Powered by Deep Web Technologies
Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

2

T-643: HP OpenView Storage Data Protector Unspecified Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

643: HP OpenView Storage Data Protector Unspecified Code 643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability June 9, 2011 - 3:45pm Addthis PROBLEM: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability PLATFORM: Versions 6.0, 6.10, and 6.11 running on HP-UX, Solaris, Linux and Windows. ABSTRACT: A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Secunia Advisory SA44884 CVE-2011-1864 SecurityTracker Alert ID: 1025620 HP Document ID: c02712867 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

3

U-099: MySQL Unspecified Code Execution Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

099: MySQL Unspecified Code Execution Vulnerability 099: MySQL Unspecified Code Execution Vulnerability U-099: MySQL Unspecified Code Execution Vulnerability February 9, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in MySQL, which can be exploited by malicious people to compromise a vulnerable system. PLATFORM: MySQL 5.x ABSTRACT: Successful exploitation allows execution of arbitrary code. Reference LINKS: Secunia Advisory SA47894 No CVE references currently available. IMPACT ASSESSMENT: Medium Discussion: The vulnerability is reported in version 5.5.20. Other versions may also be affected. The exploit has been tested with mysql-5.5.20-debian6.0-i686.deb on Debian 6.0. Impact: System access from local network Solution: An effective workaround cannot currently be provided due to limited vulnerability details.

4

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

5

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

6

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

7

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

8

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary...

9

U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix Provisioning Services Unspecified Flaw Lets Remote 1: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code May 3, 2012 - 7:00am Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 6.1 and prior ABSTRACT: A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027004 Secunia Advisory SA48971 Citrix advisory IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted packet to trigger an unspecified flaw and execute arbitrary code on the target system. The code will run with the privileges of the target service.

10

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Citrix Provisioning Services Unspecified Flaw Let's Remote 41: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code January 24, 2011 - 5:34pm Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code PLATFORM: * Provisioning Services 5.1 * Provisioning Services 5.6 ABSTRACT: A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6. reference LINKS:

11

U-122 Google Chrome Two Code Execution Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Google Chrome Two Code Execution Vulnerabilities 2 Google Chrome Two Code Execution Vulnerabilities U-122 Google Chrome Two Code Execution Vulnerabilities March 12, 2012 - 7:00am Addthis PROBLEM: Google Chrome Two Code Execution Vulnerabilities PLATFORM: Google Chrome 17.x ABSTRACT: Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory SA48321 SecurityTracker Alert ID: 1026776 CVE-2011-3046 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger an unspecified flaw and execute arbitrary code (outside of the

12

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

code via network, User access via network Solution: The vendor has issued a fix. The patch is available at HP support Center Addthis Related Articles U-137: HP Performance...

13

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

14

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

15

T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

22: Adobe Acrobat and Reader Unspecified Memory Corruption 22: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability May 13, 2011 - 3:25am Addthis PROBLEM: Adobe Acrobat and Reader contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system. PLATFORM: Adobe Reader versions 9.4.1 and prior, versions 8.2.5 and prior, and version 10.0 Acrobat Standard and Professional versions 9.4.1 and prior and version 10.0 Acrobat Standard and Professional versions 8.2.5 and prior Acrobat Professional Extended versions 9.4.1 and prior Acrobat 3D versions 8.2.5 and prior Adobe Flash Player versions 10.2.159.1 and prior for Windows, Macintosh, Linux, and Solaris ABSTRACT: The vulnerability is due to an unspecified error in the affected software

16

U-013: HP Data Protector Multiple Unspecified Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP Data Protector Multiple Unspecified Vulnerabilities 3: HP Data Protector Multiple Unspecified Vulnerabilities U-013: HP Data Protector Multiple Unspecified Vulnerabilities October 18, 2011 - 9:00am Addthis PROBLEM: HP Data Protector Multiple Unspecified Vulnerabilities. PLATFORM: HP Data Protector Notebook Extension 6.20; HP Data Protector for Personal Computers 7.0 ABSTRACT: Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Document ID: c03054543 SecurityTracker Alert ID: 1026195 Secunia Advisory: SA46468 CVE-2011-3156 CVE-2011-3157 CVE-2011-3158 CVE-2011-3159 CVE-2011-3160 CVE-2011-3161 CVE-2011-3162 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities has been identified with HP Data Protector Notebook Extension. These vulnerabilities could be remotely

17

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

18

V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Novell iPrint Client Unspecified Buffer Overflow 8: Novell iPrint Client Unspecified Buffer Overflow Vulnerability V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability May 3, 2013 - 6:00am Addthis PROBLEM: Novell iPrint Client Unspecified Buffer Overflow Vulnerability PLATFORM: Novell iPrint Client 5.x ABSTRACT: A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system REFERENCE LINKS: Secunia Advisory SA53261 Novell KB 7012344 Novell KB 7008708 CVE-2013-1091 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an unspecified error and can be exploited to cause a stack-based buffer overflow. IMPACT: Successful exploitation may allow execution of arbitrary code SOLUTION: Vendor recommendation is to update to Version 5.90

19

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

099: Honeywell Multiple Products ActiveX Control Remote Code 099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

20

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Honeywell Multiple Products ActiveX Control Remote Code 9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Apache OFBiz Cross-Site Scripting and Code Execution 9: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities April 17, 2012 - 8:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM: Apache OFBiz 10.x ABSTRACT: The vulnerabilities are reported in version 10.04.01. Prior versions may also be affected. references LINKS: Vendor Advisory Secunia Advisory 48800 CVE-2012-1621 IMPACT ASSESSMENT: High Discussion: 1) Certain unspecified input is not properly sanitised within the "getServerError()" function in checkoutProcess.js before being returned to the user. This can be exploited to execute arbitrary HTML and script code

22

T-613: Microsoft Excel Axis Properties Remote Code Execution...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis...

