. Participants will complete the following activities: individual needs assessment; leadership development plans; leadership development team activities; developmental work assignment; shadowing assignment; executive interviews; management readings; and four residential training sessions. In order to complete all the components of the program, participants will be away from their position of record for a

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

How to Apply for Senior Executive positions | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

How to Apply for Senior Executive positions How to Apply for Senior Executive positions How to Apply for Senior Executive positions To apply vacancies for SENIOR EXECUTIVE SERVICE (SES) , SENIOR LEVEL (SL), SCIENTIFIC AND PROFESSIONAL (ST) positions within the Department of Energy please visit OPM's website: http://www.usajobs.gov. From this site, you may download announcements for vacancies of interest to you. SENIOR EXECUTIVE SERVICE (SES) The Guide to Senior Executive Service Qualifications provides detailed information about executive qualifications and tips for writing effective qualification statements. What Are Executive Core Qualifications (ECQs) The Executive Core Qualifications (ECQs) define the competencies needed to build a federal corporate culture that drives for results, serves customers, and builds successful teams and coalitions within and outside

102

A framework for adaptive execution in grids  

Science Conference Proceedings (OSTI)

Grids offer a dramatic increase in the number of available processing and storing resources that can be delivered to applications. However, efficient job submission and management continue being far from accessible to ordinary scientists and engineers ... Keywords: Globus, adaptive execution, grid technology, job migration

Eduardo Huedo; Ruben S. Montero; Ignacio M. Llorente

2004-06-01T23:59:59.000Z

103

Hawaii energy strategy: Executive summary, October 1995  

SciTech Connect

This is an executive summary to a report on the Hawaii Energy Strategy Program. The topics of the report include the a description of the program including an overview, objectives, policy statement and purpose and objectives; energy strategy policy development; energy strategy projects; current energy situation; modeling Hawaii`s energy future; energy forecasts; reducing energy demand; scenario assessment, and recommendations.

NONE

1995-10-01T23:59:59.000Z

104

Executive Education Program Freight Transportation and  

E-Print Network (OSTI)

Executive Education Program Freight Transportation and Logistics: Delivering Results in a Volatile Environment September 9 ­11, 2013 Northwestern University Transportation Center NonprofitOrganization U.S.Postage PAID NorthwesternUniversity TransportationCenter RobertR.McCormickSchool of

Bustamante, Fabián E.

105

SF STATE Extended Learning EXECUTIVE CERTIFICATE  

E-Print Network (OSTI)

Participants in the certificate program must have a four-year degree or equivalent work experience. AnySF STATE Extended Learning 2013/2014 EXECUTIVE CERTIFICATE in FINANCIAL PLANNING PROGRAM FREE as a webcast. For exact dates and times, visit www.cel.sfsu.edu/financial. · Learn about the program · Meet

106

The Structural Context of Executive Information Systems Adoption  

Science Conference Proceedings (OSTI)

While some firms are developing computer-based Executive Information Systems EIS to support key executives and managers, a large number of organizations are presently not using EIS. Our focus here is on structural factors associated with the adoption ...

Arun Rai; Arkalgud Ramaprasad; Deepinder S. Bajwa

1998-07-01T23:59:59.000Z

107

T-574: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

108

The Senior Executive Service (SES) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Resources » The Senior Executive Service Executive Resources » The Senior Executive Service (SES) The Senior Executive Service (SES) The Senior Executive Service (SES) is a corps of men and women who administer public programs at the highest levels of Federal Government utilizing well-honed executive skills and broad perspectives of government and public service. Positions are primarily managerial and supervisory and serve just below top Presidential appointees forming a vital link between these appointees and the rest of the Federal workforce. Members of the SES are selected according to their leadership qualifications based on criteria established by the Office of Personnel Management which manages the overall Federal executive personnel system. The SES was established by the Civil Service Reform Act (CSRA) of 1978 as a

109

Executive Fleet Vehicles DOE HQ 2011  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Motor Vehicle Management Report Motor Vehicle Management Report U.S. Department of Energy - HQ Pursuant to Federal Management Regulation 102-34.50 (41 CFR 102-34.50) November 14, 2011 Background: On May 24, 2011, the President issued a Presidential Memorandum on Federal Fleet Performance. In accordance with Section 1 (b) of the Presidential Memorandum and pursuant to Federal Management Regulation 102-34.50 (41 CFR 102-34.50), executive fleets are required to achieve maximum fuel efficiency; be limited in motor vehicle body size, engine size, and optional equipment to what is essential to meet agency mission; and be midsize or smaller sedans, except where larger sedans are essential to the agency mission. Within 180 days of the date of the Presidential Memorandum, any executive fleet vehicles that are larger than a midsize sedan or do not comply with alternative fueled

110

TRAN-STAR EXECUTIVE LIMOUSINE COMPANY  

NLE Websites -- All DOE Office Websites (Extended Search)

TRAN-STAR EXECUTIVE LIMOUSINE COMPANY TRAN-STAR EXECUTIVE LIMOUSINE COMPANY http://www.tranexec.com 20% off published rates for BNL Our reservation center is open 24 hours a day, 365 days a year, so you will always talk to a live agent who has direct contact with our chauffeurs. You can make reservations via phone, website or a simple e-mail to customerservice@tranexec.com once a profile has been established. Our advanced reservation system will track any flight and you can rest assured someone will always be there to meet the arriving passenger, no matter what time the flight arrives. http://www.tranexec.com/TranStarSalesBrochure.pdf These rates are inclusive rates, meaning they include gratuity, taxes....everything. They do not include parking or tolls

111

Executive Order 13007 Indian Sacred Sites (1996)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6771 6771 Federal Register / Vol. 61, No. 104 / Wednesday, May 29, 1996 / Presidential Documents Executive Order 13007 of May 24, 1996 Indian Sacred Sites By the authority vested in me as President by the Constitution and the laws of the United States, in furtherance of Federal treaties, and in order to protect and preserve Indian religious practices, it is hereby ordered: Section 1. Accommodation of Sacred Sites. (a) In managing Federal lands, each executive branch agency with statutory or administrative responsibility for the management of Federal lands shall, to the extent practicable, permitted by law, and not clearly inconsistent with essential agency functions, (1) accommodate access to and ceremonial use of Indian sacred sites by Indian religious practitioners and (2) avoid adversely affecting the physical integrity

112

Executive Order 13514 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

514 514 Executive Order 13514 October 8, 2013 - 1:41pm Addthis Executive Order (E.O.) 13514, Federal Leadership in Environmental, Energy, and Economic Performance, was signed on October 5, 2009. It expanded upon the energy reduction and environmental performance requirements of E.O. 13423. E.O. 13514 sets numerous Federal energy requirements the following. This summary is intended as a reference only. Refer to the full text of E.O. 13514 for more details relevant to your work. Accountability and Transparency E.O. 13514 accountability, transparency, and reporting requirements include: Within 30 days, Federal agency heads must designate a senior management official to serve as Senior Sustainability Officer accountable for agency conformance. The Senior Sustainability Officer designation must be reported

113

PROJECT MANGEMENT PLAN EXAMPLES Project Execution Example  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Execution Example Project Execution Example Example 73 6.3 Project Approach The overall schedule strategy for the PFP project includes ongoing minimum safe activities, combined with stabilization of materials followed by materials disposition, and subsequent transition of the PFP complex to a decommissioned state. The PFP material stabilization baseline was developed using a functionally-based work WBS. The WBS defines all activities required to take each material stream from their current location/conditions through stabilization (as required), and disposition the stabilized material as solid waste for shipment to WIPP or as product material for shipment to SRS. Initially, workshops were held with subject matter experts, project managers, schedulers, and support personnel (experts in the

114

Executive Order 12968 Access to Classified Information  

NLE Websites -- All DOE Office Websites (Extended Search)

40243 40243 Monday August 7, 1995 Part IV The President Executive Order 12968-Access to Classified Information Presidential Determination No. 95-32 of July 28, 1995 Presidential Determination No. 95-33 of July 31, 1995 Presidential Documents 40245 Federal Register Vol. 60, No. 151 Monday, August 7, 1995 Title 3- The President Executive Order 12968 of August 2, 1995 Access to Classified Information The national interest requires that certain information be maintained in confidence through a system of classification in order to protect our citizens, our democratic institutions, and our participation within the community of nations. The unauthorized disclosure of information classified in the national interest can cause irreparable damage to the national security and loss of human life.

115

Executive Potential Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Potential Program Potential Program Executive Potential Program Program Overview: This is a one year training program designed to help senior leaders understand and meet the challenges facing today's federal workforce. Through personal and professional development, The Executive Potential Program builds leadership capacity through strengthening the competencies needed to help today's leaders create a work environment prepared to meet changing agency initiatives. Nomination Due Date: Nomination Due Date: The nomination package must be received by the nomination deadline, which are as follows. (For EEP 2015-1 January 10, 2014 or until filled). (For EPP 2015-DC, April 8, 2014 or until filled) Please be advised that for the 2015-DC session only, there is a limit of 30 participants on a first come basis. Applicants are advised

116

Renewable Electricity Futures Study: Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Summary Executive Summary NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. Volume 2 PDF Volume 3 PDF Volume 1 PDF Volume 4 PDF Renewable Electricity Futures Study Edited By Hand, M.M. National Renewable Energy Laboratory Baldwin, S. U.S. Department of Energy DeMeo, E. Renewable Energy Consulting Services, Inc. Reilly, J.M. Massachusetts Institute of Technology Mai, T. National Renewable Energy Laboratory Arent, D. Joint Institute for Strategic Energy Analysis Porro, G. National Renewable Energy Laboratory Meshek, M. National Renewable Energy Laboratory Sandor, D. National Renewable Energy Laboratory Suggested Citations Renewable Electricity Futures Study (Entire Report)

117

Mr. William Mendoza Acting Executive Director  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

William Mendoza William Mendoza Acting Executive Director Department of Energy Washing!on, DC 20585 May4, 2011 White House Initiative on Tribal Colleges and Universities Department of Education 400 Maryland A venue, SW Washington, DC 20202 Dear Mr. Mendoza: Enclosed is the Department of Energy's (DOE) Fiscal Year (FY) 2010 Annual Performance Report on our activities to assist Tribal College and Universities (TCUs). DOE is submitting this information in accordance with Executive Order 13270. In FY 2010, DOE provided $275,000 in total expenditures for TCUs, an increase of $169,500 from the amount provided to TCU s in FY 2009. In an effort to raise the level of support in future years, DOE will continue to set funding goals and to identify opportunities for additional

118

SAMPLE MODEL AGREEMENT Â… NOT FOR EXECUTION  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MODEL AGREEMENT - NOT FOR EXECUTION MODEL AGREEMENT - NOT FOR EXECUTION 5/2/11 Template start-up option 1 of 8 OPTION AGREEMENT This option agreement (the "Agreement") is made by and is effective as of the date of last signature ("Effective Date") by Name of Contractor ("Abbreviated name of the Contractor" or "Lab"), which operates Name of National Laboratory at Address of the Lab (hereinafter "Abbreviated name of the Laboratory") under Contract No. ####### with the United States Department of Energy ("DOE") and Name of Company ("Abbreviated name of the Company" or "Company"), having a principal place of business at Address of the Company. 1. BACKGROUND 1.1. Lab owns certain U.S. patent properties related to describe the technology

119

Remote procedure execution software for distributed systems  

SciTech Connect

Remote Procedure Execution facilitates the construction of distributed software systems, spanning computers of various types. Programmers who use the RPX package specify subroutine calls which are to be executed on a remote computer. RPX is used to generate code for dummy routines which transmit input parameters and receive output parameters, as well as a main program which receives procedure call requests, calls the requested procedure, and returns the result. The package automatically performs datatype conversions and uses an appropriate connection oriented protocol. Supported operating systems/processors are VMS(VAX), UNIX(MIPS R2000, R3000) and Software Components Group's pSOS (680x0). Connection oriented protocols are supported over Ethernet (TCP/IP) and RS232 (a package of our own design). 2 refs., 2 figs.

Petravick, D.L.; Berman, E.F.; Sergey, G.P.

1989-05-01T23:59:59.000Z

120

Equivalence between executable OOZE and algebraic specification  

E-Print Network (OSTI)

In this paper two algorithms are presented: one which turns an executable OOZE specification into an algebraic specification and another which does the reverse operation. In this way, we shall be able to prove in a constructive way that executable OOZE and algebraic specification are equivalent and that, generally speaking, state-based specification is equivalent to to algebraic specification. We shall discuss whether these results can be made to cover other object-oriented Z dialects. 1 Introduction Formal methods are a constant subject of research within the field of Software Engineering. They have been being developed since the mid 70's, and are nowadays beginning to be applied in industry (see [Hal90]) and are expected to become a most favourable tool for saving the time and effort which is spent in the development of applications. This very same objective is shared by object-oriented programming. This new style of programming, which helps to reduce costs during the development pr...

Vicent-Ramon Palasi Lallana

1995-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Executive roundtable on coal-fired generation  

Science Conference Proceedings (OSTI)

Power Engineering magazine invited six industry executives from the coal-fired sector to discuss issues affecting current and future prospects of coal-fired generation. The executives are Tim Curran, head of Alstom Power for the USA and Senior Vice President and General Manager of Boilers North America; Ray Kowalik, President and General Manager of Burns and McDonnell Energy Group; Jeff Holmstead, head of Environmental Strategies for the Bracewell Giuliani law firm; Jim Mackey, Vice President, Fluor Power Group's Solid Fuel business line; Tom Shelby, President Kiewit Power Inc., and David Wilks, President of Energy Supply for Excel Energy Group. Steve Blankinship, the magazine's Associate Editor, was the moderator. 6 photos.

NONE

2009-09-15T23:59:59.000Z

122

Executive Order 13221 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

221 221 Executive Order 13221 October 8, 2013 - 1:48pm Addthis Executive Order (E.O.) 13221, Energy-Efficient Standby Power Devices, calls for Federal agencies to purchase products that use minimal standby power when possible. It was signed on August 2, 2001. Requirements for Energy Efficiency and Standby Power This section outlines major requirements defined by E.O. 13221. The content is intended as a reference only. You should refer to the text of E.O. 13221 for more details relevant to your work. Federal agencies must purchase products that use no more than one watt in standby power consuming mode when purchasing commercially-available, off-the-shelf products that use external standby power devices or that contain an internal standby power function. If such products are not available, agencies shall purchase products with

123

Executive Order 13423 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

423 423 Executive Order 13423 October 8, 2013 - 1:44pm Addthis Executive Order (E.O.) 13423, Strengthening Federal Environmental, Energy, and Transportation Management, was signed on January 24, 2007, to strengthen key goals for the Federal Government. It set more challenging goals than the Energy Policy Act of 2005 (EPAct 2005) and superseded E.O. 13123 and E.O. 13149. This summary below is intended as a reference only. You should refer to the full text of E.O. 13423 for more details relevant to your work. Implementing Instructions In consultation with the Director of the Office of Management and Budget, the Chairman of the Council on Environmental Quality issued instructions and defined requirements for implementing E.O. 13423. The implementation instructions identify the entities responsible for coordination and

124

TESLA Technical Design Report Executive Summary  

E-Print Network (OSTI)

TESLA Technical Design Report PART I Executive Summary March 2001 Editors: F.Richard, J.R.Schneider, D.Trines, A.Wagner #12;#12;Dedicated to the memory of Bjørn H. Wiik (1937-1999) #12;#12;TESLA ­ A Summary This report describes the scientific aims and potential as well as the technical de- sign of TESLA

125

Automated testing using executable formal specifications  

Science Conference Proceedings (OSTI)

A new method is presented for the automated random generation of valid content-sensitive test data and corresponding oracle information. The process takes as input a specification of the program under test, expressed as a functional program, and produces ... Keywords: automated program testing, automated random test data generation, automatic testing, computer aided software engineering, executable formal specifications, formal specification, functional program, oracle information, output test cases, program testing, valid content-sensitive test data, valid input space

N. Sanders

1996-01-01T23:59:59.000Z

126

Nanoparticle toxicity testing  

NLE Websites -- All DOE Office Websites (Extended Search)

Nanoparticle toxicity testing Nanoparticle toxicity testing 1663 Los Alamos science and technology magazine Latest Issue:November 2013 All Issues » submit Nanoparticle toxicity testing Assessing the potential health hazards of nanotechnology March 25, 2013 Robot In the search for more accurate and efficient techniques to evaluate the health hazards of nanoparticles, Los Alamos researchers are developing artificial human tissues and organs to replace animal test subjects. A new approach to toxicity testing under development at Los Alamos uses artificial tissue and artificial organs instead of animal testing Manufactured nanoparticles such as buckyballs and carbon nanotubes, used in products ranging from sunscreens to solar panels, are proliferating so quickly that safety testing for potential health hazards-similar to those

127

EIA - Annual Energy Outlook 2009 - Executive Summary  

Gasoline and Diesel Fuel Update (EIA)

Executive Summary Executive Summary Annual Energy Outlook 2009 with Projections to 2030 Executive Summary The past year has been a tumultuous one for world energy markets, with oil prices soaring through the first half of 2008 and diving in its second half. The downturn in the world economy has had a significant impact on energy demand, and the near-term future of energy markets is tied to the downturnÂ’s uncertain depth and persistence. The recovery of the worldÂ’s financial markets is especially important for the energy supply outlook, because the capital-intensive nature of most large energy projects makes access to financing a critical necessity. The projections in AEO2009 look beyond current economic and financial woes and focus on factors that drive U.S. energy markets in the longer term. Key issues highlighted in the AEO2009 include higher but uncertain world oil prices, growing concern about greenhouse gas (GHG) emissions and its impacts on energy investment decisions, the increasing use of renewable fuels, the increasing production of unconventional natural gas, the shift in the transportation fleet to more efficient vehicles, and improved efficiency in end-use appliances. Using a reference case and a broad range of sensitivity cases, AEO2009 illustrates these key energy market trends and explores important areas of uncertainty in the U.S. energy economy. The AEO2009 cases, which were developed before enactment of the American Recovery and Reinvestment Act of 2009 (ARRA2009) in February 2009, reflect laws and policies in effect as of November 2008.

128

NREL: Energy Executive Leadership Academy - Leadership Institute  

NLE Websites -- All DOE Office Websites (Extended Search)

Institute Institute Participants in NREL's Executive Energy Leadership Institute learn about renewable energy and energy efficiency from the experts through this accelerated training program typically conducted over a three-day period. Course content includes briefings by technology experts on renewable energy and energy efficiency technologies, market assessments, and analytical and financial tools, as well as associated technology tours. Tours of NREL research facilities are a key component of the Institute. All sessions originate and end at NREL's campus in Golden, Colorado. For additional details, including a customized Leadership Institute in your region, see the sample syllabus or contact Energy Execs. Qualified individuals are invited to apply for the upcoming 2014 Institute.

129

Energy study of Laundry Facilities, Fort Knox, Kentucky: Executive summary (revised). Executive summary  

SciTech Connect

This document is the Executive Summary of the Energy Survey of Laundry Facilities at Fort Knox, Kentucky. The purpose of this document is to briefly outline the existing and historical energy situation, summarize the methodology and results of the Energy Study, and present the specific energy conservation projects developed through the Energy Study.

1986-12-01T23:59:59.000Z

130

Trusted Computing Technologies, Intel Trusted Execution Technology.  

Science Conference Proceedings (OSTI)

We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

Guise, Max Joseph; Wendt, Jeremy Daniel

2011-01-01T23:59:59.000Z

131

Executive Order 13583, Establishing a Coordinated Government-Wide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order 13583, Establishing a Coordinated Government-Wide Executive Order 13583, Establishing a Coordinated Government-Wide Initiative to Promote Diversity and Inclusion in the Federal Workforce Executive Order 13583, Establishing a Coordinated Government-Wide Initiative to Promote Diversity and Inclusion in the Federal Workforce August 18, 2011 - 11:15am Addthis Executive Order 13583 Established a "coordinated government-wide initiative to promote diversity and inclusion in the federal workforce". Wherever possible, the Federal Government must also seek to consolidate compliance efforts established through related or overlapping statutory mandates, directions from Executive Orders, and regulatory requirements. Addthis Related Articles A Government-Wide Approach to a Diverse Workforce Executive Order 13583, Establishing a Coordinated Government-Wide Initiative to Promote Diversity and Inclusion in the Federal Workforce

132

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

613: Microsoft Excel Axis Properties Remote Code Execution 613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis PROBLEM: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fail to sufficiently validate user-supplied input. PLATFORM: Microsoft Excel (2002-2010) ABSTRACT: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service

133

FY 2006 Executive Order 13101 Report: Department of Energy Affirmative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FY 2006 Executive Order 13101 Report: Department of Energy FY 2006 Executive Order 13101 Report: Department of Energy Affirmative Procurement and Recycling Fiscal Year 2006 Report, 3/12/07 FY 2006 Executive Order 13101 Report: Department of Energy Affirmative Procurement and Recycling Fiscal Year 2006 Report, 3/12/07 The Department of Energy (DOE) is pleased to transmit the enclosed report in fulfillment of the annual reporting requirements under Executive Order 13101, Greening the Government through Waste Prevention, Recycling, and Federal Acquisition. The report was prepared in accordance with the survey instructions provided in your letter to Agency Environmental Executives and Senior Procurement Executives, dated November 2, 2006. DOE's report contains the specific purchasing data that you requested on the eight (8)

134

U-122 Google Chrome Two Code Execution Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Google Chrome Two Code Execution Vulnerabilities 2 Google Chrome Two Code Execution Vulnerabilities U-122 Google Chrome Two Code Execution Vulnerabilities March 12, 2012 - 7:00am Addthis PROBLEM: Google Chrome Two Code Execution Vulnerabilities PLATFORM: Google Chrome 17.x ABSTRACT: Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory SA48321 SecurityTracker Alert ID: 1026776 CVE-2011-3046 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger an unspecified flaw and execute arbitrary code (outside of the

135

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

136

On the behaviours produced by instruction sequences under execution  

E-Print Network (OSTI)

The behaviour produced by an instruction sequence under execution is a behaviour to be controlled by some execution environment: each step performed actuates the processing of an instruction by the execution environment and a reply returned at completion of the processing determines how the behaviour proceeds. The increasingly occurring case where the processing takes place remotely involves the generation of a stream of instructions to be processed and a remote execution unit that handles the processing of this stream of instructions. We use process algebra to describe the behaviours produced by instruction sequences under execution and to describe two protocols implementing these behaviours in the case of remote processing. We also show that all finite-state behaviours considered in process algebra can be produced by instruction sequences under execution.

Bergstra, J A

2011-01-01T23:59:59.000Z

137

The value of RFID in transportation : from greater operational efficiency to collaborative transportation management  

E-Print Network (OSTI)

This paper assesses the value of Radio Frequency Identification (RFID) in the transportation forecasting, planning, and execution processes for truckload (TL) and less than truckload (LTL) services. The results show that ...

Guitton, Antoine, 1963-

2004-01-01T23:59:59.000Z

138

Memorandum of Understanding on Environmental Justice and Executive Order 12898  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ON ON ENVIRONMENTAL JUSTICE AND EXECUTIVE ORDER 12898 WHEREAS, on February 11, 1994, the President signed Executive Order 12898, "Federal Actions to Address Environmental Justice in Minority Populations and Low-Income Populations" ("Executive Order 12898" or "Order"), and issued an accompanying Presidential Memorandum (references to this Order herein also generally include this Memorandum), and WHEREAS, Executive Order 12898 applies to the following agencies: the Department of Agriculture, Department of Commerce, Department of Defense, Department of Energy, Department of Health and Human Services, Department of Housing and Urban Development, Department of the Interior, Department of Justice, Department of Labor, Department of Transportation, and the Environmental

139

Executive Order 13148-Greening the Government Through Leadership in  

NLE Websites -- All DOE Office Websites (Extended Search)

48-Greening the Government Through Leadership 48-Greening the Government Through Leadership in Environmental Management Executive Order 13148-Greening the Government Through Leadership in Environmental Management The head of each Federal agency is responsible for ensuring that all necessary actions are taken to integrate environmental accountability into agency day-to-day decisionmaking and long-term planning processes, across all agency missions, activities, and functions. Executive Order 13148-Greening the Government Through Leadership in Environmental Management More Documents & Publications Executive Order 12969-Federal Acquisition and Community RightTo-Know Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000

140

TMS Executive Director Appointed to University of California ...  

Science Conference Proceedings (OSTI)

Sep 6, 2011 ... DISLOCATION: THE YOUNG LEADERS NEWSLETTER. 09/6 - TMS Executive Director Appointed to University of California Academic Advisory ...

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Microsoft Word - Executive Summary Rework v2.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Summary SECA Program Overview The U.S. Department of Energy (DOE) Office of Fossil Energy, through the National Energy Technology Laboratory (NETL) and in collaboration...

142

Baldrige 2020: an Executive's Guide to the Performance ...  

Science Conference Proceedings (OSTI)

... expectations to the emergence of new markets and global competition, it is ... today's executives with practical examples and keen insights on how ...

2012-09-17T23:59:59.000Z

143

Natural Gas 1998: Issues and Trends - Executive Summary  

U.S. Energy Information Administration (EIA)

Energy Information Administration / Natural Gas Monthly April 1999 vii The following article is the Executive Summary from the report Natural Gas ...

144

Engaging Non-IT Executives in IT Infrastructure Decisions  

E-Print Network (OSTI)

This case study describes how information technology (IT) managers from Insurance Co. successfully engaged non-IT executives in IT infrastructure investment decisions. This

Fonstad, Nils O.

2008-07-01T23:59:59.000Z

145

Executive Order 13031-Federal Alternative Fueled Vehicle Leadership...  

NLE Websites -- All DOE Office Websites (Extended Search)

in the use of alternative fueled vehicles (AFVs). Executive Order 13031-Federal Alternative Fueled Vehicle Leadership More Documents & Publications NATIONAL DEFENSE...

146

Optimal Execution Under Jump Models For Uncertain Price Impact  

E-Print Network (OSTI)

Aug 13, 2012 ... A major source of the execution cost comes from price impacts of both the investor's own trades and other concurrent institutional trades.

147

Executive Order 13514-Federal Leadership in Environmental, Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

514-Federal Leadership in Environmental, Energy, and Economic Performance Executive Order 13514-Federal Leadership in Environmental, Energy, and Economic Performance It is...

148

Prototyping Faithful Execution in a Java virtual machine.  

SciTech Connect

This report presents the implementation of a stateless scheme for Faithful Execution, the design for which is presented in a companion report, ''Principles of Faithful Execution in the Implementation of Trusted Objects'' (SAND 2003-2328). We added a simple cryptographic capability to an already simplified class loader and its associated Java Virtual Machine (JVM) to provide a byte-level implementation of Faithful Execution. The extended class loader and JVM we refer to collectively as the Sandia Faithfully Executing Java architecture (or JavaFE for short). This prototype is intended to enable exploration of more sophisticated techniques which we intend to implement in hardware.

Tarman, Thomas David; Campbell, Philip LaRoche; Pierson, Lyndon George

2003-09-01T23:59:59.000Z

149

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

System Multiple Vulnerabilities U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

150

The Health Benefits of Tackling Climate Change: An Executive...  

Open Energy Info (EERE)

The Health Benefits of Tackling Climate Change: An Executive Summary for The Lancet Series Jump to: navigation, search Tool Summary Name: The Health Benefits of Tackling Climate...

151

Adequacy report-executive summary. October 31, 2008 | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

summary. October 31, 2008 Adequacy report-executive summary. October 31, 2008 The electricity industry has gone through major changes in structure, shape, and form over the...

152

Approval of Contractor Executive Salaries by Department of Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

is responsible for oversight of the UCOR contract, including analyzing and performing market analyses to assess the reasonableness of the proposed contractor executive salaries....

153

Fiscal Year 2008 Annual Federal Performance Report On Executive...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Annual Federal Performance Report On Executive Agency Actions To Assist Historically Black Colleges And Universities Fiscal Year 2008 Annual Federal Performance Report On...

154

Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary  

DOE Green Energy (OSTI)

This executive summary provides an overview of an NREL assessment to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region around Greensburg, Kansas.

Haase, S.

2009-11-01T23:59:59.000Z

155

Training Program EOC-003 EOC Training for Executives COURSE SYLLABUS  

NLE Websites -- All DOE Office Websites (Extended Search)

3 EOC Training for Executives COURSE SYLLABUS Subject Category: Emergency Operations Schedule: Upon Request Course Length: 1 hour Medical Approval: None Delivery Method: Classroom...

156

Toxic Pollution Prevention Act (Illinois)  

Energy.gov (U.S. Department of Energy (DOE))

It is the purpose of this Act to reduce the disposal and release of toxic substances which may have adverse and serious health and environmental effects, to promote toxic pollution prevention as...

157

Federal Energy Management Program: Executive Order 13514  

NLE Websites -- All DOE Office Websites (Extended Search)

514 514 Executive Order (E.O.) 13514; Federal Leadership in Environmental, Energy, and Economic Performance; was signed on October 5, 2009. It expanded upon the energy reduction and environmental performance requirements of E.O. 13423. E.O. 13514 sets numerous Federal energy requirements in several areas, including: Accountability and Transparency Strategic Sustainability Performance Planning Greenhouse Gas Management Sustainable Buildings and Communities Water Efficiency Electronic Products and Services Fleet and Transportation Management Pollution Prevention and Waste Reduction The summary below is intended as a reference only. Refer to the full text of E.O. 13514 for more details relevant to your work. Accountability and Transparency E.O. 13514 accountability, transparency, and reporting requirements include:

158

Microsoft Word - Executive Summary.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar PEIS ES-1 December 2010 Solar PEIS ES-1 December 2010 EXECUTIVE SUMMARY 1 2 3 ES.1 BACKGROUND 4 5 The U.S. Department of the Interior (DOI) Bureau of Land Management (BLM) and the 6 U.S. Department of Energy (DOE) are each considering taking actions to facilitate solar energy 7 development in compliance with various orders, mandates, and agency policies. For the BLM, 8 these actions include the evaluation of a new BLM Solar Energy Program applicable to utility- 9 scale solar energy development on BLM-administered lands in six southwestern states (Arizona, 10 California, Colorado, Nevada, New Mexico, and Utah). 1 For DOE, they include the evaluation 11 of developing new program guidance relevant to DOE-supported solar projects. 12 13 The BLM and DOE are working jointly as lead agencies to prepare this programmatic 14

159

Microsoft Word - Executive Summary.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Generation-IV Roadmap Generation-IV Roadmap Report of the Fuel Cycle Crosscut Group March 18, 2001 "This document has not been patent-cleared and has not received DOE approval for external release. Do not distribute beyond the Generation IV Roadmap Project Participants" FCCG Rpt Executive Sum FR03-00 18-Mar-2002 Page ii Generation-IV Roadmap Report of the Fuel Cycle Crosscut Group (FCCG) March 18, 2002 FCCG Membership Organization TWG Arden Bement Purdue Gas Cooled Doug Crawford ANL-W Evaluation Methodology Charles Forsberg* ORNL Non Classical Steve Herring INEEL Non Classical Bill Halsey LLNL Evaluation Methodology Dave Lewis ANL-E Non Classical Chuck Boardman GE Metal Cooled Per Peterson UC Berkeley Evaluation Methodology

160

A Hamilton-Jacobi-Bellman approach to optimal trade execution  

Science Conference Proceedings (OSTI)

The optimal trade execution problem is formulated in terms of a mean-variance tradeoff, as seen at the initial time. The mean-variance problem can be embedded in a linear-quadratic (LQ) optimal stochastic control problem. A semi-Lagrangian scheme is ... Keywords: HJB equation, Mean-variance tradeoff, Optimal execution, Semi-Lagrangian discretization, Viscosity solution

Peter A. Forsyth

2011-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Executive Order 13212 - Actions To Expedite Energy-Related Projects:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order 13212 - Actions To Expedite Energy-Related Executive Order 13212 - Actions To Expedite Energy-Related Projects: Federal Register Notice Volume 66, No. 99 - May 18, 2001 Executive Order 13212 - Actions To Expedite Energy-Related Projects: Federal Register Notice Volume 66, No. 99 - May 18, 2001 The increased production and transmission of energy in a safe and environmentally sound manner is essential to the well-being of the American people. In general, it is the policy of this Administration that executive departments and agencies (agencies) shall take appropriate actions, to the extent consistent with applicable law, to expedite projects that will increase the production, transmission, or conservation of energy. Executive Order 13212: 66 FR 28357 (22 May 2001) More Documents & Publications

162

African American Federal Executive Association, Inc. 9th Annual Training  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

African American Federal Executive Association, Inc. 9th Annual African American Federal Executive Association, Inc. 9th Annual Training Workshop African American Federal Executive Association, Inc. 9th Annual Training Workshop September 16, 2013 9:00AM EDT to September 17, 2013 5:00PM EDT Washington, DC The African American Federal Executive Association, Inc. (AAFEA) will hold its 9th Annual Training Workshop (TW) September 16-17, 2013 in Washington, DC. The theme of this year's TW is "LEADING CHANGE." This training is focused on the programs, policies, practices, and processes that promote career-enhancing opportunities and the core subjects critical for becoming a member of the Senior Executive Service (SES). This TW qualifies as training in compliance with 5 U.S.C. chapter 41, and is open to GS-13/14/15 Federal employees and SES members. It will provide

163

Executive Orders Defining Tribal Relationships | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Orders Defining Tribal Relationships Executive Orders Defining Tribal Relationships Executive Orders Defining Tribal Relationships Executive Order 13592 Improving American Indian and Alaska Native Educational Opportunities and Strengthening Tribal Colleges and Universities (2011). Superseded EO 13021 to ensure that all American Indian students, regardless of which institution they attend, receive support from the federal government at elementary through college levels. This EO also creates an Interagency Working Group on AI/AN Education to establish educational goals across the government. Executive Order 13096 American Indian and Alaska Education (1998). Directs federal agencies to improve the academic performance of American Indian and Alaska Native students via six goals: (1) improving reading and mathematics (2) increasing high school completion

164

DOE Announces New Executive Director of Loan Guarantee Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Director of Loan Guarantee Program Executive Director of Loan Guarantee Program DOE Announces New Executive Director of Loan Guarantee Program November 10, 2009 - 12:00am Addthis Washington D.C. --- Underscoring his commitment to strengthen and streamline the Department of Energy's operations, Secretary Steven Chu today named Jonathan Silver Executive Director of the Department's loan program office. In this role, Silver will oversee the Department's Loan Guarantee Program as well as the Advanced Technology Vehicles Manufacturing (ATVM) loan program. Silver will report directly to Secretary Chu, helping accelerate the application review process for both programs. As Executive Director, Silver will be responsible for staffing the programs and leading origination, analysis, and negotiation, as well as managing the full range of the

165

Office of Executive Resources (HC-40) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Resources (HC-40) Executive Resources (HC-40) Office of Executive Resources (HC-40) Mission and Function Statement This organization provides a full range of human capital management workforce services and support as well as policy guidance functions to senior level positions (SES, SL, and ST), excepted service positions (EJ, EK, and ARPA-E ET/ER) and political appointments for the Department. This includes: Providing operational and advisory executive services to Headquarters and field components, including political appointees and the immediate Office of the Secretary. Providing operational support to the Department's Executive Resources and Performance Review Boards. Administering the SES and SL/ST performance management systems and recognition and awards programs. Managing the SES Candidate Development Program.

166

EXECUTIVE OFFICE OF THE PRESIDENT O  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

M M A N A G E M E N T A N D B U D G E T W AS H I N G T O N , D . C . 2 0 5 0 3 O F F I C E O F F E D E R A L P R O C U R E M E N T P O L I C Y September 29, 2011 MEMORANDUM FOR CHIEF ACQUISTION OFFICERS SENIOR PROCUREMENT EXECUTIVES FROM: Daniel I. Gordon Administrator SUBJECT: Development, Review and Approval of Business Cases for Certain Interagency and Agency-Specific Acquisitions It is critical that the Federal Government, in its procurement activity, leverage its buying power to the maximum extent as well as achieve administrative efficiencies and cost savings. Too often, however, agencies establish new overlapping and duplicative contracts for supplies or services, because the agencies have not adequately considered the suitability of existing interagency contract vehicles: government-wide acquisition contracts (GWACs), multi-agency

167

Energy-Effectiveness of Pre-Execution and Energy-Aware P-Thread Selection  

Science Conference Proceedings (OSTI)

Pre-execution removes the microarchitectural latency of "problem" loads from a programýs critical path by redundantly executing copies of their computations in parallel with the main program. There have been several proposed pre-execution systems, ...

Vlad Petric; Amir Roth

2005-06-01T23:59:59.000Z

168

Executive Order 13423- Strengthening Federal Environmental, Energy, and  

NLE Websites -- All DOE Office Websites (Extended Search)

423- Strengthening Federal Environmental, 423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It is the policy of the United States that Federal agencies conduct their environmental, transportation, and energy-related activities under the law in support of their respective missions in an environmentally, economically and fiscally sound, integrated, continuously improving, efficient, and sustainable manner. Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management More Documents & Publications Executive Order 13514-Federal Leadership in Environmental, Energy, and Economic Performance EPAct 2005. Conference Report, July 27, 2005 In the Senate of the United States,June 28, 2005.

169

Executive Order 13175: Consultation and Coordination with Indian Tribal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

175: Consultation and Coordination with Indian 175: Consultation and Coordination with Indian Tribal Governments (2000) Executive Order 13175: Consultation and Coordination with Indian Tribal Governments (2000) Executive Order 13175: Consultation and Coordination with Indian Tribal Governments (2000). Establishes standards for regular and meaningful consultation with Tribal officials to strengthen the government-to-government relationships with Indian tribes, including establishment of fundamental principles, policymaking criteria, special requirements of legislative proposals, consultation, accountability principles, and increasing flexibility for Indian Tribal Waivers. EO 13175 supersedes EO 13084. Executive Order 13175: Consultation and Coordination with Indian Tribal Governments (2000) More Documents & Publications

170

U-095: HP Data Protector Media Operations Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code U-095: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code February 3, 2012 -...

171

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information...

172

Implementation of Executive Order 12114 Environmental Effects Abroad of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Implementation of Executive Order 12114 Environmental Effects Implementation of Executive Order 12114 Environmental Effects Abroad of Major Federal Actions: Final Guideline Implementation of Executive Order 12114 Environmental Effects Abroad of Major Federal Actions: Final Guideline The Department of Energy hereby adopts final Departmental guidelines implementing Executive Order 12114-Environmental Effecrs Abroad of Major Federal Actions, whic was issued on January 4, 1979. G-DOE-effects_abroad.pdf More Documents & Publications Environmental Effects Abroad of Major Federal Actions EO 12114: Environmental Effects Abroad of Major Federal Actions EIS-0386: Notice of Intent to Prepare a Programmatic Environmental Impact Statement, Amend Relevant Agency Land Use Plans, and Conduct Public Scoping Meetings, and Notice of Floodplain and Wetlands Involvement

173

Fiscal Year 2008 Annual Federal Performance Report On Executive Agency  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fiscal Year 2008 Annual Federal Performance Report On Executive Fiscal Year 2008 Annual Federal Performance Report On Executive Agency Actions To Assist Historically Black Colleges And Universities Fiscal Year 2008 Annual Federal Performance Report On Executive Agency Actions To Assist Historically Black Colleges And Universities Packet of information to the Secretary of Education Fiscal Year 2008 Annual Federal Performance Report On Executive Agency Actions To Assist Historically Black Colleges And Universities More Documents & Publications Minority Serving Institutions (MSIs): Bridging the Gap between Federal Agencies and MSIs Office of Energy Efficiency and Renewable Energy (EERE) -Historically Black Colleges and Universities 12 Annual Small Business Conference & Expo Minority Serving Institutions (MSIs)-Bridging the Gap Between Federal Agencies and MSIs

174

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

175

Multiple instances and symbolic variables in executable sequence charts  

Science Conference Proceedings (OSTI)

We extend live sequence charts (LSCs), a highly expressive variant of sequence diagrams, and provide the extension with an executable semantics. The extension involves support for instances that can bind to multiple objects and symbolic variables that ...

Rami Marelly; David Harel; Hillel Kugler

2002-11-01T23:59:59.000Z

176

The human thalamus is crucially involved in executive control operations  

Science Conference Proceedings (OSTI)

The processing of executive control is thought to involve cortical as well as thalamic brain areas. However, the questions of how thalamic structures contribute to the control of behavior and how cortical versus thalamic processing is coordinated remain ...

Frank Marzinzik; Michael Wahl; Gerd-Helge Schneider; Andreas Kupsch; Gabriel Curio; Fabian Klostermann

2008-10-01T23:59:59.000Z

177

National Electric Transmission Congestion Study 2006 Executive Summary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EXECUTIVE EXECUTIVE SUMMARY AUGUST 2006 U.S. Department of Energy NATIONAL ELECTRIC TRANSMISSION CONGESTION STUDY EXECUTIVE SUMMARY AUGUST 2006 U.S. Department of Energy Executive Summary Section 1221(a) of the Energy Policy Act of 2005 amended the Federal Power Act (FPA) by adding a new section 216 to that Act. FPA section 216(a) di- rected the Secretary of Energy to conduct a nation- wide study of electric transmission congestion 1 by August 8, 2006. Based upon the congestion study, comments thereon, and considerations that include economics, reliability, fuel diversity, national en- ergy policy, and national security, the Secretary may designate "any geographic area experiencing electric energy transmission capacity constraints or congestion that adversely affects customers as a na- tional interest electric transmission corridor." The national congestion study

178

Senior Executive Service Candidate Development Program | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Service Candidate Development Program Service Candidate Development Program Senior Executive Service Candidate Development Program The Office of Learning and Workforce Development coordinates applications for all DOE Federal Employees. Overview The Department of Energy's (DOE) Senior Executive Service (SES) Candidate Development Program (SESCDP) is a critical component of the Department's succession planning strategy for executives. We currently project approximately from 25 to 50 Senior Executive vacancies every year over the next several years. DOE's SESCDP is intended to produce a cadre of SES-ready federal employees capable of being placed non-competitively into SES vacancies. Although successful completion of the SESCDP does not guarantee placement into an SES position, it does result in

179

Department of Energy and Commercial Real Estate Executives Launch Alliance  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Commercial Real Estate Executives Launch and Commercial Real Estate Executives Launch Alliance to Reduce Energy Consumption of Buildings Department of Energy and Commercial Real Estate Executives Launch Alliance to Reduce Energy Consumption of Buildings April 9, 2009 - 12:00am Addthis WASHINGTON, D.C. - Top executives from 19 commercial real estate companies met with U.S. Department of Energy (DOE) officials in New York City today to discuss plans to dramatically reduce the sector's energy consumption and greenhouse gas emissions. The meeting officially launched DOE's Commercial Real Estate Energy Alliance (CREEA), a partnership of commercial real estate owners and operators who have volunteered to work together with DOE to make lasting change in the energy consumption of commercial real estate buildings in the United States. Currently, commercial buildings

180

Implementation of Executive Order 12114 Environmental Effects Abroad of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Implementation of Executive Order 12114 Environmental Effects Implementation of Executive Order 12114 Environmental Effects Abroad of Major Federal Actions: Final Guideline Implementation of Executive Order 12114 Environmental Effects Abroad of Major Federal Actions: Final Guideline The Department of Energy hereby adopts final Departmental guidelines implementing Executive Order 12114-Environmental Effecrs Abroad of Major Federal Actions, whic was issued on January 4, 1979. G-DOE-effects_abroad.pdf More Documents & Publications Environmental Effects Abroad of Major Federal Actions EIS-0386: Notice of Intent to Prepare a Programmatic Environmental Impact Statement, Amend Relevant Agency Land Use Plans, and Conduct Public Scoping Meetings, and Notice of Floodplain and Wetlands Involvement EIS-0481: Notice of Intent to Prepare a Programmatic Environmental Impact

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Executive Order 13212: 66 FR 28357 (22 May 2001)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order 13212: 66 FR 28357 (22 May 2001) Executive Order 13212: 66 FR 28357 (22 May 2001) Executive Order 13212--Actions To Expedite Energy-Related Projects May 18, 2001 By the authority vested in me as President by the Constitution and the laws of the United States of America, and in order to take additional steps to expedite the increased supply and availability of energy to our Nation, it is hereby ordered as follows: Section 1. Policy. The increased production and transmission of energy in a safe and environmentally sound manner is essential to the well-being of the American people. In general, it is the policy of this Administration that executive departments and agencies (agencies) shall take appropriate actions, to the extent consistent with applicable law, to expedite projects that will increase the

182

Understanding senior executives' use of information technology and the internet  

Science Conference Proceedings (OSTI)

The Internet and information technology (IT) have received considerable attention from senior executives, yet they still have not committed themselves fully to these technologies. Consequently, they are not reaping the full benefits. Recent studies investigated ...

Guus G. M. Pijpers

2002-01-01T23:59:59.000Z

183

Executive Order 13547-Stewardship of the Ocean, Our Coasts, and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

47-Stewardship of the Ocean, Our Coasts, and the Great Lakes Executive Order 13547-Stewardship of the Ocean, Our Coasts, and the Great Lakes This order establishes a national...

184

CARB Executive Order Exemption Process for a Hydrogen-fueled...  

NLE Websites -- All DOE Office Websites (Extended Search)

A Roush Correspondence with CARB 7 Appendix A Roush Correspondence with CARB 8 9 10 11 12 13 14 15 16 17 18 19 20 Appendix B CARB Executive Order A-006-1340 21 Appendix B CARB...

185

Fast detection of communication patterns in distributed executions  

Science Conference Proceedings (OSTI)

Understanding distributed applications is a tedious and difficult task. Visualizations based on process-time diagrams are often used to obtain a better understanding of the execution of the application. The visualization tool we use is Poet, an event ...

Thomas Kunz; Michiel F. H. Seuren

1997-11-01T23:59:59.000Z

186

Management of executable schema mappings for XML data exchange  

Science Conference Proceedings (OSTI)

Executable schema mappings between XML schemas are essential to support numerous data management tasks such as data exchange, data integration and schema evolution. The novelty of this paper consists in a method for automatic generation of automappings ...

Tadeusz Pankowski

2006-03-01T23:59:59.000Z

187

Intuitive Interaction with Encrypted Query Execution in DataStorm  

Science Conference Proceedings (OSTI)

The encrypted execution of database queries promises powerful security protections, however users are currently unlikely to benefit without significant expertise. In this demonstration, we illustrate a simple workflow enabling users to design secure ...