23

Unspecified technologies | Open Energy Information  

Open Energy Info (EERE)

Unspecified technologies Unspecified technologies Jump to: navigation, search The following contains the list of 71 Unspecified technologies Incentives. CSV (rows 1 - 71) Incentive Incentive Type Place Applicable Sector Eligible Technologies Active AEP (Central and North) - Residential Energy Efficiency Programs (Texas) Utility Rebate Program Texas Construction Installer/Contractor Multi-Family Residential Building Insulation Caulking/Weather-stripping Comprehensive Measures/Whole Building Custom/Others pending approval Duct/Air sealing Unspecified technologies Yes AEP (SWEPCO) - Residential Energy Efficiency Programs (Texas) Utility Rebate Program Texas Construction Installer/Contractor Multi-Family Residential Building Insulation Caulking/Weather-stripping Comprehensive Measures/Whole Building

24

U-174: Serendipity Unspecified SQL Injection Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Serendipity Unspecified SQL Injection Vulnerability 4: Serendipity Unspecified SQL Injection Vulnerability U-174: Serendipity Unspecified SQL Injection Vulnerability May 22, 2012 - 7:00am Addthis PROBLEM: Serendipity Unspecified SQL Injection Vulnerability PLATFORM: 1.6.1 and prior versions ABSTRACT: A vulnerability was reported in Serendipity. A remote user can inject SQL commands. Reference Links: SecurityTracker Alert ID: 1027079 Secunia Advisory SA49234 CVE-2012-2762 IMPACT ASSESSMENT: Medium Discussion: The 'include/functions_trackbacks.inc.php' script does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database. Impact: A remote user can execute SQL commands on the underlying database. Solution: The vendor has issued a fix (1.6.2).

25

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

613: Microsoft Excel Axis Properties Remote Code Execution 613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis PROBLEM: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fail to sufficiently validate user-supplied input. PLATFORM: Microsoft Excel (2002-2010) ABSTRACT: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service

26

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

a specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target user's system...

27

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 -...

28

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

29

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

30

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update  

NLE Websites -- All DOE Office Websites (Extended Search)

8: HP LaserJet Printers Unspecified Flaw Lets Remote Users 8: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code November 30, 2011 - 8:15am Addthis PROBLEM: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code . PLATFORM: HP LaserJet Printers manufactured prior to 2009 ABSTRACT A remote user can upgrade the printer's firmware with arbitrary code. reference LINKS: SecurityTracker Alert ID:1026357 HP Security for Imaging and Printing HP Clarifies on Printer Security IMPACT ASSESSMENT: Low Discussion: A vulnerability was reported in some HP LaserJet Printers. A remote user can update the firmware with arbitrary code. A remote user can send a specially crafted print job or specially crafted data to the

31

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

32

System for loading executable code into volatile memory in a downhole tool  

DOE Patents (OSTI)

A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

2007-09-25T23:59:59.000Z

33

T-622: Adobe Acrobat and Reader Unspecified Memory Corruption...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability May 13, 2011 - 3:25am Addthis...

34

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

35

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

36

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

37

U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code 136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code March 29, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Lets Remote Users Execute Arbitrary Code PLATFORM: 11.1.102.63 and prior versions ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. rEFERENCE LINKS: SecurityTracker Alert ID: 1026859 CVE-2012-0772 Security update available for Adobe Flash Player IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A memory corruption

38

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

39

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

40

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

097: PHP "php_register_variable_ex()" Code Execution 097: PHP "php_register_variable_ex()" Code Execution Vulnerability U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM: PHP "php_register_variable_ex()" Code Execution Vulnerability PLATFORM: PHP 5.3.x ABSTRACT: Execution of arbitrary code via network as well as user access via network reference LINKS: PHP Security Archive SecurityTracker Alert ID: 1026631 Secunia Advisory SA47806 CVE-2012-0830 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in PHP, which can be exploited by malicious people to compromise a vulnerable system. Impact: A remote user can send specially crafted data to trigger a memory error in php_register_variable_ex() and execute arbitrary code on the target system.

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

42

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

43

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

44

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

45

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

46

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

47

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

48

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

49

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

50

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE))

A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

51

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

52

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

53

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

54

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

55

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

56

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

57

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

58

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

59

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

52: Drupal Core Access Bypass and Arbitrary PHP Code Execution 52: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core Bugtraq ID: 56993 Secunia Advisory SA51517 CVE-2012-5651 CVE-2012-5652 CVE-2012-5653 IMPACT ASSESSMENT: Medium DISCUSSION: An attacker can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid in launching further attacks.

60

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

69: Telnet code execution vulnerability: FreeBSD and Kerberos 69: Telnet code execution vulnerability: FreeBSD and Kerberos U-069: Telnet code execution vulnerability: FreeBSD and Kerberos December 27, 2011 - 5:18am Addthis PROBLEM: Telnet code execution vulnerability: FreeBSD and Kerberos PLATFORM: Operating System: FreeBSD 7.1, 7.3, 8.0 and 8.1 and Software: Kerberos ABSTRACT: Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. reference LINKS: FreeBSD-SA-11:08.telnetd MITKRB5-SA-2011-008 Secunia Advisory: SA47397 (FreeBSD) Secunia Advisory: SA47348 (Kerberos) SecurityTracker Alert ID: 1026460 CVE-2011-4862 IMPACT ASSESSMENT: High Discussion: When an encryption key is supplied via the TELNET protocol, its length is not validated before the key is copied into a fixed-size buffer. The telnet

62

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

63

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

64

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code 6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28, 2011 - 3:42pm Addthis PROBLEM: Functional code that demonstrates an exploit of the Microsoft Office Visio DXF file handling arbitrary code execution vulnerability is publicly available. PLATFORM: Microsoft Office Visio 2002 SP2 and prior Microsoft Office Visio 2003 SP3 and prior Microsoft Office Visio 2007 SP2 and prior ABSTRACT: Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. reference LINKS: IntelliShield ID: 20432 Original Release: S516 CVE-2010-1681 IMPACT ASSESSMENT: High Discussion: The vulnerability exists because the affected software does not perform

65

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

66

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

67

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

68

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

69

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

70

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

71

T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code 29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January 6, 2011 - 2:53pm Addthis PROBLEM: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability PLATFORM: Apple Mac OS X Server 10.6 - 10.6.5, Apple Mac OS X 10.6 - 10.6.5 Vulnerable Platforms Details ABSTRACT: A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS

72

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

73

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

74

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

75

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

76

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

77

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

78

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

79

Classification of Code Annotations and Discussion of Compiler-Support for Worst-Case Execution Time Analysis  

E-Print Network (OSTI)

of energy consumption, resource-aware code generation, or re- targetable code generators. Program execution providing explicit sup- port for WCET analysis would have on usage of these code annotations is discussed

80

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

82

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

83

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file. Impact: An attacker can exploit...

84

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution  

NLE Websites -- All DOE Office Websites (Extended Search)

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities August 2, 2013 - 2:25am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco WAAS (Wide Area Application Services), which can be exploited by malicious users and malicious people to compromise a vulnerable system. PLATFORM: Versions 5.0.x, 5.1.x, and 5.2.x. ABSTRACT: Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system. REFERENCE LINKS: Secunia Advisory SA54372 CVE-2013-3443 CVE-2013-3444 IMPACT ASSESSMENT: High

85

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

86

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

87

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

88

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

89

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

90

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

91

The role of the PIRT process in identifying code improvements and executing code development  

SciTech Connect

In September 1988, the USNRC issued a revised ECCS rule for light water reactors that allows, as an option, the use of best estimate (BE) plus uncertainty methods in safety analysis. The key feature of this licensing option relates to quantification of the uncertainty in the determination that an NPP has a {open_quotes}low{close_quotes} probability of violating the safety criteria specified in 10 CFR 50. To support the 1988 licensing revision, the USNRC and its contractors developed the CSAU evaluation methodology to demonstrate the feasibility of the BE plus uncertainty approach. The PIRT process, Step 3 in the CSAU methodology, was originally formulated to support the BE plus uncertainty licensing option as executed in the CSAU approach to safety analysis. Subsequent work has shown the PIRT process to be a much more powerful tool than conceived in its original form. Through further development and application, the PIRT process has shown itself to be a robust means to establish safety analysis computer code phenomenological requirements in their order of importance to such analyses. Used early in research directed toward these objectives, PIRT results also provide the technical basis and cost effective organization for new experimental programs needed to improve the safety analysis codes for new applications. The primary purpose of this paper is to describe the generic PIRT process, including typical and common illustrations from prior applications. The secondary objective is to provide guidance to future applications of the process to help them focus, in a graded approach, on systems, components, processes and phenomena that have been common in several prior applications.

Wilson, G.E. [Idaho National Engineering Lab., Idaho Falls, ID (United States); Boyack, B.E. [Los Alamos National Lab., NM (United States)

1997-07-01T23:59:59.000Z

92

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Energy.gov (U.S. Department of Energy (DOE))

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

93

U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE))

A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

94

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-052:...

95

U-120: RSA SecurID Software Token Converter Unspecified Buffer...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-066: Adobe Acrobat...

96

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

48: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code 48: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability April 16, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in ActiveScriptRuby, which can be exploited by malicious people to potentially compromise a user's system. PLATFORM: Version(s): 1.2.2.0 and prior ABSTRACT: The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands. reference LINKS: Secunia Advisory 48811 CVE-2012-1241 IMPACT ASSESSMENT: High Discussion: ActiveScriptRuby is a software to implement Ruby into a Windows environment. ActiveScriptRuby contains a vulnerability where an arbitrary Ruby script may be executed on the web browser that can execute ActiveX

97

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Secure Gateway Unspecified Vulnerability 6: Citrix Secure Gateway Unspecified Vulnerability T-566: Citrix Secure Gateway Unspecified Vulnerability February 28, 2011 - 11:22pm Addthis PROBLEM: Citrix Secure Gateway Unspecified Vulnerability. PLATFORM: Citrix Secure Gateway version 3.1.4 ABSTRACT: A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia Advisory SA43497 Citrix Support IMPACT ASSESSMENT: High Discussion: This vulnerability only affects Secure Gateway version 3.1.4. Secure Gateway version 3.2.0 is not affected by this vulnerability, but Citrix recommends that customers currently using this version upgrade their deployments to version 3.2.1 in line with the guidance provided in

98

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

99

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Access Gateway Unspecified Security Bypass 6: Citrix Access Gateway Unspecified Security Bypass Vulnerability V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway PLATFORM: Standard Edition 5.0.x prior to 5.0.4.223524. Versions 4.5.x and 4.6.x are not affected by this vulnerability ABSTRACT: A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA52479 Security Tracker Alert ID 1028255 com/id/1028255 CVE-2013-2263 Citrix Knowledge Center IMPACT ASSESSMENT: High DISCUSSION: The vulnerability could allow an unauthenticated user to gain access to network resources. IMPACT:

100

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

102

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

103

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:HP Onboard Administrator Unspecified Flaw Lets Remote Users 0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am Addthis PROBLEM: HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access PLATFORM: Onboard Administrator (OA) 3.21 through 3.31 ABSTRACT: A remote user can gain access to the target system reference LINKS: HP Support document ID: c03048779 SecurityTracker Alert ID: 1026158 CVE-2011-3155 IMPACT ASSESSMENT: Medium Discussion: A potential security vulnerability has been identified with HP Onboard Administrator (OA). The vulnerability could be exploited remotely to gain unauthorized access. Impact: A remote user can gain access to the target system. Solution: Onboard Administrator (OA) v3.32 is available.