Ken Smith; Ameet Kini; William Wang; Chris Wolf; M. David Allen; Andrew Sillers

2012-04-01T23:59:59.000Z

188

Microsoft PowerPoint - Executive Order13423rbl | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft PowerPoint - Executive Order13423rbl More Documents & Publications Microsoft PowerPoint - DonsSlides121307 OPAM Policy Acquisition Guides AttachmentFlash2010-39.pdf...

189

Checkpoint repair for out-of-order execution machines  

Science Conference Proceedings (OSTI)

Out-of-order execution and branch prediction are two mechanisms that can be used profitably in the design of Supercomputers to increase performance. Unfortunately this means there must be some kind of repair mechanism, since situations do occur that ...

W. W. Hwu; Y. N. Patt

1987-06-01T23:59:59.000Z

190

Robust, goal-directed plan execution with bounded risk  

E-Print Network (OSTI)

There is an increasing need for robust optimal plan execution for multi-agent systems in uncertain environments, while guaranteeing an acceptable probability of success. For example, a fleet of unmanned aerial vehicles ...

Ono, Masahiro, Ph. D. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

191

Implementing temporal logics: tools for execution and proof  

Science Conference Proceedings (OSTI)

In this article I will present an overview of a selection of tools for execution and proof based on temporal logic, and outline both the general techniques used and problems encountered in implementing them. This selection is quite subjective, mainly ...

Michael Fisher

2005-06-01T23:59:59.000Z

192

African American Federal Executive Association, Inc. 9th Annual...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DC The African American Federal Executive Association, Inc. (AAFEA) will hold its 9th Annual Training Workshop (TW) September 16-17, 2013 in Washington, DC. The theme of this...

193

Valuing Mutual Fund Companies  

E-Print Network (OSTI)

Valuing Mutual Fund Companies 1 Jacob Boudoukh a , Matthew1a Valuing Mutual Fund Companies ABSTRACT Combining insightsdata from the Investment Company Institute. Given the size

Boudoukh, Jacob; Richardson, Matthew; Stanton, Richard; Whitelaw, Robert F.

2004-01-01T23:59:59.000Z

194

The toxicity of X material  

SciTech Connect

This report addresses toxicity (largely chemical) of Manhattan Project materials from the point of worker protection. Known chemical toxicities of X material (uranium), nitrous fumes, fluorine, vanadium, magnesium, and lime are described followed by safe exposure levels, symptoms of exposure, and treatment recommendations. The report closes with an overview of general policy in a question and answer format.

Ferry, J.L.

1943-12-31T23:59:59.000Z

195

SUMMARY OF AIR TOXICS -. EMISSIONS TESTING AT SIXTEEN UTILITY POWER PLANTS  

NLE Websites -- All DOE Office Websites (Extended Search)

AIR TOXICS AIR TOXICS -. EMISSIONS TESTING AT SIXTEEN UTILITY POWER PLANTS Prepared for U.S. Department of Energy Pittsburgh Energy Technology Center Prepared Under Burns and Roe Services Corporation Contract No. DE-AC22-94PC92100 .Subtask 44.02 July 1996 SUMMARY OF AIR TOXICS EMISSIONS TESTING AT SIXTEEN . . UTILITY POWER PLANTS Prepared for U.S. Department of Energy Pittsburgh Energy Technology Center . Prepared by Adrian Radziwon and Edward Winter Burns and Roe Services Corporation Terence J. McManus, Oak Ridge Associated Universities July 1996 TABLE OF CONTERlW SECTION 1.0 INTRODUCTION ................... 1 Background . : .................. 1 Objectives .................... 1 Report Structure ................. 3 Uncertainties ................... 3 SECTION 2.0 EXECUTIVE SUMMARY ................. 7

196

ROLE OF TOXICITY ASSESSMENT AND MONITORING IN MANAGING THE RECOVERY OF A WASTEWATER RECEIVING STREAM  

Science Conference Proceedings (OSTI)

We evaluate the roles of a long-term comprehensive toxicity assessment and monitoring program in management and for ecological recovery of a freshwater receiving stream impacted by industrial discharges and legacy contamination. National Pollution Discharge Elimination Permit (NPDES)-driven whole effluent toxicity (WET) tests using Ceriodaphnia and fathead minnows were conducted for more than twenty years to characterize wastewaters at the US National Nuclear Security Agency s Y-12 National Security Complex in Oak Ridge, Tennessee. Ambient toxicity tests also were conducted to assess water samples from EFPC, the stream receiving the wastewater discharges. The ambient tests were conducted as part of an extensive biological monitoring program that included routine surveys of fish, invertebrate and periphyton communities. WET testing, associated toxicant identification evaluations (TIEs), and ambient toxicity monitoring were instrumental in identifying toxicants and their sources at the Y-12 Complex, guiding modifications to wastewater treatment procedures, and assessing the success of various pollution-abatement actions. Through time, as requirements changed and water quality improved, the toxicity monitoring program became more focused. Ambient testing with Ceriodaphnia and fathead minnow larvae also was supplemented with less-standardized but more-sensitive alternative laboratory and in situ bioassays. The Y-12 Complex biological monitoring experience demonstrates the significant roles effluent and ambient toxicity testing can have in controlling and managing toxic discharges to receiving waters. It also emphasizes the value of supplementing WET and standardized ambient toxicity tests with alternative laboratory and in situ toxicity tests tailored to address specific problems.

Greeley Jr, Mark Stephen [ORNL; Kszos, Lynn A [ORNL; Stewart, Arthur J [ORNL; Smith, John G [ORNL

2011-01-01T23:59:59.000Z

197

California Environmental Protection Agency Department of Toxic...  

Open Energy Info (EERE)

Department of Toxic Substances Control Jump to: navigation, search Name California Environmental Protection Agency Department of Toxic Substances Control Place Sacramento,...

198

Networking Value Center  

Science Conference Proceedings (OSTI)

Identifies opportunities and structures that foster networking amongst participants for the purpose of building value into the experience. Networking Value Center AOCS History and Governance about us aocs committees contact us division council fat

199

The Value Analysis Process  

Science Conference Proceedings (OSTI)

...T.C. Fowler, Value Analysis in Materials Selection and Design, Materials Selection and Design, Vol 20, ASM Handbook,

200

Complex values in Smalltalk  

Science Conference Proceedings (OSTI)

Distinguishing between stateful objects and Values has long been recognized as fruitful. Values are universal context free abstractions that prevent side-effects and allow for a functional programming style. Though object-oriented programming languages ... Keywords: Smalltalk, functional programming, refactoring, serialization, testability, value objects

Thomas J. Schrader; Christian Haider

2009-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Canadian Council of Chief Executives | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Canadian Council of Chief Executives Canadian Council of Chief Executives Canadian Council of Chief Executives September 12, 2005 - 10:18am Addthis Remarks Prepared for Energy Secretary Samuel Bodman I am pleased to participate in today's forum with such an impressive group of representatives from the Canadian business sector. My earlier career in business, and my service in two other Cabinet Agencies, have given me a special appreciation for the unique, historic relationship that has always existed between our two nations, which is the subject I wish to speak about today. Canada and the U.S. are neighbors, of course. But our relationship, our partnership, goes much deeper than that. As President Bush said during his trip to Canada in December, the U.S. and Canada have "always agreed on the great principles of liberty derived from

202

President Bush Issues Executive Order Designating ITER International Fusion  

NLE Websites -- All DOE Office Websites (Extended Search)

President President Bush Issues Executive Order Designating ITER International Fusion Energy Organization A Public Interest Organization News Featured Articles Science Headlines 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 Presentations & Testimony News Archives Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 11.19.07 President Bush Issues Executive Order Designating ITER International Fusion Energy Organization A Public Interest Organization Print Text Size: A A A Subscribe FeedbackShare Page November 19, 2007 The White House today announced that President Bush has issued an Executive Order designating the ITER International Fusion Energy Organization as a public international organization. For the purposes of the International

203

American Indian Policy and Relevant DOE and Executive Orders | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tribal Programs » Tribal Programs » American Indian Policy and Relevant DOE and Executive Orders American Indian Policy and Relevant DOE and Executive Orders Over the course of American history, the Federal government's relationship with Indian Tribes has been defined and modified by treaties, executive orders, court decisions, specific legislation passed by Congress, and regulations. Important rights were guaranteed to Tribes by treaty, with many of these rights still enforceable today. Case law, over the years, has dealt with the status of Indian Tribes and their special relationship to the Federal government. Legislation, passed by Congress reflects the national Indian policy at the time of enactment. Current Federal Indian policy recognizes that Indian Tribes are an integral

204

Executive Order 13175-Consultation and Coordination With Indian Tribal  

NLE Websites -- All DOE Office Websites (Extended Search)

75-Consultation and Coordination With Indian 75-Consultation and Coordination With Indian Tribal Governments Executive Order 13175-Consultation and Coordination With Indian Tribal Governments By the authority vested in me as President by the Constitution and the laws of the United States of America, and in order to establish regular and meaningful consultation and collaboration with tribal officials in the development of Federal policies that have tribal implications, to strengthen the United States government-to-government relationships with Indian tribes, and to reduce the imposition of unfunded mandates upon Indian tribes; it is hereby ordered as follows: Executive Order 13175-Consultation and Coordination With Indian Tribal Governments More Documents & Publications Executive Order 13175: Consultation and Coordination with Indian Tribal

205

VOLTTRON: An Agent Execution Platform for the Electric Power System  

Science Conference Proceedings (OSTI)

Volttron is an agent execution platform that is engineered for use in the electric power system. Volttron provides resource guarantees for agents and the platform including memory and processor utilization; authentication and authorization services; directory services for agent and resource location; and agent mobility. Unlike most other agent platforms, Volttron does not depend on a single agent authoring language. Instead, we chose to design and implement Volttron as a platform service and framework that is decoupled from the agent execution environment. A prototype implementation of Volttron has been written in Python (using Python v2.7.2) and we have executed agents written in Python and Java and as shell scripts. The intended use of Volttron is in the power distribution system for managing distributed generation, demand-response, and plug-in electric vehicles.

Akyol, Bora A.; Haack, Jereme N.; Ciraci, Selim; Carpenter, Brandon J.; Vlachopoulou, Maria; Tews, Cody W.

2012-06-05T23:59:59.000Z

206

Energy End-Use Intensities in Commercial Buildings 1989 -- Executive  

U.S. Energy Information Administration (EIA) Indexed Site

9 Energy End-Use Intensities > Executive Summary 9 Energy End-Use Intensities > Executive Summary Executive Summary Energy End Uses Ranked by Energy Consumption, 1989 Energy End Uses Ranked by Energy Consumption, 1989 Source: Energy Information Administration, Office of Energy Markets and End Use, Forms EIA-871A through F of the 1989 Commercial Buildings Energy Consumption Survey. divider line The demand for energy in U.S. stores, offices, schools, hospitals, and other commercial buildings has been increasing. This report examines energy intensities in commercial buildings for nine end uses: space heating, cooling, ventilation, lighting, water heating, cooking, refrigeration, office equipment, and "other." The objective of this analysis was to increase understanding of how energy is used in commercial buildings and to identify targets for greater energy efficiency which could moderate future growth in demand.

207

Begin execution of implementation plans | Open Energy Information  

Open Energy Info (EERE)

Begin execution of implementation plans Begin execution of implementation plans Jump to: navigation, search Stage 5 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

208

Lucas Group Executive Search, Renewable Energy | Open Energy Information  

Open Energy Info (EERE)

Executive Search, Renewable Energy Executive Search, Renewable Energy Jump to: navigation, search Name Lucas Group Executive Search, Renewable Energy Address 230 West Monroe Place Chicago, Illinois Zip 60606 Sector Renewable energy, Solar, Wind energy Phone number 312 780 0601 Coordinates 41.880697°, -87.634909° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.880697,"lon":-87.634909,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

209

Executive Order 13270: Tribal Colleges and Universities (2002) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

270: Tribal Colleges and Universities (2002) 270: Tribal Colleges and Universities (2002) Executive Order 13270: Tribal Colleges and Universities (2002) Executive Order 13270: Tribal Colleges and Universities (2002). Ensures that Tribal colleges and universities receive support from the Federal government to assist these schools in providing high-quality educational opportunities for their students. This EO establishes the President's Board on Tribal Colleges and Universities (PBTCU), which includes representatives of tribal colleges. The PBTCU is assisted with its recommendations through consultation with the White House Initiative on Tribal Colleges and Universities, which is composed of an appointed official from each department and agency, as determined by the Secretary of the Department of Education.

210

Executive Order 13270: Tribal Colleges and Universities (2002) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

270: Tribal Colleges and Universities (2002) 270: Tribal Colleges and Universities (2002) Executive Order 13270: Tribal Colleges and Universities (2002) Executive Order 13270: Tribal Colleges and Universities (2002). Ensures that Tribal colleges and universities receive support from the Federal government to assist these schools in providing high-quality educational opportunities for their students. This EO establishes the President's Board on Tribal Colleges and Universities (PBTCU), which includes representatives of tribal colleges. The PBTCU is assisted with its recommendations through consultation with the White House Initiative on Tribal Colleges and Universities, which is composed of an appointed official from each department and agency, as determined by the Secretary of the Department of Education.

211

Executive Order 13592: Improving American Indian and Alaska Native  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

592: Improving American Indian and Alaska Native 592: Improving American Indian and Alaska Native Educational Opportunities and Strengthening Tribal Colleges and Universities (2011) Executive Order 13592: Improving American Indian and Alaska Native Educational Opportunities and Strengthening Tribal Colleges and Universities (2011) Superseded EO 13021 to ensure that all American Indian students, regardless of which institution they attend, receive support from the federal government at elementary through college levels. This EO also creates an Interagency Working Group on AI/AN Education to establish educational goals across the government. Executive Order 13592: Improving American Indian and Alaska Native Educational Opportunities and Strengthening Tribal Colleges and Universities (2011) More Documents & Publications

212

Extreme Value Techniques  

Science Conference Proceedings (OSTI)

... "Recent approaches to extreme value estimation with application to wind speeds. Part II: prediction of extreme winds." Proceedings of the First ...

213

Values-led business.  

E-Print Network (OSTI)

?? The issue that is dealt with in this paper is the concept of values-led business. The idea behind the term is that businesses has… (more)

Nyberg, Andreas; Borgh, Anders

2005-01-01T23:59:59.000Z

214

Predicting Execution Time of Computer Programs Using Sparse Polynomial Regression  

E-Print Network (OSTI)

large (servers, data centers, computational grids). At the heart of such systems are management longer to execute, but avoiding any transmission costs for the file; or moving the file from B the program as a black box and create a mapping func- tion between certain properties of input data (e

Yu, Bin

215

Predicting Execution Time of Computer Programs Using Sparse Polynomial Regression  

E-Print Network (OSTI)

large (servers, data centers, computational grids). At the heart of such systems are management, but avoiding any transmission costs for the file; or moving the file from B to A but potentially executing and create a mapping func- tion between certain properties of inpu

Maniatis, Petros

216

FWP executive summaries: Basic energy sciences materials sciences programs  

Science Conference Proceedings (OSTI)

This report provides an Executive Summary of the various elements of the Materials Sciences Program which is funded by the Division of Materials Sciences, Office of Basic Energy Sciences, U.S. Department of Energy at Sandia National Laboratories, New Mexico.

Samara, G.A.

1996-02-01T23:59:59.000Z

217

Semantic execution of subject-oriented process models  

Science Conference Proceedings (OSTI)

Workflow Management Systems (WFMS) are becoming increasingly important as tools to support people involved in the execution of business processes and to automate parts of it. As business processes involve several actors with varying backgrounds, workflow ... Keywords: business process management, structural design, subject-oriented BPM, user interface, workflow systems

Albert Fleischmann, Werner Schmidt, Christian Stary

2013-07-01T23:59:59.000Z

218

The execution of plans in an independent dynamic microworld  

Science Conference Proceedings (OSTI)

The problem of executing plans in an independent dynamic microworld is discussed. The microworld is a simulated city that not only contains permanent features (e.g. streets) but also transient features (e.g. other cars). A simulated taxi driver (ELMER) ...

Gordon MeCalla; Peter F. Schneider

1979-08-01T23:59:59.000Z

219

Moving target defense (MTD) in an adaptive execution environment  

Science Conference Proceedings (OSTI)

This paper describes how adaptation support facilitated by an execution environment can be used to implement moving target defenses (MTD). Reactive and proactive use of adaptation, although beneficial for cyber defense, comes with additional cost, and ... Keywords: cost, moving target defense, proactive and reactive adaptation

A. Paulos; P. Pal; R. Schantz; B. Benyo

2013-01-01T23:59:59.000Z

220

Superscalar Instruction Execution in the 21164 Alpha Microprocessor  

E-Print Network (OSTI)

The 21164 is a new quad-issue, superscalar Alpha microprocessor that executes 1.2 billion instructions per second. Available this January, the 3OO-MHz,0.5-pm CMOS chip delivers an estimated 345/505 SPECint92/SPECfp92 performance. The design's high clock rate, low operational latency, and high-throughput/nonblocking memory systems contribute to this performance.

John H. Edmondson; Paul Rubinfeld; Ronald Preston; Vidya Rajagopalan

1995-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Verifying executable object-oriented specifications with separation logic  

Science Conference Proceedings (OSTI)

Specifications of Object-Oriented programs conventionally employ Boolean expressions of the programming language for assertions. Programming errors can be discovered by checking at runtime whether an assertion, such as a precondition or class invariant, ... Keywords: contracts, executable assertions, object-orientation, separation logic, specification, verification

Stephan van Staden; Cristiano Calcagno; Bertrand Meyer

2010-06-01T23:59:59.000Z

222

Chief Executive Officer Message 2 Scientific Director Message 4  

E-Print Network (OSTI)

: Biomedical and Life Sciences Intelligent Transport Systems Safety and Security Environmental Management#12;#12; Chief Executive Officer Message 2 Scientific Director Message 4 About NICTA 7 Success Stories 8 Strategic Focus Projects 16 Research Programs 20 Research Projects 36 Our Researchers 60 Young

Heiser, Gernot

223

Risk-sensitive plan execution for connected sustainable home  

Science Conference Proceedings (OSTI)

This paper presents a risk-sensitive model-based plan executive, p-Sulu, as well as its application to energy-efficient room temperature control of a smart residential building called Connected Sustainable Home. p-Sulu minimizes the use of heating and ... Keywords: chance-constraint, flexible temporal constraint, smart building

Masahiro Ono; Wesley Graybill; Brian C. Williams

2012-11-01T23:59:59.000Z

224

Optimizing process creation and execution on multi-core architectures  

Science Conference Proceedings (OSTI)

The execution of a single process multiple data (SPMD) application involves running multiple instances of a process with possibly varying arguments. With the widespread adoption of massively multicore processors, there has been a focus towards harnessing ... Keywords: batched system calls, manycore runtime systems, process spawn optimization, scalable intra-node process launch, vector operating system interfaces

Abhishek Kulkarni, Latchesar Ionkov, Michael Lang, Andrew Lumsdaine

2013-05-01T23:59:59.000Z

225

Secure and privacy-preserving execution model for data services  

Science Conference Proceedings (OSTI)

Data services have almost become a standard way for data publishing and sharing on top of the Web. In this paper, we present a secure and privacy-preserving execution model for data services. Our model controls the information returned during service ... Keywords: RDF views, data services, privacy preservation

Mahmoud Barhamgi, Djamal Benslimane, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frederic Cuppens, Michael Mrissa, Hajer Taktak

2013-06-01T23:59:59.000Z

226

NERC ECONOMIC IMPACT BASELINE 2007-08 Executive Summary  

E-Print Network (OSTI)

1 NERC ECONOMIC IMPACT BASELINE 2007-08 Executive Summary The Natural Environment Research Council environmental markets. NERC provides timely forewarning of major environmental changes allowing the UK economy highly skilled people to the labour market · Improving the performance of existing businesses · Improving

Edinburgh, University of

227

Supporting efficient execution of MPI applications across multiple sites  

Science Conference Proceedings (OSTI)

One of the main goals of the CrossGrid Project [1] is to provide explicit support to parallel and interactive compute- and data- intensive applications. The CrossBroker job manager provides services as part of the CrossGrid middleware and allows execution ...

Enol Fernández; Elisa Heymann; Miquel Àngel Senar

2006-08-01T23:59:59.000Z

228

Nancy Rader, Executive Director California Wind Energy Association  

E-Print Network (OSTI)

Nancy Rader, Executive Director California Wind Energy Association Improving Methods for Estimating Fatality of Birds and Bats at Wind Energy Facilities California Wind Energy Association Public Webinar Wind Energy Development 2008 CEC Research "Roadmap" on Impact Assessment Methods 2008 CEC PIER RFP 2009

229

Visualising exemplary program values  

Science Conference Proceedings (OSTI)

We describe an idea of a tool to aid software developers, similar to tracing and software visualization. The tool monitors a running program and log some values of its variables. The exemplary values, chosen by the tool, are later displayed onto the ... Keywords: branches, tracing, variables, visualization

Marcin Stefaniak

2007-09-01T23:59:59.000Z

230

Adding executable context to executable architectures: shifting towards a knowledge-based validation paradigm for system-of-systems architectures  

Science Conference Proceedings (OSTI)

Validating system architectures and assessing the contribution and efficiency of the specified systems before a system is build is the objective supported by the research presented in this paper. The current state of the art of validation is limited ... Keywords: DEVS, DoDAF, executable architectures, modeling and simulation, validation

Johnny Garcia; Andreas Tolk

2010-07-01T23:59:59.000Z

231

VALUE STUDY | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Centers Field Sites Power Marketing Administration Other Agencies You are here Home VALUE STUDY VALUE STUDY VALUE STUDY More Documents & Publications VALUE STUDY...

232

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

233

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java...

234

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

235

Ordering and Executive Functioning as a Window on the Evolution and Development of Cognitive Systems  

E-Print Network (OSTI)

and Executive Functioning as a Window on the Evolution andand executive control as a window on the growth of cogni-behavior provides an important window on the control mecha-

McGonigle, Brendan; Chalmers, Margaret

2006-01-01T23:59:59.000Z

236

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

237

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am...

238

The Place Value Game  

NLE Websites -- All DOE Office Websites (Extended Search)

Place Value Game Place Value Game Welcome to the Place Value Game! The goal of the Place Value Game is to create the largest possible number from the digits the computer gives you. Unfortunately, the computer will give you each digit one at a time and you won't know what the next number will be. You are not allowed to rearrange any of the digits you have already placed, so think carefully before you lock a number in place! Good luck! You are allowed to select the: Number of Digits - The number of digits in the number you are building. Largest Digit - The largest number the computer is allowed to pick. (9 means that the computer can pick any number from 0 to 9) Number of Discards - The number of extra spaces you get. (2 means that you are allowed to throw away 2 numbers) A JavaScript enabled web browser (Netscape Navigator 4 or Internet Explorer

239

Content Value Center  

Science Conference Proceedings (OSTI)

Identifies and prioritizes emergent themes impacting AOCS members and other professionals involved with fats, oils and other bio-based sources. Content Value Center Governing Board annual aocs AOCS Governing Board fats history information materials oils

240

Technical Value Center  

Science Conference Proceedings (OSTI)

Identifies opportunities to increase awareness and utilization of AOCS Technical Services activities and products. Technical Value Center AOCS History and Governance about us aocs committees contact us division council fats governing board history

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Displaying Economic Value  

Science Conference Proceedings (OSTI)

The distinction between forecast quality and economic value in a cost–loss formulation is well known. Also well known is their complex relationship, even with some instances of a reversal between the two, where higher quality is associated with ...