104

U-188: MySQL User Login Security Bypass and Unspecified Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: MySQL User Login Security Bypass and Unspecified 8: MySQL User Login Security Bypass and Unspecified Vulnerability U-188: MySQL User Login Security Bypass and Unspecified Vulnerability June 12, 2012 - 7:00am Addthis PROBLEM: A security issue and vulnerability have been reported in MySQL PLATFORM: MySQL 5.x ABSTRACT: An error when verifying authentication attempts can be exploited to bypass the authentication mechanism. Reference LINKS: Original Advisory CVE-2012-2122 Secunia Advisory 49409 IMPACT ASSESSMENT: High Discussion: Successful exploitation of this vulnerability requires MySQL to be built on a system with a library that allows "memcmp()" to return a value outside of the -128 through 127 range (e.g. sse-optimized glibc). NOTE: Vendor binaries are reportedly not affected. The security issue is reported in versions prior to 5.1.63 and 5.5.25.

105

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

106

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

107

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have 6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. reference LINKS: Citrix Support Center SecurityTracker Alert ID:1026695 IMPACT ASSESSMENT: Medium Discussion: Customers who have installed XenServer but have not additionally downloaded and installed the optional Web Self Service component are not affected by these vulnerabilities. These vulnerabilities affect all currently supported

108

Shipment of Small Quantities of Unspecified Radioactive Material in Chalfant Packagings  

SciTech Connect

In the post 6M era, radioactive materials package users are faced with the disciplined operations associated with use of Certified Type B packagings. Many DOE, commercial and academic programs have a requirement to ship and/or store small masses of poorly characterized or unspecified radioactive material. For quantities which are small enough to be fissile exempt and have low radiation levels, the materials could be transported in a package which provides the required containment level. Because their Chalfant type containment vessels meet the highest standard of containment (helium leak-tight), the 9975, 9977, and 9978 are capable of transporting any of these contents. The issues associated with certification of a high-integrity, general purpose package for shipping small quantities of unspecified radioactive material are discussed and certification of the packages for this mission is recommended.

Smith, Allen; Abramczyk, Glenn; Nathan, Steven; Bellamy, Steve

2009-06-12T23:59:59.000Z

109

U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Cisco IOS IPSec IKE Unspecified Denial of Service 8: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability April 2, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco IOS XE 2.1.x Cisco IOS XE 2.2.x Cisco IOS XE 2.3.x Cisco IOS XE 2.4.x Cisco IOS XE 2.5.x Cisco IOS XE 2.6.x Cisco IOS XE 3.1.x Cisco IOS XE 3.3.x ABSTRACT: The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device. REFERENCE LINKS: Vendor Advisory Secunia Advisory SA48607 CVE-2012-0381 iMPACT ASSESSMENT: High discussion: The March 28, 2012, Cisco IOS Software Security Advisory bundled

110

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct...

111

Harmonizing Above Code Codes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Harmonizing "Above Code" Harmonizing "Above Code" Codes Doug Lewin Executive Director, SPEER 6 Regional Energy Efficiency Organizations SPEER Members Texas grid facing an energy crisis * No new generation coming online * Old, inefficient coal-fired plants going offline * ERCOT CEO Trip Doggett said "We are very concerned about the significant drop in the reserve margin...we will be very tight on capacity next summer and have a repeat of this year's emergency procedures and conservation appeals." Higher codes needed to relieve pressure Building Codes are forcing change * 2012 IECC 30% higher than 2006 IECC * IRC, the "weaker code," will mirror IECC in 2012 * City governments advancing local codes with

112

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28,...

113

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January...

114

Executive Director  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Director Executive Director Rich Marquez, Executive Director, leads institutional initiatives and provides oversight for the Laboratory's organizations for Ethics and Audits, Prime Contract, Chief Financial Officer, Chief Information Officer, Ombuds, and Communications and Government Affairs. Contact Operator Los Alamos National Laboratory (505) 667-5061 Marquez has received a number of significant awards and recognitions, including the Presidential Rank Award for Meritorious Service. Rich Marquez Executive Director Rich Marquez, Executive Director Richard A. (Rich) Marquez currently serves Los Alamos National Laboratory as executive director reporting to the Laboratory director. Marquez leads institutional initiatives and provides oversight for several Laboratory organizations, including

115

T-529: Apple Mac OS PackageKit Distribution Script Remote Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January...

116

V-099: Honeywell Multiple Products ActiveX Control Remote Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February...

117

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

118

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm...

119

Executive MBA* Executive MBA at a Glance  

E-Print Network (OSTI)

Manufacturing Natural Resources Not-for-Profit Public Service Real Estate Development Technology Transportation, strategic analysis, and change management * Additional Options The Americas MBA for Executives Executive MBA

120

Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Summary Executive Summary Highway-based excise taxes are paid by highway users, and the tax revenues are distributed to States for supporting highways, safety, and transit programs. The processes for collecting these taxes and redistributing them to the States are very complex. The U.S. Treasury collects most of the taxes from a relatively small number of large corporations located in only a few States. The Internal Revenue Service (IRS) does not have an accurate picture of where the motor fuel is eventually consumed. Because the actual State-by-State contributions are not available, detailed analyses are required to estimate a State's on-highway motor fuel use. The attribution process uses State-reported data and nationally applied statistical models to determine how much fuel is used on highways in each State and the proportion of each State's usage in comparison to the total motor fuel usage for all States.