Caren Marzban

2012-12-01T23:59:59.000Z

242

Photovoltaics Value Analysis  

DOE Green Energy (OSTI)

The goals of this report are to identify best practices in methodologies for estimating the value of distributed PV technologies, identify gaps in existing knowledge, and outline R&D opportunities.

Contreras, J.L.; Frantzis, L.; Blazewicz, S.; Pinault, D.; Sawyer, H.

2008-02-01T23:59:59.000Z

243

DOE O 135.1A, Budget Execution Funds Distribution and Control  

Directives, Delegations, and Requirements

The Order describes Department of Energy systems, requirements, and assignment of responsibilities for control of the Department budget execution process. ...

2006-01-09T23:59:59.000Z

244

National Electric Transmission Congestion Study 2009 Executive Summary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Executive Summary In the Energy Policy Act of 2005 (EPAct), Con- gress directed the U.S. Department of Energy (DOE) to conduct a study every three years on elec- tric transmission congestion and constraints within the Eastern and Western Interconnections. The American Reinvestment and Recovery Act of 2009 (Recovery Act) further directed the Secretary to in- clude in the 2009 Congestion Study an analysis of significant potential sources of renewable energy that are constrained by lack of adequate transmis- sion capacity. Based on this study, and comments concerning it from states and other stakeholders, the Secretary of Energy may designate any geographic area experiencing electric transmission capacity constraints or congestion as a national interest elec- tric transmission corridor (National Corridor). In August 2006, the Department published its first National Electric

245

Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5843 5843 November 2009 Assessment of Biomass Pelletization Options for Greensburg, Kansas Executive Summary S. Haase National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Operated by the Alliance for Sustainable Energy, LLC Contract No. DE-AC36-08-GO28308 Technical Report NREL/TP-7A2-45843 November 2009 Assessment of Biomass Pelletization Options for Greensburg, Kansas Executive Summary S. Haase Prepared under Task No. IDKS.1070 NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any

246

Stopping executions, saving computers with new malware detection tool  

NLE Websites -- All DOE Office Websites (Extended Search)

Saving computers with new malware detection tool Saving computers with new malware detection tool Stopping executions, saving computers with new malware detection tool A computer tool that allows the machine to identify malicious executable files without being exposed to their harmful actions. October 21, 2009 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials.

247

Memorandum for the Heads of Executive Departments and Agencies  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 7, 2009 October 7, 2009 M-10-02 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES FROM: Peter R. Orszag Director SUBJECT: Guidance on section 163 of the Continuing Resolution regarding the Association of Community Organizations for Reform Now (ACORN) This memorandum provides guidance to Executive Branch agencies regarding the implementation of section 163 of the Continuing Appropriations Resolution, 2010, Division B of Pub. L. No. 111-68 (CR), which states: SEC. 163. None of the funds made available by this joint resolution or any prior Act may be provided to the Association of Community Organizations for Reform Now (ACORN), or any of its affiliates, subsidiaries, or allied organizations. Your agency must immediately commence all necessary and appropriate steps to comply with

248

Executive Order 13045, Protection of Children from Environmental Health  

NLE Websites -- All DOE Office Websites (Extended Search)

45, Protection of Children from Environmental 45, Protection of Children from Environmental Health Risks and Safety Risks Executive Order 13045, Protection of Children from Environmental Health Risks and Safety Risks Each Federal agency: (a) shall make it a high priority to identify and assess environmental health risks and safety risks that may disproportionately affect children; and (b) shall ensure that its policies, programs, activities, and standards address disproportionate risks to children that result from environmental health risks or safety risks. Executive Order 13045, Protection of Children from Environmental Health Risks and Safety Risks More Documents & Publications EPA -- Addressing Children's Health through Reviews Conducted Pursuant to the National Environmental Policy Act and Section 309 of the Clean Air Act

249

Executive Order 12898: Federal Actions to Address Environmental Justice in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2898: Federal Actions to Address Environmental 2898: Federal Actions to Address Environmental Justice in Minority Populations and Low-Income Populations (1994) Executive Order 12898: Federal Actions to Address Environmental Justice in Minority Populations and Low-Income Populations (1994) Executive Order 12898: Federal Actions to Address Environmental Justice in Minority Populations and Low-Income Populations (1994). Directs each federal agency to make environmental justice part of its mission, and sets responsibilities for agencies including developing a strategy to identify and address "disproportionately high and adverse human health or environmental effects of its programs, policies, and activities on minority populations and low-income populations." This applies equally to Native American programs. This EO also directs "after consultation with tribal

250

Executive Order 13096: American Indian and Alaska Education (1998) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

96: American Indian and Alaska Education (1998) 96: American Indian and Alaska Education (1998) Executive Order 13096: American Indian and Alaska Education (1998) Executive Order 13096: American Indian and Alaska Education (1998). Affirms the Federal government's special and historic responsibility for the education of American Indian and Alaska native students. Directs federal agencies to improve the academic performance of American Indian and Alaska Native students via six goals: (1) improving reading and mathematics (2) increasing high school completion and postsecondary attendance rates (3) reducing the influence of long-standing factors that impede educational performance, such as poverty and substance abuse (4) creating strong, safe, and drug-free school environments (5) improving science education (6)

251

Executive Order 13007 Indian Sacred Sites (1996) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07 Indian Sacred Sites (1996) 07 Indian Sacred Sites (1996) Executive Order 13007 Indian Sacred Sites (1996) Executive Order 13007 Indian Sacred Sites (1996). Designed to protect and preserve Indian religious practices, this EO directs each federal agency that manages federal lands to "(1) accommodate access to and ceremonial use of Indian sacred sites by Indian religious practitioners and (2) avoid adversely affecting the physical integrity of such sacred sites." This EO also directs each federal agency to report to the President on "procedures implemented or proposed to facilitate with appropriate Indian tribes and religious leaders." Several EM sites and facilities are located on Tribal aboriginal and treaty lands. Staff at these facilities work with the Tribes to allow Tribal members safe access to DOE sites for

252

Archimedes: A system that plans and executes mechanical assemblies  

Science Conference Proceedings (OSTI)

Archimedes is a prototype mechanical assembly system which generates and executes robot assembly programs from a CAD model input. The system addresses the unrealized potential for flexibility in robotic mechanical assembly applications by automating the programming task. Input is a solid model of the finished assembly. Parts relationships and geometric constraints are deduced from the solid model. A rule-based planner generates a generic'' assembly plan that satisfies the geometric constraints, as well as other constraints embodied in the rules. A retargetable plan compiler converts the generic plan into code specific to an application environment. Execution of the compiled plan in a workcell containing an Adept Two robot, a vision system, and other parts handling equipment will be shown on videotape.

Strip, D.

1990-01-01T23:59:59.000Z

253

Executive Order 13096: American Indian and Alaska Education (1998) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

096: American Indian and Alaska Education (1998) 096: American Indian and Alaska Education (1998) Executive Order 13096: American Indian and Alaska Education (1998) Executive Order 13096: American Indian and Alaska Education (1998). Affirms the Federal government's special and historic responsibility for the education of American Indian and Alaska native students. Directs federal agencies to improve the academic performance of American Indian and Alaska Native students via six goals: (1) improving reading and mathematics (2) increasing high school completion and postsecondary attendance rates (3) reducing the influence of long-standing factors that impede educational performance, such as poverty and substance abuse (4) creating strong, safe, and drug-free school environments (5) improving science education (6)

254

Monitoring data dependencies in concurrent process execution through delta-enabled grid services  

Science Conference Proceedings (OSTI)

This paper presents our results with monitoring data dependencies among concurrently executing, distributed processes that execute over grid services. The research has been conducted in the context of the DeltaGrid project, focusing on the development ... Keywords: concurrent execution, data dependencies, data dependency monitoring, grid services, incremental data changes, service composition

Susan D. Urban; Yang Xiao; Luther Blake; Suzanne W. Dietrich

2009-03-01T23:59:59.000Z

255

1991 Manufacturing Consumption of Energy 1991 Executive Summary  

U.S. Energy Information Administration (EIA) Indexed Site

1991 Executive Summary 1991 Executive Summary 1991 Figure showing the Largest Energy Consumers in the Manufacturing Sector Executive Summary The Manufacturing Consumption of Energy 1991 report presents statistics about the energy consumption of the manufacturing sector, based on the 1991 Manufacturing Energy Consumption Survey (MECS). The MECS is the only comprehensive source of national-level data on U.S. manufacturing energy use. The 1991 MECS is the third in an ongoing series of surveys conducted at 3-year intervals beginning in 1985. Pursuant to a provision of the Energy Policy Act of 1992, the MECS will be conducted biennially beginning in 1994. The MECS surveys a nationally representative sample of manufacturing establishments by means of mailed questionnaires. The 1991 sample represented 98 percent of the U.S. manufacturing sector universe, which consists of all manufacturing establishments in the 50 States and the District of Columbia. Compared with the 1988 MECS, the designed sample size for 1991 was increased from 12,065 manufacturing establishments to 16,054 establishments.

256

Resilient Control System Execution Agent (ReCoSEA)  

Science Conference Proceedings (OSTI)

In an increasingly networked world, critical infrastructure systems suffer from two types of vulnerability. The first is the traditionally recognized problem of monitoring the systems for faults and failures, recognizing and analyzing data, and responding with real understanding to the problems of the system. Increasingly complex systems create the opportunity for single points of failure to cascade when inaccurate assessment of system health increases response time or leads to faulty analysis of the problems involved. A second problem involves vulnerability to cyber intrusion, in which bad actors can mask system deterioration or present false data about system status. A resilient system will protect stability, efficiency, and security. To ensure these three states, the system must react to changing conditions within the system with coordination: no one component of the system can be allowed to react to problems without real consideration of the effects of that action on other components within the system. Systems with multi-agent design typically have three layers of action, a management layer, a coordination layer, and an execution layer. A resilient multi-agent system will emphasize functions of the execution layer, which has the responsibility of initiating actions, monitoring, analyzing, and controlling its own processes, while feeding information back to the higher levels of management and coordination. The design concept of a resilient control system execution agent (ReCoSEA) grows out of these underpinnings, and through the use of computational intelligence techniques, this paper suggests an associated design methodology.

Craig G. Rieger; Kris Villez

2012-08-01T23:59:59.000Z

257

Lighting in Commercial Buildings (1986 data) -- Executive Summary  

U.S. Energy Information Administration (EIA) Indexed Site

6 Lighting in Commercial Buildings > Executive Summary 6 Lighting in Commercial Buildings > Executive Summary Executive Summary Lighting represents a substantial fraction of commercial electricity consumption. A wide range of initiatives in the Department of Energy's (DOE) National Energy Strategy have focused on commercial lighting as a potential source of energy conservation. This report provides a statistical profile of commercial lighting, to examine the potential for lighting energy conservation in commercial buildings. The principal conclusion from this analysis is that energy use for lighting could be reduced by as much as a factor of four using currently available technology. The analysis is based primarily on the Energy Information Administration's(EIA) 1986 Commercial Buildings Energy Consumption Survey (CBECS). The more recent 1989 survey had less detail on lighting, for budget reasons. While changes have occurred in the commercial building stock since 1986, the relationships identified by this analysis are expected to remain generally valid. In addition, the analytic approach developed here can be applied to the data that will be collected in the 1992 CBECS.

258

Commercial Buildings Energy Consumption and Expenditures 1992 - Executive  

U.S. Energy Information Administration (EIA) Indexed Site

& Expenditures > Executive Summary & Expenditures > Executive Summary 1992 Consumption & Expenditures Executive Summary Commercial Buildings Energy Consumption and Expenditures 1992 presents statistics about the amount of energy consumed in commercial buildings and the corresponding expenditures for that energy. These data are based on the 1992 Commercial Buildings Energy Consumption Survey (CBECS), a national energy survey of buildings in the commercial sector, conducted by the Energy Information Administration (EIA) of the U.S. Department of Energy. Figure ES1. Energy Consumption is Commercial Buidings by Energy Source, 1992 Energy Consumption: In 1992, the 4.8 million commercial buildings in the United States consumed 5.5 quadrillion Btu of electricity, natural gas, fuel oil, and district heat. Of those 5.5 quadrillion Btu, consumption of site electricity accounted for 2.6 quadrillion Btu, or 48.0 percent, and consumption of natural gas accounted for 2.2 quadrillion Btu, or 39.6 percent. Fuel oil consumption made up 0.3 quadrillion Btu, or 4.0 percent of the total, while consumption of district heat made up 0.4 quadrillion Btu, or 7.9 percent of energy consumption in that sector. When the energy losses that occur at the electricity generating plants are included, the overall energy consumed by commercial buildings increases to about 10.8 quadrillion Btu (Figure ES1).

259

Value Study Desk Manual  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PREPARED FOR: DEPARTMENT OF ENERGY Office of Contractor Human Resources Policy Division September 26, 2012 UPDATE VALUE STUDY DESK MANUAL Prepared for: DEPARTMENT OF ENERGY By: BUCK CONSULTANTS Under DE-AC01-96AD38107 Update Prepared for: DOE By: AON CONSULTING, INC. Under Delivery Order DE-BP01-08MA345678, Contract No. DE-AB01-08-ME11881 September 28, 2008 Update Prepared for: DOE By: Aon Hewitt Inc. Under Delivery Order DE-BP01-08MA345678, Contract No. DE-AB01-08-ME11881 September 26, 2012 Contents PART I Overview of Value Study Illustrative Flow Charts ..................................................................................... 1

260

On the Valuation of Warrants and Executive Stock Options: Pricing Formulae for Firms with Multiple Warrants/Executive Options  

E-Print Network (OSTI)

of the options or canceling an executive's existing options and granting him or her new options with a lower strike price, although not as frequent, are also in the agenda. Among others, Brenner, Sundaram, and Yermack (2000), Carter and Lynch (2001) examine... the “repricing” of ESOs and allocate it to poor firm-specific performance. The empirical evidence in Chance, Kumar, and Todd (2000) suggest that ESOs are usually repriced when the stock declines by about 25%. Acharya, John, and Sundaram (2000) investigate...

Darsinos, Theofanis; Satchell, Stephen E

2004-06-16T23:59:59.000Z

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Budget-based power consumption for application execution on a plurality of compute nodes  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for budget-based power consumption for application execution on a plurality of compute nodes that include: assigning an execution priority to each of one or more applications; executing, on the plurality of compute nodes, the applications according to the execution priorities assigned to the applications at an initial power level provided to the compute nodes until a predetermined power consumption threshold is reached; and applying, upon reaching the predetermined power consumption threshold, one or more power conservation actions to reduce power consumption of the plurality of compute nodes during execution of the applications.

Archer, Charles J; Inglett, Todd A

2012-10-23T23:59:59.000Z

262

Budget-based power consumption for application execution on a plurality of compute nodes  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for budget-based power consumption for application execution on a plurality of compute nodes that include: assigning an execution priority to each of one or more applications; executing, on the plurality of compute nodes, the applications according to the execution priorities assigned to the applications at an initial power level provided to the compute nodes until a predetermined power consumption threshold is reached; and applying, upon reaching the predetermined power consumption threshold, one or more power conservation actions to reduce power consumption of the plurality of compute nodes during execution of the applications.

Archer, Charles J; Blocksome, Michael A; Peters, Amanda E; Ratterman, Joseph D; Smith, Brian E

2013-02-05T23:59:59.000Z

263

Economic Value of Veterinary  

E-Print Network (OSTI)

laboratories such as TVMDL. Without TVMDL's services, Texas would experience both a health and a fiscal crisis Diagnostic Laboratory (TVMDL) works to protect animal and human health through diagnostic testing of samplesEconomic Value of Veterinary Diagnostics Public Investment in Animal Health Testing Yields Economic

264

A study on optimal configuration for the mobile manipulator: using weight value and mobility  

Science Conference Proceedings (OSTI)

A Mobile Manipulator is redundant by itself. Using it’s redundant freedom, a mobile manipulator can perform various task. In this paper, to improve task execution efficiency utilizing the redundancy, optimal configurations of the mobile manipulator ... Keywords: gradient method, mobile robot, mobility, weight value

Jin-Gu Kang; Kwan-Houng Lee

2006-09-01T23:59:59.000Z

265

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

266

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

267

System for loading executable code into volatile memory in a downhole tool  

DOE Patents (OSTI)

A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

2007-09-25T23:59:59.000Z

268

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

269

R-value Calculator  

NLE Websites -- All DOE Office Websites (Extended Search)

Advanced Wall Systems Advanced Wall Systems ORNL Home ASTM Testing BEP Home Related Sites Work With Us Advanced Wall Systems Home Interactive Calculators New Whole Wall R-value Calculators As A Part Of The ORNL Material Database For Whole Building Energy Simulations These calculators are replacing the old Whole Wall Thermal Performance calculator. These new versions of the calculator contain many new features and are part of the newly developed Interactive Envelope Materials Database for Whole-Building Energy Simulation Programs. The simple version of the Whole Wall R-value calculator is now available for use. This calculator is similar to the previous Whole Wall Thermal Performance calculator and does not require any downloads from the user. However, it was updated to allow calculations for fourteen wall details

270

Toxics Use Reduction Act (Massachusetts) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Toxics Use Reduction Act (Massachusetts) Toxics Use Reduction Act (Massachusetts) Eligibility Agricultural Commercial Construction Fuel Distributor Industrial Institutional...

271

Cover Sheet-Executive Summary_TOC_041912_MM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Final Environmental Impact Statement Final Environmental Impact Statement Grapevine Canyon Wind Project May 2012 Lead Agency: U.S. Department of Energy, Western Area Power Administration Cooperating Agencies: U.S. Department of Agriculture, Forest Service, Coconino National Forest Arizona State Land Department Volume II AREA POWER ADMINISTRATION DOCUMENT CONTENTS VOLUME I Cover Sheet Front Matter: Table of Contents, List of Figures and Tables, Index, Acronyms and Units of Measure Executive Summary Chapter 1: Purpose and Need Chapter 2: Proposed Action and Alternatives Chapter 3: Affected Environment and Environmental Consequences

272

Executive Order 13514-Federal Leadership in Environmental, Energy, and  

NLE Websites -- All DOE Office Websites (Extended Search)

14-Federal Leadership in Environmental, 14-Federal Leadership in Environmental, Energy, and Economic Performance Executive Order 13514-Federal Leadership in Environmental, Energy, and Economic Performance It is therefore the policy of the United States that Federal agencies shall increase energy efficiency; measure, report, and reduce their greenhouse gas emissions from direct and indirect activities; conserve and protect water resources through efficiency, reuse, and stormwater management; eliminate waste, recycle, and prevent pollution; leverage agency acquisitions to foster markets for sustainable technologies and environmentally preferable materials, products, and services; design, construct, maintain, and operate high performance sustainable buildings in sustainable locations; strengthen the vitality and livability of the

273

Executive Summary High-Yield Scenario Workshop Series Report  

SciTech Connect

To get a collective sense of the impact of research and development (R&D) on biomass resource availability, and to determine the feasibility that yields higher than baseline assumptions used for past assessments could be achieved to support U.S. energy independence, an alternate “High-Yield Scenario” (HYS) concept was presented to industry experts at a series of workshops held in December 2009. The workshops explored future production of corn/agricultural crop residues, herbaceous energy crops (HECs), and woody energy crops (WECs). This executive summary reports the findings of that workshop.

Leslie Park Ovard; Thomas H. Ulrich; David J. Muth Jr.; J. Richard Hess; Steven Thomas; Bryce Stokes

2009-12-01T23:59:59.000Z

274

RECOVERY OF URANIUM VALUES  

DOE Patents (OSTI)

A liquid-liquid extraction method is presented for recovering uranium values from an aqueous acidic solution by means of certain high molecular weight amine in the amine classes of primary, secondary, heterocyclic secondary, tertiary, or heterocyclic tertiary. The uranium bearing aqueous acidic solution is contacted with the selected amine dissolved in a nonpolar water-immiscible organic solvent such as kerosene. The uranium which is substantially completely exiracted by the organic phase may be stripped therefrom by waters and recovered from the aqueous phase by treatment into ammonia to precipitate ammonium diuranate.

Brown, K.B.; Crouse, D.J. Jr.; Moore, J.G.

1959-03-10T23:59:59.000Z

275

Calendar of Events: March 31: Pizza and Politics Program with Sam Feist, CNN's political director and senior executive  

E-Print Network (OSTI)

executives officers of Con Edison, Duke Energy, Gulf Power, Xcel Energy and Kansas City Power & Light

Peterson, Blake R.

276

Executive Order 13221-Energy Efficient Standby Power Devices  

NLE Websites -- All DOE Office Websites (Extended Search)

August 2, 2001 August 2, 2001 Part V The President Executive Order 13221-Energy Efficient Standby Power Devices VerDate 112000 14:57 Aug 01, 2001 Jkt 194001 PO 00000 Frm 00001 Fmt 4717 Sfmt 4717 E:\FR\FM\02AUE0.SGM pfrm04 PsN: 02AUE0 VerDate 112000 14:57 Aug 01, 2001 Jkt 194001 PO 00000 Frm 00002 Fmt 4717 Sfmt 4717 E:\FR\FM\02AUE0.SGM pfrm04 PsN: 02AUE0 Presidential Documents 40571 Federal Register Vol. 66, No. 149 Thursday, August 2, 2001 Title 3- The President Executive Order 13221 of July 31, 2001 Energy Efficient Standby Power Devices By the authority vested in me as President by the Constitution and the laws of the United States of America, including the National Energy Conserva- tion Policy Act (Public Law 95-619, 92 Stat. 3206, 42 U.S.C. 8252 et seq.), as amended by the Energy Policy Act of 1992 (EPACT) (Public Law 102-

277

Dimension: an instrumentation tool for virtual execution environments  

E-Print Network (OSTI)

Translation-based virtual execution environments (VEEs) are becoming increasingly popular because of their usefulness. With dynamic translation, a program in a VEE has two binaries: an input source binary and a dynamically generated target binary. Program analysis is important for these binaries, and both the developers and users of VEEs need an instrumentation system to customize program analysis tools. However, existing instrumentation systems for use in VEEs have two drawbacks. First, they are tightly bound with a specific VEE and thus are difficult to reuse without a lot of effort. Second, most of them can not support instrumentation on both the source and target binaries. This paper presents Dimension, a flexible tool that provides instrumentation services for a variety of VEEs. To our knowledge, it is the first stand-alone instrumentation tool that is specially designed for use in VEEs. Given an instrumentation specification, Dimension can be used by a VEE to provide customized instrumentation, enabling analyses on both the source and target binaries. We present two case studies demonstrating that Dimension can be reused easily by different VEEs. We experiment with the two cases and show that the same instrumentation provided by Dimension does not lose efficiency compared to its manual implementation for that particular VEE (the average performance difference is within 2%). We also illustrate that by interfacing with a special VEE that has the same source and target binary formats, Dimension can be used to build an efficient dynamic instrumentation system for traditional execution environments.

Jing Yang; Shukang Zhou; Mary Lou Soffa

2006-01-01T23:59:59.000Z

278

Autism Spectrum Disorders: The Interaction of Symptoms and Executive Skills  

E-Print Network (OSTI)

Autism Spectrum Disorders (ASDs) are one form of neurodevelopmental disruption that negatively impacts the integration of perceptual, affective and neuroregulatory mechanisms of typical development. Individuals with ASDs categorically demonstrate difficulties with organizing their thoughts/emotions/actions and applying them in a goal directed manner. The neurobiological deficits underlying cognitive and behavioral disorganization are termed executive functioning (EF) skills deficits. This study sought to clarify the association between the defining characteristics of ASDs and their expression in general behavior and EF skills, using parent and teacher ratings. Results of this study indicated that the association between the Behavior Assessment System for Children, Second Edition (BASC-2) and the symptoms of ASDs as measured by the Autism Spectrum Rating Scale (ASRS) varied by rater, with few clinical scales explaining significant variance in the ASRS outcomes. Additionally, the strongest relationship between the BASC-2 Developmental Social Disorders content scale (DSDCS) and the ASRS Scales was in behavior regulation rather than the social domain. Using the ASRS Scales as predictors of executive skills issues was generally stronger for teachers than parents. Only difficulties on the Self-Regulation Scale were consistently predictive of difficulties with Metacognition Index (MI) across parent and teacher ratings. The results give direction with regard to identifying behavioral and ecologically relevant cognitive skills and their relationship characteristics of ASDs.

Matthews, Robb Nelson

2011-12-01T23:59:59.000Z

279

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

280

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

282

U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute 80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code January 12, 2012 - 9:00am Addthis PROBLEM: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code PLATFORM: Linux ABSTRACT: A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Linux Kernel Update SecurityTracker Alert ID: 1026512 CVE-2012-0038 Red Hat Bugzilla Bug 773280 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a filesystem that, when mounted by the target user, will execute arbitrary code on the target user's system. Impact: A remote user can create a specially crafted filesystem that, when mounted

283

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

284

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

285

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

286

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

287

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

288

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

289

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

290

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

291

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

097: PHP "php_register_variable_ex()" Code Execution 097: PHP "php_register_variable_ex()" Code Execution Vulnerability U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM: PHP "php_register_variable_ex()" Code Execution Vulnerability PLATFORM: PHP 5.3.x ABSTRACT: Execution of arbitrary code via network as well as user access via network reference LINKS: PHP Security Archive SecurityTracker Alert ID: 1026631 Secunia Advisory SA47806 CVE-2012-0830 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in PHP, which can be exploited by malicious people to compromise a vulnerable system. Impact: A remote user can send specially crafted data to trigger a memory error in php_register_variable_ex() and execute arbitrary code on the target system.

292

U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users 131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code March 22, 2012 - 3:47am Addthis PROBLEM: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Photoshop CS5 12.x ABSTRACT: Successful exploitation may allow execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026831 Secunia Advisory: SA48457 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted TIFF file that, when loaded by the target user, will trigger a heap overflow and execute arbitrary code on the target

293

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

294

U-095: HP Data Protector Media Operations Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP Data Protector Media Operations Lets Remote Users Execute 5: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code U-095: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code February 3, 2012 - 1:33am Addthis PROBLEM: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code PLATFORM: Windows (2003, XP, 2008), HP Data Protector Media Operations version 6.11 and earlier ABSTRACT: Remote execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026626 HP Support Center Document ID: c03179046 CVE-2011-4791 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Data Protector Media Operations. A remote user can execute arbitrary code on the target system. Information on CVSS is documented in HP Customer Notice: HPSN-2008-002. Impact:

295

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

296

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

297

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

298

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

299

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

300

U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code 136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code March 29, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Lets Remote Users Execute Arbitrary Code PLATFORM: 11.1.102.63 and prior versions ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. rEFERENCE LINKS: SecurityTracker Alert ID: 1026859 CVE-2012-0772 Security update available for Adobe Flash Player IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A memory corruption

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

302

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

303

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

304

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

305

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

306

VALUES IN PLACE: INTERSECTING VALUES IN RAILS TO TRAILS LANDSCAPES.  

E-Print Network (OSTI)

??This dissertation is a study of the values and meanings people attach to places and why exploring those values is important in trails and historic… (more)

Brownell, Lisa Rainey

2011-01-01T23:59:59.000Z

307

Toxic Chemical Agent Decontamination Emulsions, Their ...  

U.S. Energy Information Administration (EIA)

This invention is related to decontaminating agents and amethod for the decontamination of ... which have been contaminated with toxic chemical agents ...

308

Choose building products that avoid toxic emissions  

U.S. Energy Information Administration (EIA)

Choose building products that avoid toxic emissions. ... (PVC or vinyl) products have a wide range of chlorine that ... and also the plasticizers in ...

309

OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy and Economic Performance  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OF EXECUTIVE ORDER 13514 Federal Leadership in Environmental, Energy, and Economic Performance 10/27/2009 F&I Meeting President Obama Signing E.O. 13514 2 On October 5, 2009, President Obama Signed Executive Order 13514, Federal Leadership in Environmental, Energy, and Economic Performance. Executive Order 13514 * Executive Order 13514 establishes numerous goals for Federal agencies. * E.O. 13514 represents a transformative shift in the way the government operates by: - establishing GHGs as the integrating metric for tracking progress in Federal sustainability - requiring a deliberative planning process - linking to budget allocations and OMB scorecards to ensure goal achievement. * E.O. 13423, Strengthening Federal

310

Alleged Mismanagement of the Department of Energy's Executive Protection Operations, INS-SR-13-02  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Special Inquiry Alleged Mismanagement of the Department of Energy's Executive Protection Operations INS-SR-13-02 April 2013 Department of Energy Washington, DC 20585 April 15, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Inquiry on "Alleged Mismanagement of the Department of Energy's Executive Protection Operations" BACKGROUND The Office of Special Operations (Special Operations) has primary responsibility for the protection of the Secretary of Energy and other executive personnel as designated by the Secretary. Special Operations, a part of the Office of Health, Safety and Security (HSS), employs special agents charged with managing executive protection operations. These special

311

Tideflow| A dataflow-inspired execution model for high performance computing programs.  

E-Print Network (OSTI)

?? Traditional programming, execution and optimization techniques have been shown to be inadequate to exploit the features of computer processors with many cores. In particular,… (more)

Orozco, Daniel A.

2012-01-01T23:59:59.000Z

312

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ASSESSMENT: High Discussion: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. The code...

313

Reducing power consumption during execution of an application on a plurality of compute nodes  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for reducing power consumption during execution of an application on a plurality of compute nodes that include: executing, by each compute node, an application, the application including power consumption directives corresponding to one or more portions of the application; identifying, by each compute node, the power consumption directives included within the application during execution of the portions of the application corresponding to those identified power consumption directives; and reducing power, by each compute node, to one or more components of that compute node according to the identified power consumption directives during execution of the portions of the application corresponding to those identified power consumption directives.

Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Peters, Amanda E. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2012-06-05T23:59:59.000Z

314

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE))

A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

315

DOE O 327.1, Furlough or Reduction in Force in the Senior Executive Service  

Directives, Delegations, and Requirements

To establish requirements and assign responsibilities for furlough and reduction in force (RIF) of the Senior Executive Service (SES) in the Department of ...

2003-05-15T23:59:59.000Z

316

PVLV: The Primary Value and Learned Value Pavlovian Learning Algorithm  

E-Print Network (OSTI)

University of Colorado at Boulder The authors present their primary value learned value (PVLV) model robust to variability in the environment. The primary value (PV) system controls performance and learning during primary rewards, whereas the learned value (LV) system learns about conditioned stimuli. The PV

O'Reilly, Randall C.

317

Nuclear Energy In the United States Executive Summary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10 10 Status and Outlook for Nuclear Energy In the United States Executive Summary The U.S. nuclear power industry continues to make pro- gress toward the construction of new nuclear power plants in the United States. Currently, 13 license applica- tions are under active review by the Nuclear Regulatory Commission (NRC) for up to 22 new reactors. The De- partment of Energy has awarded conditional commit- ments for loan guarantees to the partners in the Vogtle project and is negotiating terms for loan guarantees with several new nuclear projects. The 104 operating plants continue to perform well, turn- ing in sustained performance for output and capacity factor - an estimated 798.7 billion kilowatt-hours and 90.5 percent respectively in 2009.

318

Executive Order 13270: Tribal Colleges and Universities (2002)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5288 5288 Federal Register / Vol. 67, No. 130 / Monday, July 8, 2002 / Presidential Documents Executive Order 13270 of July 3, 2002 Tribal Colleges and Universities By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows: Section 1. Policy. There is a unique relationship between the United States and Indian tribes, and a special relationship between the United States and Alaska Native entities. It is the policy of the Federal Government that this Nation's commitment to educational excellence and opportunity must extend as well to the tribal colleges and universities (tribal colleges) that serve Indian tribes and Alaska Native entities. The President's Board of Advisors on Tribal Colleges and Universities (the ''Board'') and the White

319

SMARTS: Exploiting Temporal Locality and Parallelism through Vertical Execution  

Science Conference Proceedings (OSTI)

In the solution of large-scale numerical prob- lems, parallel computing is becoming simultaneously more important and more difficult. The complex organization of today's multiprocessors with several memory hierarchies has forced the scientific programmer to make a choice between simple but unscalable code and scalable but extremely com- plex code that does not port to other architectures. This paper describes how the SMARTS runtime system and the POOMA C++ class library for high-performance scientific computing work together to exploit data parallelism in scientific applications while hiding the details of manag- ing parallelism and data locality from the user. We present innovative algorithms, based on the macro -dataflow model, for detecting data parallelism and efficiently executing data- parallel statements on shared-memory multiprocessors. We also desclibe how these algorithms can be implemented on clusters of SMPS.

Beckman, P.; Crotinger, J.; Karmesin, S.; Malony, A.; Oldehoeft, R.; Shende, S.; Smith, S.; Vajracharya, S.

1999-01-04T23:59:59.000Z

320

Department of Energy Acquisition System - A Guide for Executives  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MA-0517 MA-0517 The Department of Energy ACQUISITION SYSTEM A Guide for Executives U.S. Department of Energy Office of Procurement and Assistance Management July 9, 2009 Washington, DC 20585-0705 THE DEPARTMENT OF ENERGY ACQUISTION SYSTEM 1 Every year the Department of Energy spends over 90% of its budget on purchases from the private sector. Because of the Federal Government's special fiduciary relationship, the acquisition system established to manage these expenditures of taxpayer monies is very different in some respects from commercial transactions between private parties. This guide provides information to understand the Department's acquisition system, to use the system effectively, and to avoid ethical and conflict of interest problems.

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

MEMORANDUM FOR THE CHAIRPERSONS, I-MANAGE EXECUTIVE STEERING COMMITTEE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy Department of Energy . / Washington. DC 20585 Janvary 11, 2005 MEMORANDUM FOR THE CHAIRPERSONS, I-MANAGE EXECUTIVE STEERING COMMITTEE FROM: William S. Maharay Deputy Inspector General for Audit Services Office of Inspector General SUBJECT: INFORMATION: Audit Report on the "I-MANAGE STARS Implementation," Audit Report No.: OAS-L-05-02 The purpose of this report is to provide you with the results of our audit of the Department of Energy's (Department) implementation of the Integrated Management Navigation System (I- MANAGE) program's Standard Accounting and Reporting System (STARS). The report follows up on the challenges to successful implementation of STARS we highlighted in our interim report on "The Department's Implementation of I-MANAGE STARS" (Audit Report

322

1992 Commercial Buildings Characteristics -- Overview/Executive Summary  

U.S. Energy Information Administration (EIA) Indexed Site

Overview Overview Overview Percent of Buildings and Floorspace by Census Region, 1992 Percent of Buildings and Floorspace By Census Region divider line Executive Summary Commercial Buildings Characteristics 1992 presents statistics about the number, type, and size of commercial buildings in the United States as well as their energy-related characteristics. These data are collected in the Commercial Buildings Energy Consumption Survey (CBECS), a national survey of buildings in the commercial sector. The 1992 CBECS is the fifth in a series conducted since 1979 by the Energy Information Administration. Approximately 6,600 commercial buildings were surveyed, representing the characteristics and energy consumption of 4.8 million commercial buildings and 67.9 billion square feet of commercial floorspace nationwide. Overall, the amount of commercial floorspace in the United States increased an average of 2.4 percent annually between 1989 and 1992, while the number of commercial buildings increased an average of 2.0 percent annually.

323

Does "Paper Oil" Matter? Executive Summary  

Gasoline and Diesel Fuel Update (EIA)

Does "Paper Oil" Matter? Does "Paper Oil" Matter? Executive Summary Over the course of the past decade, financial institutions have assumed an ever greater role in energy futures (or "paper") markets. We provide novel evidence of this "financialization" and show that it helps explain an important aspect of the distribution of energy returns -how much they move in sync with the returns on equity investments. Key to our analysis is our unique dataset. Investigating which traders contribute to cross-market linkages is empirically difficult, because doing so requires detailed information about the trading activities of all market participants as well as knowledge of each participant's main motivation for trading. We overcome this traditional pitfall by

324

Mazheikiai refinery modernization study. Executive summary. Export trade information  

Science Conference Proceedings (OSTI)

The study, conducted by Foster Wheeler Corporation, was funded by the U.S. Trade and Development Agency on behalf of Lithuania's Ministry of Energy. The Mazheikiai Oil Refinery is the only one in the Baltic Region and serves the needs of Lithuania, Latvia, Estonia, and Kaliningrad. Before Lithuania's independence in 1990, the refinery was assured of crude supplies from Russia. However, since then the need has arisen to secure alternate sources of crude oil and the ability to process them. The purpose of the report is to provide recommendations to the Ministry of Energy for process improvements, environmental control measures, physical rehabilitation and energy conservation plans for the Mazheikiai Oil Refinery. The volume contains the Executive Summary.

Not Available

1994-01-01T23:59:59.000Z

325

Survey of biomass gasification. Volume I. Synopsis and executive summary  

DOE Green Energy (OSTI)

Biomass can be converted by gasification into a clean-burning gaseous fuel that can be used to retrofit existing gas/oil boilers, to power engines, to generate electricity, and as a base for synthesis of methanol, gasoline, ammonia, or methane. This survey describes biomass gasification, associated technologies and issues in three volumes. Volume I contains the synopsis and executive summary, giving highlights of the findings of the other volumes. In Volume II, the technical background necessary for understanding the science, engineering, and commercialization of biomass is presented. In Volume III, the present status of gasification processes is described in detail, followed by chapters on economics, gas conditioning, fuel synthesis, the institutional role to be played by the federal government, and recommendations for future research and development.

None

1979-07-01T23:59:59.000Z

326

UNFCCC/CCNUCC CDM – Executive Board AM0025 / Version 03  

E-Print Network (OSTI)

Revision to the approved baseline methodology AM0025 “Avoided emissions from organic waste through alternative waste treatment processes” This baseline methodology is based on the proposed methodologies submitted for the project “Organic waste composting at the Matuail landfill site Dhaka, Bangladesh, ” whose baseline study, monitoring and verification plan and project design document were prepared by prepared by World Wide Recycling B.V. and Waste Concern. It has been revised to include elements from the methodology for the ¨PT Navigat Organic Energy Indonesia Integrated Solid Waste Management (GALFAD) project in Bali, Indonesia¨, which was prepared by Mitsubishi Securities Co. For more information regarding these proposals and their consideration by the Executive Board, please refer to case NM0090: “Organic waste composting at the Matuail landfill site Dhaka, Bangladesh, ” and case NM0127 ¨Integrated solid waste management with methane destruction and energy generation¨, at

Sectoral Scope

2006-01-01T23:59:59.000Z

327

Executive Director for Operations PROPOSED RULE ON DECOMMISSIONING TRUST PROVISIONS  

E-Print Network (OSTI)

To request Commission approval to publish a proposed rule in the Federal Register on decommissioning trust agreement requirements. BACKGROUND: The staff presented a rulemaking plan (SECY-00-0002) to the Commission on December 30, 1999. The plan discussed two actions relating to amending nuclear power reactor decommissioning trust provisions i.e., to amend 10 CFR 50.75 and revise Regulatory Guide 1.159. Subsequently, in a February 9, 2000, staff requirements memorandum (SRM) to the Executive Director for Operations (Attachment 1), the Commission authorized the staff to proceed with the rulemaking plan. Further, the Commission instructed the staff that “any specific trust fund terms and conditions necessary to protect the funds fully should be set out in the rule itself, not in the regulatory guide. Sample language for trust agreements consistent with the terms and conditions within the rule may be provided within the associated regulatory guide.” The attached Federal Register notice (FRN) responds to the SRM. DISCUSSION: Contact:

William D. Travers; Brian Richter

2001-01-01T23:59:59.000Z

328

INL Site Executable Plan for Energy and Transportation Fuels Management  

Science Conference Proceedings (OSTI)

It is the policy of the Department of Energy (DOE) that sustainable energy and transportation fuels management will be integrated into DOE operations to meet obligations under Executive Order (EO) 13423 "Strengthening Federal Environmental, Energy, and Transportation Management," the Instructions for Implementation of EO 13423, as well as Guidance Documents issued in accordance thereto and any modifcations or amendments that may be issued from time to time. In furtherance of this obligation, DOE established strategic performance-based energy and transportation fuels goals and strategies through the Transformational Energy Action Management (TEAM) Initiative, which were incorporated into DOE Order 430.2B "Departmental Energy, Renewable energy, and Transportation Management" and were also identified in DOE Order 450.1A, "Environmental Protection Program." These goals and accompanying strategies are to be implemented by DOE sites through the integration of energy and transportation fuels management into site Environmental Management Systems (EMS).

Ernest L. Fossum

2008-11-01T23:59:59.000Z

329

Executive Order 13123-Greening the Government Through Efficient Energy Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0851 0851 Federal Register Vol. 64, No. 109 Tuesday, June 8, 1999 Title 3- The President Executive Order 13123 of June 3, 1999 Greening the Government Through Efficient Energy Management By the authority vested in me as President by the Constitution and the laws of the United States of America, including the National Energy Conserva- tion Policy Act (Public Law 95-619, 92 Stat. 3206, 42 U.S.C. 8252 et seq.), as amended by the Energy Policy Act of 1992 (EPACT) (Public Law 102- 486, 106 Stat. 2776), and section 301 of title 3, United States Code, it is hereby ordered as follows: PART 1-PREAMBLE Section 101. Federal Leadership. The Federal Government, as the Nation's largest energy consumer, shall significantly improve its energy management in order to save taxpayer dollars and reduce emissions that contribute to

330

Executive Order 13096: American Indian and Alaska Education (1998)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2681 2681 Federal Register Vol. 63, No. 154 Tuesday, August 11, 1998 Title 3- The President Executive Order 13096 of August 6, 1998 American Indian and Alaska Native Education By the authority vested in me as President by the Constitution and the laws of the United States of America, in affirmation of the unique political and legal relationship of the Federal Government with tribal governments, and in recognition of the unique educational and culturally related academic needs of American Indian and Alaska Native students, it is hereby ordered as follows: Section 1. Goals. The Federal Government has a special, historic responsibil- ity for the education of American Indian and Alaska Native students. Improv- ing educational achievement and academic progress for American Indian

331

Automatic generation of executable communication specifications from parallel applications  

Science Conference Proceedings (OSTI)

Portable parallel benchmarks are widely used and highly effective for (a) the evaluation, analysis and procurement of high-performance computing (HPC) systems and (b) quantifying the potential benefits of porting applications for new hardware platforms. Yet, past techniques to synthetically parameterized hand-coded HPC benchmarks prove insufficient for today's rapidly-evolving scientific codes particularly when subject to multi-scale science modeling or when utilizing domain-specific libraries. To address these problems, this work contributes novel methods to automatically generate highly portable and customizable communication benchmarks from HPC applications. We utilize ScalaTrace, a lossless, yet scalable, parallel application tracing framework to collect selected aspects of the run-time behavior of HPC applications, including communication operations and execution time, while abstracting away the details of the computation proper. We subsequently generate benchmarks with identical run-time behavior from the collected traces. A unique feature of our approach is that we generate benchmarks in CONCEPTUAL, a domain-specific language that enables the expression of sophisticated communication patterns using a rich and easily understandable grammar yet compiles to ordinary C + MPI. Experimental results demonstrate that the generated benchmarks are able to preserve the run-time behavior - including both the communication pattern and the execution time - of the original applications. Such automated benchmark generation is particularly valuable for proprietary, export-controlled, or classified application codes: when supplied to a third party. Our auto-generated benchmarks ensure performance fidelity but without the risks associated with releasing the original code. This ability to automatically generate performance-accurate benchmarks from parallel applications is novel and without any precedence, to our knowledge.

Pakin, Scott [Los Alamos National Laboratory; Wu, Xing [NCSU; Mueller, Frank [NCSU

2011-01-19T23:59:59.000Z

332

Towards Memory-Load Balanced Fast Fourier Transformations in Fine-Grain Execution Models  

Science Conference Proceedings (OSTI)

The code let model is a fine-grain dataflow-inspired program execution model that balances the parallelism and overhead of the runtime system. It plays an important role in terms of performance, scalability, and energy efficiency in exascale studies ... Keywords: FFT, fine-grain, execution model, memory bandwidth

Chen Chen, Yao Wu, Stephane Zuckerman, Guang R. Gao

2013-05-01T23:59:59.000Z

333

Global Futures: A Multithreaded Execution Model for Global Arrays-based Applications  

Science Conference Proceedings (OSTI)

We present Global Futures (GF), an execution model extension to Global Arrays, which is based on a PGAS-compatible active message-based paradigm. We describe the design and implementation of Global Futures and illustrate its use in a computational chemistry ... Keywords: Global Arrays, multithreading, execution models

Daniel Chavarria-Miranda; Sriram Krishnamoorthy; Abhinav Vishnu

2012-05-01T23:59:59.000Z

334

Supporting decision making process with "ideal" software agents - What do business executives want?  

Science Conference Proceedings (OSTI)

According to Simon's (1977) decision making theory, intelligence is the first and most important phase in the decision making process. With the escalation of information resources available to business executives, it is becoming imperative to explore ... Keywords: Business executives, Decision making process, Decision support systems, Design criteria, Intelligent software agents, Intelligent system evaluation

Yanqing Duan; Vincent Koon Ong; Mark Xu; Brian Mathews

2012-04-01T23:59:59.000Z

335

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

336

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

337

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

338

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

339

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

340

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27: Adobe InDesign Server SOAP Interface Lets Remote Users 27: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

342

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

343

V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09: Google Chrome WebKit Type Confusion Error Lets Remote Users 09: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code March 12, 2013 - 12:11am Addthis PROBLEM: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in Google Chrome. REFERENCE LINKS: Stable Channel Update SecurityTracker Alert ID: 1028266 CVE-2013-0912 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a type confusion error in WebKit and execute arbitrary code on the target system. The code will run with the privileges

344

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

345

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

346

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

52: Drupal Core Access Bypass and Arbitrary PHP Code Execution 52: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core Bugtraq ID: 56993 Secunia Advisory SA51517 CVE-2012-5651 CVE-2012-5652 CVE-2012-5653 IMPACT ASSESSMENT: Medium DISCUSSION: An attacker can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid in launching further attacks.