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

EXECUTIVE SUMMARY  

National Nuclear Security Administration (NNSA)

FUSION ENERGY SCIENCE ADVISORY COMMITTEE FUSION ENERGY SCIENCE ADVISORY COMMITTEE Panel on High Energy Density Laboratory Plasmas ADVANCING THE SCIENCE OF HIGH ENERGY DENSITY LABORATORY PLASMAS January 2009 UNITED STATES DEPARTMENT OF ENERGY 1 TABLE OF CONTENTS EXECUTIVE SUMMARY.......................................................................................... 5 1 HIGH ENERGY DENSITY LABORATORY PLASMA SCIENCE .................................... 15 2 THE CHARGE TO FESAC ...................................................................................... 19 3 THE PANEL PROCESS ............................................................................................ 20 4 STEWARDSHIP OF THE JOINT PROGRAM ............................................................... 23

122

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run...

123

Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) Worker Safety and Health Program Lawrence Berkeley National Laboratory LBNL Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) This page intentionally left blank. LBNL Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) i Contents Executive Summary .............................................................................................. v 1. Introduction................................................................................................... 1 1.1 Work Activities .............................................................................................. 1

124

EXECUTIVE SUMMARY  

NLE Websites -- All DOE Office Websites (Extended Search)

EXECUTIVE SUMMARY This document contains an assessment of the first project to be completed under the U.S. Department of Energy Clean Coal Technology Program. The project was selected under Round I and is known officially as "The Demonstration of an Advanced Cyclone Coal Combustor, with Internal Sulfur, Nitrogen, and Ash Control for the Conversion of a 23 MMBtu/hour Oil-Fired Boiler to Pulverized Coal." The project was carried out by the Coal Tech Corporation over the period March 1987 February 1991 at the site of the Keeler/Dorr-Oliver Boiler Company in Williamsport, Pennsylvania. The project was a three-year demonstration scale test of a 30 MMBtu/hr air-cooled ceramic slagging cyclone combustor retrofitted to a horizontal 23-MMBtu/hr oil or natural gas-fired Keeler/Dorr-Oliver DS-9

125

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

126

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

127

Implementing Executive Order 13423  

Energy.gov (U.S. Department of Energy (DOE))

Guide describes the instructions on the requirements and how fleets should implement the Executive Order 13423.

128

U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users 131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code March 22, 2012 - 3:47am Addthis PROBLEM: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Photoshop CS5 12.x ABSTRACT: Successful exploitation may allow execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026831 Secunia Advisory: SA48457 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted TIFF file that, when loaded by the target user, will trigger a heap overflow and execute arbitrary code on the target

129

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

130

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

that, when loaded by the target user, will trigger a buffer overflow, use-after-free memory error, or memory corruption error and execute arbitrary code on the target system. The...

131

U-095: HP Data Protector Media Operations Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP Data Protector Media Operations Lets Remote Users Execute 5: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code U-095: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code February 3, 2012 - 1:33am Addthis PROBLEM: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code PLATFORM: Windows (2003, XP, 2008), HP Data Protector Media Operations version 6.11 and earlier ABSTRACT: Remote execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026626 HP Support Center Document ID: c03179046 CVE-2011-4791 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Data Protector Media Operations. A remote user can execute arbitrary code on the target system. Information on CVSS is documented in HP Customer Notice: HPSN-2008-002. Impact:

132

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

133

U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute 80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code January 12, 2012 - 9:00am Addthis PROBLEM: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code PLATFORM: Linux ABSTRACT: A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Linux Kernel Update SecurityTracker Alert ID: 1026512 CVE-2012-0038 Red Hat Bugzilla Bug 773280 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a filesystem that, when mounted by the target user, will execute arbitrary code on the target user's system. Impact: A remote user can create a specially crafted filesystem that, when mounted

134

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

page or execute a malicious .pdf document, the attacker-specified data could cause a memory corruption, resulting in the execution of code. The attacker could take advantage of...

135

V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09: Google Chrome WebKit Type Confusion Error Lets Remote Users 09: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code March 12, 2013 - 12:11am Addthis PROBLEM: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in Google Chrome. REFERENCE LINKS: Stable Channel Update SecurityTracker Alert ID: 1028266 CVE-2013-0912 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a type confusion error in WebKit and execute arbitrary code on the target system. The code will run with the privileges

136

CEES Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Committee photo of Michael Thackeray Name Michael Thackeray (Chair) Institution Argonne National Laboratory Department Chemical Sciences and Engineering Division Area of...

137

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

138

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

139

U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Chrome Out-of-Bounds Write Error Lets Remote Users 1: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code November 18, 2011 - 9:00am Addthis PROBLEM: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Version(s) prior to 15.0.874.121 ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Stable Channel Update CVE-2011-3900 SecurityTracker Alert ID: 1026338 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user,

140

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

142

INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 29, 2007 INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE ORDER 13423 "Strengthening Federal Environmental, Energy, and Transportation Management" i Contents I. Introduction ......................................................................................................................1 A. Purpose..................................................................................................................1 B. Authority ...............................................................................................................1 C. Organization and Oversight ..................................................................................1 D. Overarching Policy and Directives .......................................................................4

143

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

144

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

145

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

146

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

147

STEP Participant Survey Executive Summary  

Energy.gov (U.S. Department of Energy (DOE))

STEP Participant Survey Executive Summary, from the Tool Kit Framework: Small Town University Energy Program (STEP).