347

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

348

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

349

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe InDesign Server SOAP Interface Lets Remote Users 7: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

350

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

351

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

352

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

353

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

354

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

355

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

356

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

357

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

69: Telnet code execution vulnerability: FreeBSD and Kerberos 69: Telnet code execution vulnerability: FreeBSD and Kerberos U-069: Telnet code execution vulnerability: FreeBSD and Kerberos December 27, 2011 - 5:18am Addthis PROBLEM: Telnet code execution vulnerability: FreeBSD and Kerberos PLATFORM: Operating System: FreeBSD 7.1, 7.3, 8.0 and 8.1 and Software: Kerberos ABSTRACT: Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. reference LINKS: FreeBSD-SA-11:08.telnetd MITKRB5-SA-2011-008 Secunia Advisory: SA47397 (FreeBSD) Secunia Advisory: SA47348 (Kerberos) SecurityTracker Alert ID: 1026460 CVE-2011-4862 IMPACT ASSESSMENT: High Discussion: When an encryption key is supplied via the TELNET protocol, its length is not validated before the key is copied into a fixed-size buffer. The telnet

358

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

359

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

360

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

362

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

363

U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Chrome Out-of-Bounds Write Error Lets Remote Users 1: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code November 18, 2011 - 9:00am Addthis PROBLEM: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Version(s) prior to 15.0.874.121 ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Stable Channel Update CVE-2011-3900 SecurityTracker Alert ID: 1026338 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user,

364

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

365

Method and apparatus for executing a shift in a hybrid transmission  

DOE Patents (OSTI)

A method for executing a transmission shift in a hybrid transmission including first and second electric machines includes executing a shift-through-neutral sequence from an initial transmission state to a target transmission state including executing an intermediate shift to neutral. Upon detecting a change in an output torque request while executing the shift-through-neutral sequence, possible recovery shift paths are identified. Available ones of the possible recovery shift paths are identified and a shift cost for each said available recovery shift path is evaluated. The available recovery shift path having a minimum shift cost is selected as a preferred recovery shift path and is executed to achieve a non-neutral transmission state.

Gupta, Pinaki; Kaminsky, Lawrence A; Demirovic, Besim

2013-09-03T23:59:59.000Z

366

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

367

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

368

Secretary Comments on the Selection of the Next Executive Director of the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Comments on the Selection of the Next Executive Director Comments on the Selection of the Next Executive Director of the International Energy Agency Secretary Comments on the Selection of the Next Executive Director of the International Energy Agency March 11, 2011 - 12:00am Addthis Washington, D.C. - The Governing Board of the International Energy Agency (IEA) today announced that their 28 members have selected Maria Van der Hoeven of the Netherlands, the former Dutch Minister of the Economy, to be the Agency's next Executive Director. Ms. Van der Hoeven will succeed Nobuo Tanaka of Japan effective September 1, 2011. The United States thanks Mr. Tanaka for his service and offers its congratulations to Ms. Van der Hoeven. Secretary of Energy Steven Chu said, "We congratulate Maria Van der Hoeven on her new role as Executive Director of the IEA. Her leadership will be

369

Executive Summary: Prepared by NGO Platform on Shipbreaking  

E-Print Network (OSTI)

The departure of the SS Norway (now SS Blue Lady, ex-France) from the port of Bremerhaven, Germany on May 23, 2005, triggered a continuing criminal offense that persists to this day, and dragged Germany into becoming a participant in violating international laws. Under the Basel Convention and its Basel Ban Amendment, and European Union law, Germany is prohibited from disposing of the SS Norway by exporting it to any country outside of the European Union and to country not members of the Organization for Economic Cooperation and Development, 30 of the most industrialized nations in the world, without decontaminating the vessel of all the toxic wastes onboard. Bearing at least 1,200 tonnes of asbestos and an undetermined quantity of materials contaminated with the probable human carcinogen, polychlorinated biphenyls or PCBs, and other toxic wastes, the SS Norway poses a clear threat to human health and the environment in the Indian breaking yards where it is destined. Newly discovered evidence confirm that as far back as 2004, the owners of the SS Norway, Norwegian Cruise Lines (NCL) and its mother company, Star Cruises Ltd (SCL), made a determination to dispose of the vessel without disclosing this information to German authorities

Norwegian Cruise Lines

2006-01-01T23:59:59.000Z

370

Enhanced toxic cloud knockdown spray system for decontamination applications  

SciTech Connect

Methods and systems for knockdown and neutralization of toxic clouds of aerosolized chemical or biological warfare (CBW) agents and toxic industrial chemicals using a non-toxic, non-corrosive aqueous decontamination formulation.

Betty, Rita G. (Rio Rancho, NM); Tucker, Mark D. (Albuquerque, NM); Brockmann, John E. (Albuquerque, NM); Lucero, Daniel A. (Albuquerque, NM); Levin, Bruce L. (Tijeras, NM); Leonard, Jonathan (Albuquerque, NM)

2011-09-06T23:59:59.000Z

371

The Value of Emissions Trading  

E-Print Network (OSTI)

This paper estimates the value of international emissions trading, focusing attention on a here-to-fore neglected component: its value as a hedge against uncertainty. Much analysis has been done of the Kyoto Protocol and ...

Webster, Mort David.

372

Capacity Value of Solar Power  

Science Conference Proceedings (OSTI)

Evaluating the capacity value of renewable energy sources can pose significant challenges due to their variable and uncertain nature. In this paper the capacity value of solar power is investigated. Solar capacity value metrics and their associated calculation methodologies are reviewed and several solar capacity studies are summarized. The differences between wind and solar power are examined, the economic importance of solar capacity value is discussed and other assessments and recommendations are presented.

Duignan, Roisin; Dent, Chris; Mills, Andrew; Samaan, Nader A.; Milligan, Michael; Keane, Andrew; O'Malley, Mark

2012-11-10T23:59:59.000Z

373

Value Modeling of Customer Satisfaction  

Science Conference Proceedings (OSTI)

This report discusses a topic of central importance in asset management: the development and use of value models. Value models translate corporate goals into operational measures for use in decision making, such as decisions regarding resource allocation, capital investment, and OM budgeting. In particular, this report deals with modeling the value of customer satisfaction and provides practical guidance on how to use information available in utility customer satisfaction studies to develop value models....

2007-07-23T23:59:59.000Z

374

Dr. Terry Michalske SRNS Executive Vice President and SRNL Director  

NLE Websites -- All DOE Office Websites (Extended Search)

Dr. Terry Michalske Dr. Terry Michalske SRNS Executive Vice President and SRNL Director Dwayne Wilson SRNS President and CEO Dr. David Moody Manager, DOE-Savannah River 2013 Research and Technology Recognition P A T E N T S * L I C E N S E S * C R A D A S * A W A R D S * L A B O R A T O R Y D I R E C T O R A W A R D S * F E L L O W S "What we are celebrating is really the heart and core of SRS. It is that spirit of finding new solutions, new ways to address problems, integrated with a wide set of capabilities at the Savannah River Site, that allows us to solve really big challenges for the nation." "Recognizing these people is important as is congratulating them on the strengths and longevity they are placing in the Savannah River National Laboratory." "This is a night for the inventors, a night to recognize their

375

UNFCCC/CCNUCC CDM – Executive Board AM0025 / Version 04  

E-Print Network (OSTI)

Note: Revision in this methodology is applicable to projects activities that are implemented in countries where regulations exist that mandate’s the treatment of the waste using any of the project activity treatment options mentioned in the methodology. Source Revision to the approved baseline methodology AM0025 “Avoided emissions from organic waste through alternative waste treatment processes” This baseline methodology is based on the proposed methodologies submitted for the project “Organic waste composting at the Matuail landfill site Dhaka, Bangladesh, ” whose baseline study, monitoring and verification plan and project design document were prepared by prepared by World Wide Recycling B.V. and Waste Concern. It has been revised to include elements from the methodology for the ¨PT Navigat Organic Energy Indonesia Integrated Solid Waste Management (GALFAD) project in Bali, Indonesia¨, which was prepared by Mitsubishi Securities Co. The methodology also uses elements from the case “Municipal solid waste treatment cum energy generation project, Lucknow, India ” were used, whose baseline study, monitoring and verification plan were prepared by Infrastructure Development Finance Company Limited on behalf of Prototype Carbon Fund. For more information regarding these proposals and their consideration by the Executive Board, please refer to case NM0090: “Organic waste composting at the Matuail landfill site Dhaka, Bangladesh ”,case NM0127 ¨Integrated solid waste management with methane destruction and energy generation¨, and case

unknown authors

2006-01-01T23:59:59.000Z

376

Attached is Policy Flash 2013-34 Department of Energy Acquisition Letter 2013-04 on Executive Compensation  

Energy.gov (U.S. Department of Energy (DOE))

Attached is Policy Flash 2013-34 Department of Energy Acquisition Letter 2013-04 on Executive Compensation           

377

Address-Value Delta (AVD) Prediction: A Hardware Technique for Efficiently Parallelizing Dependent Cache Misses  

E-Print Network (OSTI)

While runahead execution is effective at parallelizing independent long-latency cache misses, it is unable to parallelize dependent long-latency cache misses. To overcome this limitation, this paper proposes a novel hardware technique, address-value delta (AVD) prediction. An AVD predictor keeps track of the address (pointer) load instructions for which the arithmetic difference (i.e., delta) between the effective address and the data value is stable. If such a load instruction incurs a long-latency cache miss during runahead execution, its data value is predicted by subtracting the stable delta from its effective address. This prediction enables the preexecution of dependent instructions, including load instructions that incur long-latency cache misses. We analyze why and for what kind of loads AVD prediction works and describe the design of an implementable AVD predictor. We also describe simple hardware and software optimizations that can significantly improve the benefits of AVD prediction and analyze the interaction of AVD prediction with runahead efficiency techniques and stream-based data prefetching. Our analysis shows that AVD prediction is complementary to these techniques. Our results show that augmenting a runahead processor with a simple, 16-entry AVD predictor improves the average execution time of a set of pointer-intensive applications by 14.3 percent (7.5 percent excluding benchmark health).

Onur Mutlu; Hyesoon Kim; Yale N. Patt

2006-01-01T23:59:59.000Z

378

Relating nanomaterial properties and microbial toxicity  

Science Conference Proceedings (OSTI)

Nanomaterials are meeting diverse needs in consumer and industrial products. Metal and metal oxide nanoparticles are among the most commonly used materials and their potential for adversely affecting environmental systems raises concern. Complex microbial consortia underlie environmental processes, and the potential toxicity of nanoparticles to microbial systems, and the consequent impacts on trophic balances, is particularly worrisome. The diverse array of metal and metal oxides, the different sizes and shapes that can be prepared and the variety of possible surface coatings complicate toxicity assessments. Further complicating toxicity interpretations are the diversity of microbial systems and their metabolic capabilities. Here, we review various studies focused on nanoparticle-microbial interactions in an effort to correlate the physical-chemical properties of engineered metal and metal oxide nanoparticles to their biological response. Gaining a predictive understanding of nanoparticle toxicity, based on the physical-chemical properties of the material, will be key to the design and responsible use of nanotechnologies. General conclusions regarding the parent material of the nanoparticle and nanoparticle s size and shape on potential toxicity can be made. However, the surface coating of the material, which can be altered significantly by environmental conditions, can ameliorate or promote microbial toxicity. Understanding nanoparticle transformations and how the nanoparticle surface can be designed to control toxicity represents a key area for further study. Additionally, the vast array of microbial species and their intrinsic metabolic capabilities complicates extrapolations of nanoparticle toxicity. A molecular-based understanding of the various microbial responses to nanoparticle-induced stress is needed. Ultimately, to interpret the effect and eventual fate of engineered materials in the environment, an understanding of the relationship between nanoparticle properties and microbial response will be essential.

Suresh, Anil K [ORNL; Pelletier, Dale A [ORNL; Doktycz, Mitchel John [ORNL

2013-01-01T23:59:59.000Z

379

Better Buildings, Better Plants: How You Can Benefit, plus New Executive Order on Industrial Energy Efficiency  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DRAFT ADVANCED MANUFACTURING OFFICE Better Buildings, Better Plants: How You Can Benefit, plus New Executive Order on Industrial Energy Efficiency Advanced Manufacturing Office October 9, 2012 Andre de Fontaine Katrina Pielli 2 Today * Better Buildings, Better Plants Overview - Better Buildings, Better Plants Program - Better Buildings, Better Plants Challenge * Looking Ahead to 2013 - In-Plant Trainings - Enhanced energy intensity baselining and tracking tool - New communication materials * Executive Order on Industrial Energy Efficiency and Combined Heat and Power - DOE Activities in Support of Executive Order * Regional Industrial Energy Efficiency & Combined Heat and Power Dialogue Meetings * Better Buildings, Better Plants * "CHP as a Clean Energy Resource" new report

380

Microsoft PowerPoint - DOE PCA Training (Executive Overview) 10-31-06 Final.ppt  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 31, 2006 October 31, 2006 Department of Energy Post Competition Accountability (PCA) Training Module 1: Executive PCA Training Opening Remarks Opening Remarks 3 Post Competition Accountability (PCA) Training Module 1: Executive PCA Training Module 2: PCA Practitioner's Training Module 3: Quality Assurance Surveillance Training Module 4: Quality Control Evaluator Training Module 5: Service Provider (SP) PCA Toolkit 4 Training Objectives Understand OMB PCA Requirements Understand DOE PCA Roles and Responsibilities Understand the Execution of PCA 5 PCA Training Agenda PCA Overview OMB Circular A-76 PCA Requirements Roles and Responsibilities Requirements for Measuring Cost & Performance How do we Measure Cost & Performance? Independent Validation and Verification (IV&V)

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

GridRun: A lightweight packaging and execution environment forcompact, multi-architecture binaries  

SciTech Connect

GridRun offers a very simple set of tools for creating and executing multi-platform binary executables. These ''fat-binaries'' archive native machine code into compact packages that are typically a fraction the size of the original binary images they store, enabling efficient staging of executables for heterogeneous parallel jobs. GridRun interoperates with existing distributed job launchers/managers like Condor and the Globus GRAM to greatly simplify the logic required launching native binary applications in distributed heterogeneous environments.

Shalf, John; Goodale, Tom

2004-02-01T23:59:59.000Z

382

Quantum physics and human values  

Science Conference Proceedings (OSTI)

This report discusses the following concepts: the quantum conception of nature; the quantum conception of man; and the impact upon human values. (LSP).

Stapp, H.P.

1989-09-01T23:59:59.000Z

383

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Security Bulletin - HP-UX Running OpenSSL, Remote 0: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

384

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

385

Testimony of Jonathan Silver, Executive Director Loan Programs Office, U.S.  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Testimony of Jonathan Silver, Executive Director Loan Programs Testimony of Jonathan Silver, Executive Director Loan Programs Office, U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee on Energy and Commerce U.S. House of Representatives Testimony of Jonathan Silver, Executive Director Loan Programs Office, U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee on Energy and Commerce U.S. House of Representatives September 14, 2011 - 12:01am Addthis As prepared for delivery Thank you Chairman Stearns, Ranking Member DeGette, and members of the Subcommittee. My name is Jonathan Silver, and I have served as Executive Director of the Loan Programs Office at the Department of Energy since November 2009. For most of my career, I have worked in the private sector, analyzing,

386

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

387

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

388

President Issues Executive Order Aimed at Preparing for the Impacts of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Issues Executive Order Aimed at Preparing for the Impacts President Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force President Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force November 1, 2013 - 2:52pm Addthis In light of the Intergovernmental Panel on Climate Change's forthcoming 2013 report detailing the latest scientific findings and projections related to climate change, President Obama signed an Executive Order on November 1 directing federal agencies to take a series of actions aimed at making it easier for American communities to strengthen their resilience to droughts, storms, wildfires, and other impacts of climate change. By establishing a task force that includes tribal leaders, the Order gives

389

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users 9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands January 26, 2012 - 6:45am Addthis PROBLEM: Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: CVE-2011-3923 SecurityTracker Alert ID: 1026575 Apache Struts 2 Documentation S2-009 blog.o0o.nu IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. The vulnerability allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject

390

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

391

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

392

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

393

Richard Lazarus Named as Executive Director of National Commission on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Richard Lazarus Named as Executive Director of National Commission Richard Lazarus Named as Executive Director of National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling Richard Lazarus Named as Executive Director of National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling June 22, 2010 - 12:00am Addthis WASHINGTON, D.C. - The co-chairs of the bipartisan National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling have selected a highly regarded Georgetown University law professor to serve as the commission's executive director. Richard Lazarus, the Justice William J. Brennan, Jr., Professor of Law at Georgetown, will lead the staff of the commission and work at the direction of co-chairs - former two-term Florida Governor and former U.S. Senator Bob Graham and former Administrator of the Environmental Protection Agency

394

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

395

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

099: Honeywell Multiple Products ActiveX Control Remote Code 099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

396

T-643: HP OpenView Storage Data Protector Unspecified Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

643: HP OpenView Storage Data Protector Unspecified Code 643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability June 9, 2011 - 3:45pm Addthis PROBLEM: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability PLATFORM: Versions 6.0, 6.10, and 6.11 running on HP-UX, Solaris, Linux and Windows. ABSTRACT: A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Secunia Advisory SA44884 CVE-2011-1864 SecurityTracker Alert ID: 1025620 HP Document ID: c02712867 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

397

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: HP Security Bulletin - HP-UX Running OpenSSL, Remote 70: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

398

Leadership Development Series: "DOE Executive Forum: Best Practices and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leadership Development Series: "DOE Executive Forum: Best Practices Leadership Development Series: "DOE Executive Forum: Best Practices and Lessons Learned in 2013" Leadership Development Series: "DOE Executive Forum: Best Practices and Lessons Learned in 2013" January 22, 2014 1:00PM to 3:00PM EST Registration link: By e-mail, $0 Course type: Classroom/Auditorium, Video Cast and Teleconference Course Location: DOE Headquarters, Forrestal Building, Washington, DC/ Main Auditorium Course Description: Legacy Management; Office of Science; WAPA 2013 was a challenging and difficult year for most federal agencies. We have asked executives from: - Legacy Management, - Office of Science and - WAPA to brief out their best practices and lessons learned during 2013 while dealing with sequestration, budget reductions and anticipating possible

399

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

400

U-099: MySQL Unspecified Code Execution Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

099: MySQL Unspecified Code Execution Vulnerability 099: MySQL Unspecified Code Execution Vulnerability U-099: MySQL Unspecified Code Execution Vulnerability February 9, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in MySQL, which can be exploited by malicious people to compromise a vulnerable system. PLATFORM: MySQL 5.x ABSTRACT: Successful exploitation allows execution of arbitrary code. Reference LINKS: Secunia Advisory SA47894 No CVE references currently available. IMPACT ASSESSMENT: Medium Discussion: The vulnerability is reported in version 5.5.20. Other versions may also be affected. The exploit has been tested with mysql-5.5.20-debian6.0-i686.deb on Debian 6.0. Impact: System access from local network Solution: An effective workaround cannot currently be provided due to limited vulnerability details.

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Executive Summary Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. Roadmap to Secure Control Systems in the Energy: Executive Summary

402

V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute 5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code January 9, 2013 - 12:10am Addthis PROBLEM: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.5.502.135 and earlier versions for Windows Adobe Flash Player 11.5.502.136 and earlier versions for Macintosh Adobe Flash Player 11.2.202.258 and earlier versions for Linux Adobe Flash Player 11.1.115.34 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.29 and earlier versions for Android 3.x and 2.x. ABSTRACT: Security updates available for Adobe Flash Player REFERENCE LINKS: Adobe Security Bulletin APSB13-01 SecurityTracker Alert ID: 1027950

403

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

404

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

405

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Honeywell Multiple Products ActiveX Control Remote Code 9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

406

T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code 29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January 6, 2011 - 2:53pm Addthis PROBLEM: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability PLATFORM: Apple Mac OS X Server 10.6 - 10.6.5, Apple Mac OS X 10.6 - 10.6.5 Vulnerable Platforms Details ABSTRACT: A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS

407

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

408

The Health Benefits of Tackling Climate Change: An Executive Summary for  

Open Energy Info (EERE)

The Health Benefits of Tackling Climate Change: An Executive Summary for The Health Benefits of Tackling Climate Change: An Executive Summary for The Lancet Series Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Health Benefits of Tackling Climate Change: An Executive Summary for The Lancet Series Agency/Company /Organization: World Health Organization, Wellcome Trust, Royal College of Physicians, National Institute of Environmental Health Services, National Institute for Health Research, London School of Hygiene and Tropical Medicine, Economic and Social Research Council, Department of Health, The Academy of Medical Sciences Sector: Energy, Land, Climate Topics: Co-benefits assessment, - Health Resource Type: Publications Website: download.thelancet.com/flatcontentassets/series/health-and-climate-cha The Health Benefits of Tackling Climate Change: An Executive Summary for The Lancet Series Screenshot

409

President Issues Executive Order Aimed at Preparing for the Impacts of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Issues Executive Order Aimed at Preparing for the Impacts President Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force President Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force November 1, 2013 - 2:52pm Addthis In light of the Intergovernmental Panel on Climate Change's forthcoming 2013 report detailing the latest scientific findings and projections related to climate change, President Obama signed an Executive Order on November 1 directing federal agencies to take a series of actions aimed at making it easier for American communities to strengthen their resilience to droughts, storms, wildfires, and other impacts of climate change. By establishing a task force that includes tribal leaders, the Order gives

410

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

411

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Apache OFBiz Cross-Site Scripting and Code Execution 9: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities April 17, 2012 - 8:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM: Apache OFBiz 10.x ABSTRACT: The vulnerabilities are reported in version 10.04.01. Prior versions may also be affected. references LINKS: Vendor Advisory Secunia Advisory 48800 CVE-2012-1621 IMPACT ASSESSMENT: High Discussion: 1) Certain unspecified input is not properly sanitised within the "getServerError()" function in checkoutProcess.js before being returned to the user. This can be exploited to execute arbitrary HTML and script code

412

FACILITIES ENGINEER WEST CHICAGO Execute capital projects for manufacturing facilities and utilities systems: scope development, cost  

E-Print Network (OSTI)

improvements, including all stages of project engineering: scope development, cost estimation, system designFACILITIES ENGINEER ­ WEST CHICAGO OVERVIEW: Execute capital projects for manufacturing facilities and utilities systems: scope development, cost estimation, system design, equipment sizing

Heller, Barbara

413

U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

by the target user, will execute arbitrary code on the target user's system. Impact: A remote user can create a specially crafted filesystem that, when mounted by the target...

414

Reducing power consumption during execution of an application on a plurality of compute nodes  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for reducing power consumption during execution of an application on a plurality of compute nodes that include: powering up, during compute node initialization, only a portion of computer memory of the compute node, including configuring an operating system for the compute node in the powered up portion of computer memory; receiving, by the operating system, an instruction to load an application for execution; allocating, by the operating system, additional portions of computer memory to the application for use during execution; powering up the additional portions of computer memory allocated for use by the application during execution; and loading, by the operating system, the application into the powered up additional portions of computer memory.

Archer, Charles J.; Blocksome, Michael A.; Peters, Amanda E.; Ratterman, Joseph D.; Smith, Brian E.

2013-09-10T23:59:59.000Z

415

Emissions of Greenhouse Gases in the United States, 2000 Executive Summary  

Reports and Publications (EIA)

Executive Summary on the Energy Information Administration's latest estimates of emissions for carbon dioxide, methane, nitrous oxide, and other greenhouse gases. These estimates are based on activity data and applied emissions factors and not on measured or metered emissions monitoring.

Perry Lindstrom

2001-11-01T23:59:59.000Z

416

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

417

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code 6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28, 2011 - 3:42pm Addthis PROBLEM: Functional code that demonstrates an exploit of the Microsoft Office Visio DXF file handling arbitrary code execution vulnerability is publicly available. PLATFORM: Microsoft Office Visio 2002 SP2 and prior Microsoft Office Visio 2003 SP3 and prior Microsoft Office Visio 2007 SP2 and prior ABSTRACT: Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. reference LINKS: IntelliShield ID: 20432 Original Release: S516 CVE-2010-1681 IMPACT ASSESSMENT: High Discussion: The vulnerability exists because the affected software does not perform

418

Agreement Execution Process Study: CRADAs and NF-WFO Agreements and the Speed of Business  

SciTech Connect

This report summarizes the findings of a study on the execution of Cooperative Research and Development Agreements (CRADAs) and Non-Federal Work for Others (NF-WFO) agreements across the U.S. Department of Energy (DOE) laboratory complex. The study provides quantitiative estimates of times required to negotiate and execute these agreements across the DOE complex. It identifies factors impacting on cycle times and describes best practicies used at various laboratories and site offices that reduce cycle times.

Harrer, Bruce J.; Cejka, Cheryl L.; Macklin, Richard; Miksovic, Ann

2011-02-01T23:59:59.000Z

419

Executive summaries of reports leading to the construction of the Baca Geothermal Demonstration Project  

DOE Green Energy (OSTI)

Executive summaries have been written for 61 reports and compilations of data which in part, have led to the construction of the Baca 50 MW Geothermal Demonstration Project (GDP). The reports and data include environmental research, reservoir and feasibility studies, the project proposal to DOE and the Final Environmental Impact Statement. These executive summaries are intended to give the reader a general overview of each report prior to requesting the report from the GDP Data Manager.

Sherwood, P.B.; Newman, K.L.; Westermeier, J.F.; Giroux, H.D.; Lowe, G.D.; Nienberg, M.W.

1980-05-01T23:59:59.000Z

420

Executive summaries of reports leading to the construction of the Baca Geothermal Demonstration Project  

DOE Green Energy (OSTI)

Executive summaries have been written for 61 reports and compilations of data which, in part, have led to the construction of the Baca 50 MW Geothermal Demonstration Project (GDP). The reports and data include environmental research, reservoir and feasibility studies, the project proposal to DOE and the Final Environmental Impact Statement. These executive summaries are intended to give the reader a general overview of each report prior to requesting the report from the GDP Data Manager.

Sherwood, P.B.; Newman, K.L.; Westermeier, J.F.; Giroux, H.D.; Lowe, G.D.; Nienberg, M.W.

1980-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

NULL 'Value' Algebras and Logics  

Science Conference Proceedings (OSTI)

NULL is a special marker used in SQL to indicate that a value for an attribute of an object does not exist in the database. Its aim is a representation of “missing information and inapplicable information”. Although NULL is called null 'value' ...

Bernhard Thalheim; Klaus-Dieter Schewe

2011-08-01T23:59:59.000Z

422

DOE contractor's meeting on chemical toxicity  

Science Conference Proceedings (OSTI)

The Office of Health and Environmental Research (OHER) is required to determine the potential health and environmental effects associated with energy production and use. To ensure appropriate communication among investigators and scientific disciplines that these research studies represent, OHER has sponsored workshops. This document provides a compilation of activities at the Third Annual DOE/OHER Workshop. This year's workshop was broadened to include all OHER activities identified as within the chemical effects area. The workshop consisted of eight sessions entitled Isolation and Detection of Toxic chemicals; Adduct Formation and Repair; Chemical Toxicity (Posters); Metabolism and Genotoxicity; Inhalation Toxicology; Gene Regulation; Metals Toxicity; and Biological Mechanisms. This document contains abstracts of the information presented by session.

Not Available

1987-01-01T23:59:59.000Z

423

Core Values | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Core Values Core Values Core Values People - People are our most important resource. We respect and use our experience and skills and appreciate our diversity. Business Excellence - We are fiscally responsible and actively pursue best business practices. Safety - We protect our human and material resources and promote safe work practices within the office and at our sites. Communication - We take full advantage of our virtual organization's strengths and share information freely across all levels of the organization. Leadership and Teamwork - We encourage leadership and teamwork at all levels of the organization. We value active participation and demonstrate respect for each other. Customer Service - We openly communicate with all our customers in a timely manner and actively seek opportunities to improve our services.

424

Market value and patent citations  

E-Print Network (OSTI)

Press, 1987. —, —, and —. “R&D, Patents, and Market ValueStock Market Valuation of R&D Investment during the 1980s. ”1976. Pakes, A. “On Patents, R&D, and the Stock Market Rate

Hall, Bronwyn H.; Jaffe, A; Trajtenberg, M

2005-01-01T23:59:59.000Z

425

ISO 14001 EMS VALUE PROPOSITION.  

SciTech Connect

The objective of this report is to identify business opportunities and value for Battelle Organizations to undertake IS0 14001 Environmental Management System Implementation and registration to the international standard as a corporate strategic initiative.

BRIGGS,S.L.K.

2001-11-06T23:59:59.000Z

426

Application of leaching tests for toxicity evaluation of coal fly ash  

Science Conference Proceedings (OSTI)

The toxic properties of coal fly ash samples obtained from various coal combustion power plants were evaluated in this work using physicochemical analyses and bioassays. Physicochemical analyses showed that heavy metals present in solid samples included Cr, Cu, Mn, Ni, Pb, and Zn. The results of the chemical analysis of eluates deduced by the application of standard leaching tests according to EN 12457-2 and Toxicity Characteristic Leaching Procedure (TCLP) methods indicated that the compounds contained in fly ashes could potentially be transferred to the liquid phase depending upon the leaching method used. Heavy metal concentrations were higher in TCLP eluates, indicating that the initial pH value of the leaching medium significantly affected the transfer of these elements to the liquid phase. Tests conducted with the photobacterium Vibrio fischeri (Microtox test), the crustacean Daphnia magna, and the rotifer Brachionus calyciflorus were used to assess toxicity of eluates obtained by both leaching tests. Daphnia magna was the most sensitive test organism. The EN 12457-2 method proved to be more reliable for toxicity evaluation of eluates. In contrast, the TCLP method showed some interference owing to acetic acid toxicity, and precipitation occurred after pH adjustment of eluates from acid to neutral range. The toxicity of both fly ashes and the corresponding solid leaching residues of EN 12457-2 and TCLP leaching tests was also measured using the Microtox Basic Solid phase Test. The results generated with this bioassay indicated that toxicity was greatly influenced by the pH status of the solid samples.

Tsiridis, V.; Samaras, P.; Kungolos, A.; Sakellaropoullos, G.P. [Technological Educational Institute for West Macedonia, Kozani (Greece). Dept. for Pollution Control Technology

2006-08-15T23:59:59.000Z

427

Generating multivariate extreme value distributions  

E-Print Network (OSTI)

We define in a probabilistic way a parametric family of multivariate extreme value distributions. We derive its copula, which is a mixture of several complete dependent copulas and total independent copulas, and the bivariate tail dependence and extremal coefficients. Based on the obtained results for these coefficients, we propose a method to built multivariate extreme value distributions with prescribed tail/extremal coefficients. We illustrate the results with examples of simulation of these distributions.

Ferreira, Helena

2012-01-01T23:59:59.000Z

428

Sustainable Water Resources Management, Volume 1: Executive Summary  

Science Conference Proceedings (OSTI)

This report summarizes the findings of a three-phase research project investigating sustainable water management. The report will be of value to all parties interested in the water aspects of sustainable development. As it contains information at various scales of water management, the report will be of interest for those involved with green building projects, the public water supply, stormwater management, wastewater treatment and the electric power sector. In addition, the report provides valuable insi...

2010-01-15T23:59:59.000Z

429

Executive Order 13514: Federal Leadership in Environmental, Energy, and Economic Performance; Comprehensive Federal Fleet Management Handbook, June 2010, Federal Energy Management Program (FEMP)  

Science Conference Proceedings (OSTI)

Comprehensive Federal fleet management guide offered as a companion to Executive Order 13514 Section 12 guidance.

Not Available

2010-06-01T23:59:59.000Z

430

Executive Order 13514: Federal Leadership in Environmental, Energy, and Economic Performance; Comprehensive Federal Fleet Management Handbook, July 2011, Federal Energy Management Program (FEMP)  

SciTech Connect

Comprehensive Federal fleet management guide offered as a companion to Executive Order 13514 Section 12 guidance.

2011-07-01T23:59:59.000Z

431

Capacity Value of Wind Power  

Science Conference Proceedings (OSTI)

Power systems are planned such that they have adequate generation capacity to meet the load, according to a defined reliability target. The increase in the penetration of wind generation in recent years has led to a number of challenges for the planning and operation of power systems. A key metric for system adequacy is the capacity value of generation. The capacity value of a generator is the contribution that a given generator makes to overall system adequacy. The variable and stochastic nature of wind sets it apart from conventional energy sources. As a result, the modeling of wind generation in the same manner as conventional generation for capacity value calculations is inappropriate. In this paper a preferred method for calculation of the capacity value of wind is described and a discussion of the pertinent issues surrounding it is given. Approximate methods for the calculation are also described with their limitations highlighted. The outcome of recent wind capacity value analyses in Europe and North America are highlighted with a description of open research questions also given.

Keane, Andrew; Milligan, Michael; Dent, Chris; Hasche, Bernhard; DAnnunzio, Claudine; Dragoon, Ken; Holttinen, Hannele; Samaan, Nader A.; Soder, Lennart; O'Malley, Mark J.

2011-05-04T23:59:59.000Z

432

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

433

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

434

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

435

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

436

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

437

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

438

Data Parallel Execution Challenges and Runtime Performance of Agent Simulations on GPUs  

Science Conference Proceedings (OSTI)

Programmable graphics processing units (GPUs) have emerged as excellent computational platforms for certain general-purpose applications. The data parallel execution capabilities of GPUs specifically point to the potential for effective use in simulations of agent-based models (ABM). In this paper, the computational efficiency of ABM simulation on GPUs is evaluated on representative ABM benchmarks. The runtime speed of GPU-based models is compared to that of traditional CPU-based implementation, and also to that of equivalent models in traditional ABM toolkits (Repast and NetLogo). As expected, it is observed that, GPU-based ABM execution affords excellent speedup on simple models, with better speedup on models exhibiting good locality and fair amount of computation per memory element. Execution is two to three orders of magnitude faster with a GPU than with leading ABM toolkits, but at the cost of decrease in modularity, ease of programmability and reusability. At a more fundamental level, however, the data parallel paradigm is found to be somewhat at odds with traditional model-specification approaches for ABM. Effective use of data parallel execution, in general, seems to require resolution of modeling and execution challenges. Some of the challenges are identified and related solution approaches are described.

Perumalla, Kalyan S [ORNL; Aaby, Brandon G [ORNL

2008-01-01T23:59:59.000Z

439

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

48: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code 48: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability April 16, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in ActiveScriptRuby, which can be exploited by malicious people to potentially compromise a user's system. PLATFORM: Version(s): 1.2.2.0 and prior ABSTRACT: The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands. reference LINKS: Secunia Advisory 48811 CVE-2012-1241 IMPACT ASSESSMENT: High Discussion: ActiveScriptRuby is a software to implement Ruby into a Windows environment. ActiveScriptRuby contains a vulnerability where an arbitrary Ruby script may be executed on the web browser that can execute ActiveX

440

Property Values | Open Energy Information  

Open Energy Info (EERE)

Property Values Property Values Jump to: navigation, search Maple Ridge Wind Farm. Photo from Iberdrola Renewables, NREL 15240 Researchers at Lawrence Berkeley National Laboratory have performed empirical investigations to address typical community concerns about wind energy and property values. Based on the data sample and analysis, "no evidence is found that home prices surrounding wind facilities are consistently, measurably, and significantly affected by either the view of wind facilities or the distance of the home to those facilities. Although the analysis cannot dismiss the possibility that individual homes or small numbers of homes have been or could be negatively impacted, it finds that if these impacts exist, they are either too small and/or too infrequent to

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Methods of valuing environmental externalities  

SciTech Connect

Estimating a monetary value for environmental externalities provides an approximation of the societal value of reducing impacts on human health and the environment from electrical energy supply. This method can be used for comparison of resources, including utility and nonutility generation, demand-side management and off-system power purchases. A dollar estimate of the full societal cost of the supply option is established by placing a value on its air, water and terrestrial effects and adding these costs to the option's capital, operating and maintenance costs. This article provides a rationale for monetizing externalities and addresses the strengths and weaknesses of four techniques for monetizing, with examples of the application of each method. The authors preferred technique for incorporating externalities into utility planning in the near term - implied valuation through the estimation of the marginal cost of abatement - is discussed in detail. 2 tabs.

Chernick, P.; Caverhill, E. (Resource Insight, Boston, MA (USA))

1991-03-01T23:59:59.000Z

442

Measuring wind plant capacity value  

DOE Green Energy (OSTI)

Electric utility planners and wind energy researchers pose a common question: What is the capacity value of a wind plant? Tentative answers, which can be phrased in a variety of ways, are based on widely varying definitions and methods of calculation. From the utility`s point of view, a resource that has no capacity value also has a reduced economic value. Utility planners must be able to quantify the capacity value of a wind plant so that investment in conventional generating capacity can be potentially offset by the capacity value of the wind plant. Utility operations personnel must schedule its conventional resources to ensure adequate generation to meet load. Given a choice between two resources, one that can be counted on and the other that can`t, the utility will avoid the risky resource. This choice will be reflected in the price that the utility will pay for the capacity: higher capacity credits result in higher payments. This issue is therefore also important to the other side of the power purchase transaction -- the wind plant developer. Both the utility and the developer must accurately assess the capacity value of wind. This article summarizes and evaluates some common methods of evaluating capacity credit. During the new era of utility deregulation in the United States, it is clear that many changes will occur in both utility planning and operations. However, it is my judgement that the evaluation of capacity credit for wind plants will continue to play an important part in renewable energy development in the future.

Milligan, M.R.

1996-01-01T23:59:59.000Z

443

Better define your customers facility requirements by optimizing your customers processes with value engineering before conceptual design  

SciTech Connect

This paper addresses a new value engineering approach successfully being used at the Idaho National Engineering Laboratory (INEL) in the design process of major construction projects. Of particular interest is how value engineers are applying the principles of Total Quality Management (TQM), utilizing value engineering techniques. Discussed are the associated problems with how major construction projects were previously planned, designed, value engineered, and then redesigned. Benefits of applying value engineering techniques early-on in the design process, far ahead of the traditional time for VE execution, is examined. The author provides a pro-con analysis of the benefits of early-on value engineering effort, and uses data gathered from several value engineering studies to support the conclusions of this paper.

Carpenter, R.L. Jr.

1993-11-19T23:59:59.000Z

444

Median statistics cosmological parameter values  

E-Print Network (OSTI)

We present median statistics central values and ranges for 12 cosmological parameters, using 582 measurements (published during 1990-2010) collected by Croft & Dailey (2011). On comparing to the recent Planck collaboration Ade et al. 2013 estimates of 11 of these parameters, we find good consistency in nine cases.

Crandall, Sara

2013-01-01T23:59:59.000Z

445

Executive Order 13514 Section 9 Recommendations: Federal Greenhouse Gas Accounting and Reporting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Matt Gray Matt Gray DOE FEMP FUPWG, April 14, 2010 Executive Order 13514, Section 9 Recommendations Federal Greenhouse Gas Accounting and Reporting 2 2 President Obama Signing EO 13514 2 On October 5, 2009, President Obama Signed Executive Order 13514, Federal Leadership in Environmental, Energy, and Economic Performance. On January 29, 2010, President Obama announced that the Federal Government will reduce its greenhouse gas (GHG) pollution by 28 percent by 2020. 3 3 Bottom Line Up Front * Executive Order (EO) 13514, Section 9 Guidance Recommendations establish standardized procedures for reporting GHG emissions across the Federal Government. * Section 9 Recommendations submitted to the Council on Environmental Quality (CEQ). CEQ to issue final guidance. * FEMP worked with GSA, DOI, USDA, DOD, EPA, and all major agencies

446

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco AnyConnect Secure Mobility Client Lets Remote Users 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and devices that are running Cisco IOS Software. PLATFORM: Cisco AnyConnect Secure Mobility Client Platform & Affected Versions ABSTRACT: Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a

447

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution  

NLE Websites -- All DOE Office Websites (Extended Search)

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities August 2, 2013 - 2:25am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco WAAS (Wide Area Application Services), which can be exploited by malicious users and malicious people to compromise a vulnerable system. PLATFORM: Versions 5.0.x, 5.1.x, and 5.2.x. ABSTRACT: Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system. REFERENCE LINKS: Secunia Advisory SA54372 CVE-2013-3443 CVE-2013-3444 IMPACT ASSESSMENT: High

448

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

449

Permanent Rules and Executive Orders effective as of 07-22-2010  

NLE Websites -- All DOE Office Websites (Extended Search)

Rules and Executive Orders effective as of 07-22-2010 Rules and Executive Orders effective as of 07-22-2010 Title 748 - Uniform Building Code Commission Chapter 1 Administrative Operations Chapter 3 General Provisions Chapter 5 Fees and Collection of Fees Chapter 7 Commission Committees Chapter 10 Code Adoption Procedures Chapter 15 Code Adopted by State Agencies and Political Subdivisions Permanent Rules and Executive Orders effective as of 07-22-2010 Title 748 - Uniform Building Code Commission Chapter 1 - Administrative Operations 748:1-1-1. Organization The employees of the Commission shall be organized and divided into such divisions or units, as the Commission deems desirable for efficiency. Such organization and division may be revised by the Commission as it finds necessary or expedient. Copies of the organizational chart are available upon

450

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

451

The potential for use of waste-to-energy facility ash: Executive summary. Final report  

DOE Green Energy (OSTI)

This executive summary presents an overview of the investigations, findings, conclusions, and recommendations of the Long Island Regional Planning Board (LIRPB) study of the Potential for Beneficial Use of Waste-to-Energy Facility Ash. The full report consists of the following volumes: Executive Summary; Volume 1: Long Island Ash Management Status; Volume 2: Sampling and Testing Procedures; Volume 3: Environmental Properties; Volume 4: Engineering Properties; Volume 5: Environmental Assessment; Volume 6: Engineering and Economic Evaluation; and Volume 7: Legal and Institutional Issues. Volumes one through seven are briefly summarized in this executive summary with the exception of Volume 2 of the report, which serves as the documentation of the sampling conditions and testing methods used in measuring chemical and physical properties of the ash tested. The study investigated the feasibility of the use of incinerator ash as a substitute for natural aggregate in construction applications.

Koppelman, L.E.; Tanenbaum, E.G. [Long Island Regional Planning Board, Hauppauge, NY (United States)

1994-05-01T23:59:59.000Z

452

Automated Operation of the APS LINAC using the Procedure Execution Manager  

E-Print Network (OSTI)

The Advanced Photon Source (APS) linear accelerator has two thermionic cathode rf guns and one photocathode rf gun. The thermionic guns are used primarily for APS operations while the photocathode gun is used as a free-electron laser (FEL) driver. With each gun requiring a different lattice and timing configuration, the need to change quickly between guns puts great demands on the accelerator operators. Using the Procedure Execution Manager (PEM), a software environment for managing automated procedures, we have made start-up and switch-over of the linac systems both easier and more reliable. The PEM is a graphical user interface written in Tcl/Tk that permits the user to invoke "machine procedures" and control their execution. It allows construction of procedures in a hierarchical, parallel fashion, which makes for efficient execution and development. In this paper, we discuss the features and advantages of the PEM environment as well the specifics of our procedures for the APS linac.

Soliday, R; Borland, M

2000-01-01T23:59:59.000Z

453

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

454

Microsoft Word - S05979_DOE-LM_Executable Plan2009-Final_Rev 2changes accepted_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Order 430.2B Order 430.2B Executable Plan for LM (DOE FEMP Final) December 2009 LMS/S05979 This page intentionally left blank Signature for Site DOE Order 430.2B Executable Plan for LM (DOE FEMP Final) Office Concurrence This page intentionally left blank U.S. Department of Energy DOE Order 430.2B Executable Plan for LM (DOE FEMP Draft) December 2009 Doc. No. S05979 Page i Contents 1.0 Executive Summary ............................................................................................................ 1 2.0 DOE Order 430.2B Goal Summary Progress ..................................................................... 2 3.0 Energy Intensity ..................................................................................................................

455

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Energy.gov (U.S. Department of Energy (DOE))

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

456

20% Wind Energy by 2030: Increasing Wind Energy's Contribution to U.S. Electricity Supply (Executive Summary)  

Energy.gov (U.S. Department of Energy (DOE))

Executive summary of a report on the requirements needed to generate twenty percent of the nation's electricity from wind energy by the year 2030.

457

Companies House Executive Board Terms of Reference Purpose  

E-Print Network (OSTI)

To set the direction for Companies House, maintain overall stewardship and governance, and ensure our organisational capacity to deliver for our customers. Mission To lead Companies House to excel as a registration authority and source of public information, and to be a role model for public service delivery. Scope To deal with business and decisions of a strategic, broad nature: Setting direction ? Instigating strategic thinking and making strategic decisions ? Articulating vision and values for everyone in Companies House ? Checking that what we are doing and what we plan to do is driving us in the right direction Overall stewardship and governance ? Providing a framework for the Agency Business Board, and other related internal management groups, and ensure they deliver against this framework ? Specific corporate governance responsibilities, such as the SIC

unknown authors

2009-01-01T23:59:59.000Z

458

Speciality conference on: toxic substances in the air environment  

SciTech Connect

Papers presented are divided into the following categories: toxic substances legislation; arsenic; vinyl chloride; and emerging problems in toxic emission. Seven papers were abstracted and indexed individually for ERA/EDB. (JGB)

1977-01-01T23:59:59.000Z

459

Smart Grid Characteristics, Values, and Metrics | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Characteristics, Values, and Metrics Smart Grid Characteristics, Values, and Metrics DOE Smart Grid Implementation Worksho Smart Grid Characteristics, Values, and Metrics More...

460

Profiling an application for power consumption during execution on a compute node  

DOE Patents (OSTI)

Methods, apparatus, and products are disclosed for profiling an application for power consumption during execution on a compute node that include: receiving an application for execution on a compute node; identifying a hardware power consumption profile for the compute node, the hardware power consumption profile specifying power consumption for compute node hardware during performance of various processing operations; determining a power consumption profile for the application in dependence upon the application and the hardware power consumption profile for the compute node; and reporting the power consumption profile for the application.