148

T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution  

Energy.gov (U.S. Department of Energy (DOE))

Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

149

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

150

Project Execution Plan RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Execution Plan (PEP) Review Module Project Execution Plan (PEP) Review Module March 2010 CD-0 O 0 OFFICE OF P C CD-1 F ENVIRO Standard R Project E Rev Critical Decis CD-2 M ONMENTAL Review Plan Execution view Module sion (CD) Ap CD March 2010 L MANAGE n (SRP) n Plan e pplicability D-3 EMENT CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-1189-2008,

151

Integrating Program Component Executables  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrating Integrating Program Component Executables on Distributed Memory Architectures via MPH Chris Ding and Yun He Computational Research Division, Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720, USA chqding@lbl.gov, yhe@lbl.gov Abstract A growing trend in developing large and complex ap- plications on today's Teraflop computers is to integrate stand-alone and/or semi-independent program components into a comprehensive simulation package. One example is the climate system model which consists of atmosphere, ocean, land-surface and sea-ice. Each component is semi- independent and has been developed at different institu- tions. We study how this multi-component multi-executable application can run effectively on distributed memory archi- tectures. We identify five effective execution modes and de- velop the MPH library to support

152

Compiling Codes on Hopper  

NLE Websites -- All DOE Office Websites (Extended Search)

Compiling Codes Compiling Codes Compiling Codes on Hopper Overview Cray provides a convenient set of wrapper commands that should be used in almost all cases for compiling and linking parallel programs. Invoking the wrappers will automatically link codes with MPI libraries and other Cray system software. All MPI and Cray system include directories are also transparently imported. In addition the wrappers append the compiler's target processor arguments for the hopper compute node processors. NOTE: The intention is that programs are compiled on the login nodes and executed on the compute nodes. Because the compute nodes and login nodes have different operating systems, binaries created for compute nodes may not run on the login node. The wrappers mentioned above guarantee that

153

John Hervey Executive Director  

E-Print Network (OSTI)

John Hervey Executive Director #12;Historical Perspective · NACS Technology Standards Project · Project Components ­ Four areas of concentration · Payment Systems ­ terminal-to-host · Device Integration. Impact 21 Group, LLC Incomm Intermec Technologies Corp Kenan Advantage Group, Inc. Lance, Inc. Liberty

Brock, David

154

Sustainability Initiative Executive Summary  

E-Print Network (OSTI)

UW­Madison Sustainability Initiative Executive Summary October 2010 #12;2 We are pleased to present the final report of the campus Sustainability Task Force. This report fulfills the charge we gave to sustainability for consideration by UW­Madison's leadership and campus community. There are many reasons why

Sheridan, Jennifer

155

Executive Branch Management Scorecard | Department of Energy  

Office of Environmental Management (EM)

Executive Branch Management Scorecard Executive Branch Management Scorecard More Documents & Publications Executive Branch Management Scorecard Slide 1 Three Year Rolling Timeline...

156

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

157

Execution Monitoring in MT Icon  

Science Journals Connector (OSTI)

MT Icon allows the execution of multiple Icon programs in almost any configuration, including execution ... monitoring. As motivated in Chapter 4, MT Icon characterizes monitoring as a special case of ... languag...

Clinton L. Jeffery

1999-01-01T23:59:59.000Z

158

Business Model Guide Executive Summary  

Energy.gov (U.S. Department of Energy (DOE))

The Business Model Guide Executive Summary by the U.S. Department of Energy's Better Buildings Neighborhood Program.

159

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code 526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability January 3, 2011 - 2:38pm Addthis PROBLEM: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability PLATFORM: Microsoft Internet Explorer 8.0.7600.16385 ABSTRACT: Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected. reference LINKS: SecurityFocus - Microsoft Internet Explorer

160

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: HP Security Bulletin - HP-UX Running OpenSSL, Remote 70: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

162

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Security Bulletin - HP-UX Running OpenSSL, Remote 0: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

163

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

164

T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EMC AutoStart Technical Info EMC Support Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code T-639:...

165

UML-based specification and generation of executable web services  

Science Journals Connector (OSTI)

This paper presents an approach for the development of executable Web services based on model transformation techniques. The approach is based on a new Web service profile for the Unified Modeling Language (UML), which allows an efficient definition ... Keywords: M2T, MDSD, SOA, SoaML, UML, Xpand, code generation, model transformation, web services

Wafi Dahman; Jens Grabowski

2010-10-01T23:59:59.000Z

166

Executive Order 13423: Strengthening Federal Environmental, Energy...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423: Strengthening Federal Environmental, Energy, and...

167

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81 - 19790 of 28,905 results. 81 - 19790 of 28,905 results. Article U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny http://energy.gov/cio/articles/u-045-windows-win32ksys-keyboard-layout-bug-lets-local-users-deny-service Article T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. http://energy.gov/cio/articles/t-650-microsoft-word-unspecified-flaw-lets-remote-users-execute-arbitrary-code Article T-639: Debian update for libxml2 Libxml2 XPath Nodeset Processing Vulnerability http://energy.gov/cio/articles/t-639-debian-update-libxml2 Article T-613: Microsoft Excel Axis Properties Remote Code Execution

168

E-Print Network 3.0 - alpha coding sequence Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

will generate conservative Alpha code sequences for unaligned memory access. If the profile does not indicate... Pentium or a 200-MHz Pentium Pro when executing translated...

169

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

170

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

171

Bureau of Construction Codes - 2009 Michigan Uniform Energy Code - Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

These rules take effect March 9, 2011 (By authority conferred on the director of the department of energy, labor, and economic growth by section 4 of 1972 PA 230, MCL 125.1504, and Executive Reorganization Order Nos. 2003-1 and 2008-20, MCL 445.2011 and MCL 445.2025) R 408.31087, R 408.31088, R 408.31089, and R 408.31090 of the Michigan Administrative Code are amended and R 408.31087a is added to the code as follows: PART 10a MICHIGAN UNIFORM ENERGY CODE R 408.31087 Applicable code. Rule 1087. Rules governing the energy efficiency for the design and construction of buildings and structures, not including residential buildings, shall be those contained in the international energy conservation code, 2009 edition, section 501.1 and the ASHRAE

172

Data Coding  

Science Journals Connector (OSTI)

Data coding is the classification of data and assignment of arepresentation for that data, or the assignment of aspecific code...

2008-01-01T23:59:59.000Z

173

Office of the Executive Secretariat  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Secretariat, MA-70 Executive Secretariat, MA-70 Acting Director Carol A. Matthews Special Projects Security Policy and Analysis Group Programmatic Expertise High-level Review and Analysis Correspondence Management Group Correspondence Control & Assignment Correspondence Support FOIA Management Special Projects Receiving and Delivery Administration and Executive Commitments Group eDOCS Executive Commitments Information Management Budget Personnel Administration Office of History and Heritage Resources Institutional Memory History Activities Historic Preservation Litigation Research Customer Research Archives Administration May 2013 Deputy Director Carol A. Matthews Federal Advisory Committee Management

174

Executive Summary | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Summary Executive Summary How clean energy investments can be used to spur local economic development. Spurring Local Economic Development with Clean Energy Investments:...

175

NCAI Executive Council Winter Session  

Energy.gov (U.S. Department of Energy (DOE))

National Congress of American Indians (NCAI) is hosting the 2015 Executive Council Winter Session in Washington, DC, Feb. 23-25, 2015.

176

V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute 5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code January 9, 2013 - 12:10am Addthis PROBLEM: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.5.502.135 and earlier versions for Windows Adobe Flash Player 11.5.502.136 and earlier versions for Macintosh Adobe Flash Player 11.2.202.258 and earlier versions for Linux Adobe Flash Player 11.1.115.34 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.29 and earlier versions for Android 3.x and 2.x. ABSTRACT: Security updates available for Adobe Flash Player REFERENCE LINKS: Adobe Security Bulletin APSB13-01 SecurityTracker Alert ID: 1027950

177

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

178

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

179

Building Relationships with Executive Search Firms Building Relationships with Executive Search Firms  

E-Print Network (OSTI)

Relationships Similar Searches Alumni Organizations Education Company Team - Sports Job Hunting / NetworkingBuilding Relationships with Executive Search Firms for Building Relationships with Executive Search Firms for Weiner & Associates, Inc. Executive Search Partners Weiner & Associates, Inc. Executive Search

Ferrari, Silvia

180

Permanent Rules and Executive Orders effective as of 07-22-2010  

NLE Websites -- All DOE Office Websites (Extended Search)

Rules and Executive Orders effective as of 07-22-2010 Rules and Executive Orders effective as of 07-22-2010 Title 748 - Uniform Building Code Commission Chapter 1 Administrative Operations Chapter 3 General Provisions Chapter 5 Fees and Collection of Fees Chapter 7 Commission Committees Chapter 10 Code Adoption Procedures Chapter 15 Code Adopted by State Agencies and Political Subdivisions Permanent Rules and Executive Orders effective as of 07-22-2010 Title 748 - Uniform Building Code Commission Chapter 1 - Administrative Operations 748:1-1-1. Organization The employees of the Commission shall be organized and divided into such divisions or units, as the Commission deems desirable for efficiency. Such organization and division may be revised by the Commission as it finds necessary or expedient. Copies of the organizational chart are available upon

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Fermilab Users' Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

2012-2013 UEC and GSA Members at October meeting 2012-2013 UEC and GSA Members at October meeting Current Members of the Fermilab Users Executive Committee 2012-2013 Name and Organization Term Email Nikos Varelas, Chair University of Illinois at Chicago 9/11 - 8/13 varelas AT uic.edu Mary Anne Cummings Muons, Inc. 9/12 - 8/14 macc AT fnal.gov Craig Group University of Virginia 9/12 - 8/14 group AT fnal.gov Sergo Jindariani Fermilab 9/11 - 8/13 sergo AT fnal.gov Daniel Kaplan Illinois Institute of Technology 9/11 - 8/13 kaplan AT iit.edu Ryan Patterson California Institute of Technology 9/11 - 8/13 rbpatter AT caltech.edu Greg Pawloski University of Minnesota 9/11 - 8/13 pawloski AT umn.edu Breese Quinn University of Mississippi 9/12 - 8/14 quinn AT phy.olemiss.edu Lee Roberts Boston University 9/12 - 8/14 roberts AT bu.edu Mandy Rominsky

182

Federal Energy Management Program: Executive Order 13423  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Order Executive Order 13423 to someone by E-mail Share Federal Energy Management Program: Executive Order 13423 on Facebook Tweet about Federal Energy Management Program: Executive Order 13423 on Twitter Bookmark Federal Energy Management Program: Executive Order 13423 on Google Bookmark Federal Energy Management Program: Executive Order 13423 on Delicious Rank Federal Energy Management Program: Executive Order 13423 on Digg Find More places to share Federal Energy Management Program: Executive Order 13423 on AddThis.com... Requirements by Subject Requirements by Regulation National Energy Conservation Policy Act Executive Order 13514 Energy Independence & Security Act Executive Order 13423 Energy Policy Act of 2005 Executive Order 13221 Energy Policy Act of 1992 Notices & Rules

183

Executive Summary By Blake Johnson  

E-Print Network (OSTI)

Executive Summary By Blake Johnson Creating Business Value with Analytics and Big Data A one and Teradata Corporation, and was led by Blake Johnson, consulting professor in the Department of Management