Archer, Charles J; Blocksome, Michael A; Peters, Amanda E; Ratterman, Joseph D; Smith, Brian E

2013-09-17T23:59:59.000Z

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

A method for critical software event execution reliability in high assurance systems  

SciTech Connect

This paper presents a method for Critical Software Event Execution Reliability (Critical SEER). The Critical SEER method is intended for high assurance software that operates in an environment where transient upsets could occur, causing a disturbance of the critical software event execution order, which could cause safety or security hazards. The method has a finite automata based module that watches (hence SEER) and tracks the critical events and ensures they occur in the proper order or else a fail safe state is forced. This method is applied during the analysis, design and implementation phases of software engineering.

Kidd, M.E.C.

1997-03-01T23:59:59.000Z

462

Earned Value Management System RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Earned Value Management System Review Module Earned Value Management System Review Module March 2010 CD-0 O Ea 0 OFFICE OF arned Va C CD-1 F ENVIRO Standard R alue Man Rev Critical Decis CD-2 M ONMENTAL Review Plan agement view Module sion (CD) Ap CD March 2010 L MANAGE n (SRP) t System e pplicability D-3 EMENT (EVMS) CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-1189-2008,

463

ADSORPTION METHOD FOR SEPARATING THORIUM VALUES FROM URANIUM VALUES  

DOE Patents (OSTI)

An improved ion exchange method is described for recovery of uranium and thorium values as separate functions from an aqueous acidic solution containing less than 10/sup -3/ M thorium ions and between 0.1 and 1 M uranyl ions. The solution is passed through a bed of cation exchange resin in the acid form to adsorb all the thorium ions and a portion of the uranyl ions. The uranium is eluted by means of aqueous 0.1 to 0.4 M sulfuric acid. The thorium may then be stripped from the resin by elution with aqueous 0.5 M oxalic acid.

Boyd, G.E.; Russell, E.R.; Schubert, J.

1959-08-01T23:59:59.000Z

464

Toxicity Data to Determine Refrigerant Concentration Limits  

SciTech Connect

This report reviews toxicity data, identifies sources for them, and presents resulting exposure limits for refrigerants for consideration by qualified parties in developing safety guides, standards, codes, and regulations. It outlines a method to calculate an acute toxicity exposure limit (ATEL) and from it a recommended refrigerant concentration limit (RCL) for emergency exposures. The report focuses on acute toxicity with particular attention to lethality, cardiac sensitization, anesthetic and central nervous system effects, and other escape-impairing effects. It addresses R-11, R-12, R-22, R-23, R-113, R-114, R-116, R-123, R-124, R-125, R-134, R-134a, R-E134, R-141b, R-142b, R-143a, R-152a, R-218, R-227ea, R-236fa, R-245ca, R-245fa, R-290, R-500, R-502, R-600a, R-717, and R-744. It summarizes additional data for R-14, R-115, R-170 (ethane), R-C318, R-600 (n-butane), and R-1270 (propylene) to enable calculation of limits for blends incorporating them. The report summarizes the data a nd related safety information, including classifications and flammability data. It also presents a series of tables with proposed ATEL and RCL concentrations-in dimensionless form and the latter also in both metric (SI) and inch-pound (IP) units of measure-for both the cited refrigerants and 66 zerotropic and azeotropic blends. They include common refrigerants, such as R-404A, R-407C, R-410A, and R-507A, as well as others in commercial or developmental status. Appendices provide profiles for the cited single-compound refrigerants and for R-500 and R-502 as well as narrative toxicity summaries for common refrigerants. The report includes an extensive set of references.

Calm, James M.

2000-09-30T23:59:59.000Z

465

Toxics Release Inventory (TRI) 1987--1996  

SciTech Connect

The Toxics Release Inventory (TRI), published annually by the US EPA, is a valuable source of information about over 300 toxic chemicals that are being used, manufactured, treated, transported, or released into the environment. Using this information, citizens, businesses, and governments can work together to protect the quality of their land, air and water. The new software used in the 1987--1996 TRI CD-ROM, is flexible and powerful, capable of searching over 200 fields (e.g., by chemical, company, kind of release, or zip code, and across multiple years of data). The CD-ROM also allows users to conduct multiple and complex queries, which are especially useful to those who wish to analyze trends or perform statistical analysis. The following information is found on the TRI CD: facility name, location and type of business; off-site locations to which the facility transfers toxic chemicals in waste; whether the chemical is manufactured (including importation), processed, or otherwise used and the general categories of use of the chemical; an estimate (in ranges) of the maximum amounts of the toxic chemical present at the facility at any time during the preceding year; quantity of the chemical entering each medium -- air, land, and water -- annually; waste treatment/disposal methods and efficiency of methods for each waste stream; and optional information on waste minimization. In addition to the TRI data, the CD-ROM provides a wealth of other TRI information, such as: tutorial, Annual TRI Data Release Book, State Fact Sheets; TRI`s reporting Forms R and A; and Chemical Fact Sheets on many of the TRI chemicals. The 1987--1996 TRI CD-ROM is a user-friendly Windows application that includes LANDVIEW III, a geographic information systems (GIS) package. The GIS package allows the user to locate TRI facilities and other EPA sites in relation to roads, rivers, schools, hospitals and more.

NONE

1999-10-01T23:59:59.000Z

466

Hydrogen and Gaseous Fuel Safety and Toxicity  

DOE Green Energy (OSTI)

Non-traditional motor fuels are receiving increased attention and use. This paper examines the safety of three alternative gaseous fuels plus gasoline and the advantages and disadvantages of each. The gaseous fuels are hydrogen, methane (natural gas), and propane. Qualitatively, the overall risks of the four fuels should be close. Gasoline is the most toxic. For small leaks, hydrogen has the highest ignition probability and the gaseous fuels have the highest risk of a burning jet or cloud.

Lee C. Cadwallader; J. Sephen Herring

2007-06-01T23:59:59.000Z

467

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

468

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

469

Implementing the executive order of environmental justice at the US Department of Energy  

Science Conference Proceedings (OSTI)

Environmental justice has grown out of a grassroots movement aimed at forging links between environmental decision-making, civil rights, and social justice. Public interest in environmental justice translates into the application of community organizing, coalition-building, and legal strategies developed in the civil rights movement to address a disproportionate burden of risk and exposure to pollution borne by low-income and minority communities. Currently, public interest activities in the US are most concerned with siting polluting facilities in low-income and minority communities, with the slow pace of contamination clean-up in these communities, and with the way in which environmental planning decisions are made. The federal response to these activities has included several pieces of proposed Congressional legislation (none of which have been enacted to date), and an Executive Order issued in February 1994 (Executive Order 12898, Federal Actions to Address Environmental Justice in minority Populations and Low Income Populations), directing each agency of the executive branch to determine whether administrative changes are needed to promote environmental justice goals. This paper reports on efforts undertaken to date by the US Department of Energy (DOE) to implement the Executive order. While DOE faces relatively few decisions about siting new facilities outside its current installations, in recent years the Department has begun a massive environmental restoration and waste management challenge. In addition the Department is responsible for carrying out the nation`s energy policy, which allocates economic and environmental benefits and burdens.

Shields, G.; Liebow, E.; Lach, D. [Pacific Northwest Lab., Richland, WA (United States); Holmes, R. [Clark Atlanta Univ., GA (United States); Pearson, M.; Crawford, B. [USDOE, Washington, DC (United States)

1995-06-01T23:59:59.000Z

470

Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments  

Science Conference Proceedings (OSTI)

It is our pleasure to welcome you to the 5th ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments (VEE'09). This year's conference continues the VEE tradition of being the premier forum for presentation of research results on all aspects ...

Antony Hosking; David Bacon; Orran Krieger

2009-03-01T23:59:59.000Z

471

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

472

Town of Hempstead: Project Energy, From Project Execution to Outreach & Education  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Execution To Outreach & Education Town of Hempstead? * Located in western Long Island,bordering Queens, NY * Established 1644 * Population: 760,000 ENERGY PARK Information Gathering * Motivated by Conservation Commissioner Ron Masters * LIPA Feasibility Study on Wind * Installed Anemometer - Wind Data * Informational Meetings: * Local Municipalities, Universities, Private Industry

473

August 27, 2009 TO: Executive Team, Twin Cities Deans, Faculty Researchers  

E-Print Network (OSTI)

____________________________________________________________________________________________________________ August 27, 2009 TO: Executive Team, Twin Cities Deans, Faculty Researchers FROM: Kathleen O'Brien, Vice President Subject: Status of Central Corridor Light Rail Transit Project's Impact on the University Corridor Light Rail Transit (CCLRT) line. As a transit-oriented community, with two- thirds of University

Amin, S. Massoud

474

Empirical Evaluation of Conservative and Optimistic Discrete Event Execution on Cloud and VM Platforms  

Science Conference Proceedings (OSTI)

Virtual machine (VM) technologies, especially those offered via Cloud platforms, present new dimensions with respect to performance and cost in executing parallel discrete event simulation (PDES) applications. Due to the introduction of overall cost as a metric, the choice of the highest-end computing configuration is no longer the most economical one. Moreover, runtime dynamics unique to VM platforms introduce new performance characteristics, and the variety of possible VM configurations give rise to a range of choices for hosting a PDES run. Here, an empirical study of these issues is undertaken to guide an understanding of the dynamics, trends and trade-offs in executing PDES on VM/Cloud platforms. Performance results and cost measures are obtained from actual execution of a range of scenarios in two PDES benchmark applications on the Amazon Cloud offerings and on a high-end VM host machine. The data reveals interesting insights into the new VM-PDES dynamics that come into play and also leads to counter-intuitive guidelines with respect to choosing the best and second-best configurations when overall cost of execution is considered. In particular, it is found that choosing the highest-end VM configuration guarantees neither the best runtime nor the least cost. Interestingly, choosing a (suitably scaled) low-end VM configuration provides the least overall cost without adversely affecting the total runtime.

Yoginath, Srikanth B [ORNL; Perumalla, Kalyan S [ORNL

2013-01-01T23:59:59.000Z

475

A compiler framework for the reduction of worst-case execution times  

Science Conference Proceedings (OSTI)

The current practice to design software for real-time systems is tedious. There is almost no tool support that assists the designer in automatically deriving safe bounds of the worst-case execution time (WCET) of a system during code ... Keywords: Code generation, Compiler, Optimization, Real-time, WCET

Heiko Falk; Paul Lokuciejewski

2010-10-01T23:59:59.000Z

476

The procedure execution manager and its application to Advanced Photon Source operation  

SciTech Connect

The Procedure Execution Manager (PEM) combines a complete scripting environment for coding accelerator operation procedures with a manager application for executing and monitoring the procedures. PEM is based on Tcl/Tk, a supporting widget library, and the dp-tcl extension for distributed processing. The scripting environment provides support for distributed, parallel execution of procedures along with join and abort operations. Nesting of procedures is supported, permitting the same code to run as a top-level procedure under operator control or as a subroutine under control of another procedure. The manager application allows an operator to execute one or more procedures in automatic, semi-automatic, or manual modes. It also provides a standard way for operators to interact with procedures. A number of successful applications of PEM to accelerator operations have been made to date. These include start-up, shutdown, and other control of the positron accumulator ring (PAR), low-energy transport (LET) lines, and the booster rf systems. The PAR/LET procedures make nested use of PEM`s ability to run parallel procedures. There are also a number of procedures to guide and assist tune-up operations, to make accelerator physics measurements, and to diagnose equipment. Because of the success of the existing procedures, expanded use of PEM is planned.

Borland, M. [Argonne National Lab., IL (United States). Advanced Photon Source

1997-06-01T23:59:59.000Z

477

Secure virtual architecture: a safe execution environment for commodity operating systems  

Science Conference Proceedings (OSTI)

This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach, which we call Secure Virtual Architecture (SVA), defines ... Keywords: compiler, memory safety, operating systems, security, type safety, typed assembly language, virtual machine

John Criswell; Andrew Lenharth; Dinakar Dhurjati; Vikram Adve

2007-10-01T23:59:59.000Z

478

Systematic verification of multi-agent systems based on rigorous executable specifications  

Science Conference Proceedings (OSTI)

The multi-agent paradigm provides abstractions that facilitate the design of complex systems consisting of heterogeneous, autonomous components. Most methodologies focus on the specification of complex agent interactions using the social system metaphor, ... Keywords: MAS, agent-based systems, agent-oriented software engineering, agents, executable specifications, formal verification, model checking, multi-agent systems, simulation

Holger Giese; Florian Klein

2007-04-01T23:59:59.000Z

479

FWP executive summaries: basic energy sciences materials sciences and engineering program (SNL/NM).  

Science Conference Proceedings (OSTI)

This report presents an Executive Summary of the various elements of the Materials Sciences and Engineering Program which is funded by the Division of Materials Sciences and Engineering, Office of Basic Energy Sciences, U.S. Department of Energy at Sandia National Laboratories, New Mexico. A general programmatic overview is also presented.

Samara, George A.; Simmons, Jerry A.

2006-07-01T23:59:59.000Z

480

SableVM: a research framework for the efficient execution of java bytecode  

Science Conference Proceedings (OSTI)

SableVM is an open-source virtual machine for Java intended as a research framework for efficient execution of Java bytecode. The framework is essentially composed of an extensible bytecode interpreter using state-of-the-art and innovative techniques. ...

Etienne M. Gagnon; Laurie J. Hendren

2001-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "toxicity values executive" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Nuclear Maintenance Applications Center: Effective Refueling Outage Preparation and Execution Guidance--Revision to 1014480  

Science Conference Proceedings (OSTI)

This report provides updated, current guidance to assist outage managers and teams during preparation and execution phases of a nuclear refueling outage. Included is guidance on how the outage activities support long-range and strategic plans developed by the site or fleet of units.

2011-12-13T23:59:59.000Z

482

Robust runtime optimization and skew-resistant execution of analytical SPARQL queries on pig  

Science Conference Proceedings (OSTI)

We describe a system that incrementally translates SPARQL queries to Pig Latin and executes them on a Hadoop cluster. This system is designed to work efficiently on complex queries with many self-joins over huge datasets, avoiding job failures even in ...

Spyros Kotoulas; Jacopo Urbani; Peter Boncz; Peter Mika

2012-11-01T23:59:59.000Z

483

U.S. Army Modeling and Simulation Executable Architecture Deployment Cloud Virtualization Strategy  

Science Conference Proceedings (OSTI)

Our research has included leveraging Virtualization Technologies to provide integration, configuration and execution relief of Modeling & Simulation (M&S) event planning, instantiation and analysis. We have achieved this through a single service that ... Keywords: Virtualization, Cloud Computing, Modeling & Simulation (M&S), Distributed M&S, Hypervisor

Shaun Murphy; Scott Gallant; Chris Gaughan; Manny Diego

2012-05-01T23:59:59.000Z

484

Efficient heterogeneous execution on large multicore and accelerator platforms: Case study using a block tridiagonal solver  

Science Conference Proceedings (OSTI)

The algorithmic and implementation principles are explored in gainfully exploiting GPU accelerators in conjunction with multicore processors on high-end systems with large numbers of compute nodes, and evaluated in an implementation of a scalable block ... Keywords: Accelerator, GPU, Heterogeneous execution, Linear algebra, Memory management, Tridiagonal solver

Alfred J. Park, Kalyan S. Perumalla

2013-12-01T23:59:59.000Z

485

Understanding Ajax applications by connecting client and server-side execution traces  

Science Conference Proceedings (OSTI)

Ajax-enabled Web applications are a new breed of highly interactive, highly dynamic Web applications. Although Ajax allows developers to create rich Web applications, Ajax applications can be difficult to comprehend and thus to maintain. For this reason, ... Keywords: Ajax, Dynamic analysis, Program comprehension, Reverse engineering, Web applications, execution traces

Andy Zaidman; Nick Matthijssen; Margaret-Anne Storey; Arie Deursen

2013-04-01T23:59:59.000Z

486

An approach to detecting duplicate bug reports using natural language and execution information  

Science Conference Proceedings (OSTI)

An open source project typically maintains an open bug repository so that bug reports from all over the world can be gathered. When a new bug report is submitted to the repository, a person, called a triager, examines whether it is a duplicate of an ... Keywords: duplicate bug report, execution information, information retrieval

Xiaoyin Wang; Lu Zhang; Tao Xie; John Anvik; Jiasu Sun

2008-05-01T23:59:59.000Z

487

Enhancing the performance of assisted execution runtime systems through hardware/software techniques  

Science Conference Proceedings (OSTI)

To meet the expected performance, future exascale systems will require programmers to increase the level of parallelism of their applications. Novel programming models simplify parallel programming at the cost of increasing runtime overheard. Assisted ... Keywords: assisted execution, exascale, performance, transactional memory

Gokcen Kestor; Roberto Gioiosa; Osman Sabri Unsal; Adrian Cristal; Mateo Valero

2012-06-01T23:59:59.000Z

488

Data parallel execution challenges and runtime performance of agent simulations on GPUs  

Science Conference Proceedings (OSTI)

Programmable graphics processing units (GPUs) have emerged as excellent computational platforms for certain general-purpose applications. The data parallel execution capabilities of GPUs specifically point to the potential for effective use in simulations ... Keywords: agent-based simulation, emergent behavior, graphical processing units, large-scale simulation, parallel simulation

Kalyan S. Perumalla; Brandon G. Aaby

2008-04-01T23:59:59.000Z

489

Empirical evaluation of conservative and optimistic discrete event execution on cloud and VM platforms  

Science Conference Proceedings (OSTI)

Virtual machine (VM) technologies, especially those offered via Cloud platforms, present new dimensions with respect to performance and cost in executing parallel discrete event simulation (PDES) applications. Due to the introduction of overall cost ... Keywords: cloud computing, conservative simulation, optimistic simulation, parallel discrete event simulation, performance study, virtual machine

Srikanth B. Yoginath, Kalyan S. Perumalla

2013-05-01T23:59:59.000Z

490

Office of the Senior Vice President and Provost Executive Assistant to the Provost  

E-Print Network (OSTI)

President and Provost Mary Ann Rankin Schools and Colleges Updated March 1, 2013 Founding Director Institute of Public Health Dean Jane Clark College of Computer, Mathematical & Natural Sciences Dean Jayanth Banavar for International Affairs Ross Lewin Associate Vice President for Personnel and Budget Cynthia Hale Executive

Shapiro, Benjamin

491

Scalable Identification of Load Imbalance in Parallel Executions Using Call Path Profiles  

Science Conference Proceedings (OSTI)

Applications must scale well to make efficient use of today's class of petascale computers, which contain hundreds of thousands of processor cores. Inefficiencies that do not even appear in modest-scale executions can become major bottlenecks in large-scale ...

Nathan R. Tallent; Laksono Adhianto; John M. Mellor-Crummey

2010-11-01T23:59:59.000Z

492

SIPC Advisory -Vulnerability in Windows Graphics Rendering Engine Could Allow Remote Code Execution -RISK: HIGH  

E-Print Network (OSTI)

SIPC Advisory - Vulnerability in Windows Graphics Rendering Engine Could Allow Remote Code/4/2011 SUBJECT: Vulnerability in Windows Graphics Rendering Engine Could Allow Remote Code Execution OVERVIEW: A new vulnerability has been discovered in Microsoft Windows Graphics Rendering Engine, which could

Holliday, Vance T.

493

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

494

Annual Report of the EURATOM/CCFE Fusion Programme 2011/12 1 Executive Summary  

E-Print Network (OSTI)

facilities including layout. The need to develop a palletized hot cell Remote Handling system (shown.22: The palletized remote handling system with a multi-module sector in the Hot Cell. 1.19 1 Executive Summary #12 with European partners; · Remote handling system, in particular the design for the Neutral Beam Hot Cell

495

Yellow phosphorus process to convert toxic chemicals to non-toxic products  

DOE Patents (OSTI)

The present invention relates to a process for generating reactive species for destroying toxic chemicals. This process first contacts air or oxygen with aqueous emulsions of molten yellow phosphorus. This contact results in rapid production of abundant reactive species such as O, O[sub 3], PO, PO[sub 2], etc. A gaseous or liquid aqueous solution organic or inorganic chemicals is next contacted by these reactive species to reduce the concentration of toxic chemical and result in a non-toxic product. The final oxidation product of yellow phosphorus is phosphoric acid of a quality which can be recovered for commercial use. A process is developed such that the byproduct, phosphoric acid, is obtained without contamination of toxic species in liquids treated. A gas stream containing ozone without contamination of phosphorus containing species is also obtained in a simple and cost-effective manner. This process is demonstrated to be effective for destroying many types of toxic organic, or inorganic, compounds, including polychlorinated biphenyls (PCB), aromatic chlorides, amines, alcohols, acids, nitro aromatics, aliphatic chlorides, polynuclear aromatic compounds (PAH), dyes, pesticides, sulfides, hydroxyamines, ureas, dithionates and the like. 20 figs.

Chang, S.G.

1994-07-26T23:59:59.000Z

496

1998 Toxic Chemical Release Inventory Report for the Emergency Planning and Community Right-to-Know Act of 1986, Title III  

SciTech Connect

The Emergency Planning and Community Right-to-Know Act (EPCRA) of 1986 [also known as the Superfund Amendment and Reauthorization Act (SARA), Title III], as modified by Executive Order 12856, requires that all federal facilities evaluate the need to submit an annual Toxic Chemical Release Inventory report as prescribed in Title III, Section 313 of this Act. This annual report is due every July for the preceding calendar year. Owners and operators who manufacture, process, or otherwise use certain toxic chemicals above listed threshold quantities are required to report their toxic chemical releases to all environmental mediums (air, water, soil, etc.). At Los Alamos National Laboratory (LANL), no EPCRA Section 313 chemicals were used in 1998 above the reportable threshold limits of 10,000 lb or 25,000 lb. Therefore LANL was not required to submit any Toxic Chemical Release Inventory reports (Form Rs) for 1998. This document was prepared to provide a detailed description of the evaluation on chemical usage and EPCRA Section 313 threshold determinations for LANL for 1998.

Marjorie B. Stockton

1999-11-01T23:59:59.000Z

497

U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: NetBSD System Call Return Value Validation Flaw Lets Local 3: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges June 18, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in NetBSD. A local user can obtain elevated privileges on the target system. PLATFORM: Version(s): 4.0.*, 5.0.*, 5.1, 6.0 Beta ABSTRACT: On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system. reference LINKS: Vendor Advisory Security Tracker ID 1027178 CVE-2012-0217

498

Radioisotope Power Systems: An Imperative for Maintaining U.S. Leadership in Space Exploration (Free Executive Summary)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Radioisotope Power Systems: An Imperative for Maintaining U.S. Leadership in Space Exploration (Free Executive Summary) Radioisotope Power Systems: An Imperative for Maintaining U.S. Leadership in Space Exploration (Free Executive Summary) http://www.nap.edu/catalog/12653.html Free Executive Summary ISBN: 978-0-309-13857-4, 74 pages, 8 1/2 x 11, paperback (2009) This executive summary plus thousands more available at www.nap.edu. Radioisotope Power Systems: An Imperative for Maintaining U.S. Leadership in Space Exploration Radioisotope Power Systems Committee, National Research Council This free executive summary is provided by the National Academies as part of our mission to educate the world on issues of science, engineering, and health. If you are interested in reading the full book, please visit us online at http://www.nap.edu/catalog/12653.html . You may browse and