Straight, Aaron

184

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 28580 of 31,917 results. 71 - 28580 of 31,917 results. Article T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. http://energy.gov/cio/articles/t-701-citrix-access-gateway-enterprise-edition-input-validation-flaw-logon-portal Article T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. http://energy.gov/cio/articles/t-650-microsoft-word-unspecified-flaw-lets-remote-users-execute-arbitrary-code Article IRS Announces New Tribal Economic Development Bond Allocation Guidance Treasury and the IRS published new guidance today allocating Tribal

185

Historic Preservation Executed Programmatic Agreements  

Energy.gov (U.S. Department of Energy (DOE))

Programmatic Agreements offer a more streamlined process for grantees to satisfy their historic preservation requirements with minimum or no consultation with the State Historic Preservation Officer based on the type of activity that is being undertaken. Below please find state-specific executed Programmatic Agreements. Executed agreements will apply to counties, municipalities and other local governments within the respective state receiving DOE's financial assistance awards to ensure comprehensive coverage of DOE's program grantees.

186

Extension Program Council's Executive Board.  

E-Print Network (OSTI)

~IB-134'-! II"I~ I~? Extension Program Council's Executive Board Mary G. Marshall and Burl B. Richardson Extension Program Development Specialists The Extension Program Council works with Extension agents to plan, implement, evaluate... direction and scope of all educa tionallong-range plan activity. Since Extension does not have the resources to address every issue or need, long-range planning establishes priorities among the issues. The Executive Board has responsibility...

Marshall, Mary G.; Richardson, Burl B.

1986-01-01T23:59:59.000Z

187

Energy Savings Performance Contract Federal Project Executives  

Energy.gov (U.S. Department of Energy (DOE))

Federal project executive (FPEs) help agencies launch energy savings performance contract (ESPC) projects.

188

Code constructions and code families for nonbinary quantum stabilizer code  

E-Print Network (OSTI)

Stabilizer codes form a special class of quantum error correcting codes. Nonbinary quantum stabilizer codes are studied in this thesis. A lot of work on binary quantum stabilizer codes has been done. Nonbinary stabilizer codes have received much...

Ketkar, Avanti Ulhas

2005-11-01T23:59:59.000Z

189

T-731:Symantec IM Manager Code Injection Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code Injection Vulnerability. PLATFORM: IM Manager versions prior to 8.4.18 are affected. ABSTRACT: Symantec IM Manager is prone to a vulnerability that will let attackers run arbitrary code. referecnce LINKS: Symantec Security Advisory SYM11-012 Symantec Security Updates Bugtraq ID: 49742 IMPACT ASSESSMENT: High Discussion: Symantec was notified of Cross-Site Scripting and Code injection/execution issues present in the Symantec IM Manager management console. The management console fails to properly filter/validate external inputs. Successful exploitation of SQL Injection or Remote Code execution might

190

GridRun: A lightweight packaging and execution environment forcompact, multi-architecture binaries  

SciTech Connect

GridRun offers a very simple set of tools for creating and executing multi-platform binary executables. These ''fat-binaries'' archive native machine code into compact packages that are typically a fraction the size of the original binary images they store, enabling efficient staging of executables for heterogeneous parallel jobs. GridRun interoperates with existing distributed job launchers/managers like Condor and the Globus GRAM to greatly simplify the logic required launching native binary applications in distributed heterogeneous environments.

Shalf, John; Goodale, Tom

2004-02-01T23:59:59.000Z

191

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

192

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

193

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco AnyConnect Secure Mobility Client Lets Remote Users 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and devices that are running Cisco IOS Software. PLATFORM: Cisco AnyConnect Secure Mobility Client Platform & Affected Versions ABSTRACT: Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a

194

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

195

FY2008 SSRLUO Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

8 Executive Committee 8 Executive Committee corner corner Environmental Sciences Graduate Student LCLS Macromolecular Crystallography Materials Chemistry SSRL Liaison Biospectroscopy corner corner Joy Andrews California State University East Bay, Chemistry, 25800 Carlos Bee Blvd., Hayward, CA 94542 Professor in the Department of Chemistry and Biochemistry at California State University, East Bay, where she has taught since 1996. Her B.A. degree is in biochemistry from Barnard College, and Ph.D. in Biophysical Chemistry from UC Berkeley. Her research is on the detection, speciation and remediation of heavy metal contamination at various environmental sites, using atomic absorption spectroscopy, ion chromatography, and x-ray absorption spectroscopy. She is also conducting continuous monitoring of water quality parameters in SF Bay, funded by CICORE/NOAA. She was Chair, Executive Committee, Stanford Synchrotron Radiation Laboratory User's Organization Oct 2005-Oct 2006; and Chair, Synchrotron and Neutron User's Group Advocacy Committee since October 2005.

196

EIA - AEO2010 - Executive Summary  

Gasoline and Diesel Fuel Update (EIA)

Executive Summary Executive Summary Annual Energy Outlook 2010 with Projections to 2035 Executive Summary In 2009, U.S. energy markets continued to show the impacts of the economic downturn that began in late 2007. After falling by 1 percent in 2008, total electricity generation dropped by another 3 percent in 2009. Although other factors, including weather, contributed to the decrease, it was the first time in the 60-year data series maintained by the EIA that electricity use fell in two consecutive years. Over the next few years, the key factors influencing U.S. energy markets will be the pace of the economic recovery, any lasting impacts on capital-intensive energy projects from the turmoil in financial markets, and the potential enactment of legislation related to energy and the environment.

197

Business Development Executive (BDE) Program  

SciTech Connect

The IPST BDE (Institute of Paper Science and Technology Business Development Executive) program was initiated in 1997 to make the paper industry better aware of the new manufacturing technologies being developed at IPST for the U.S. pulp and paper industry's use. In April 2000, the BDE program management and the 20 BDEs, all retired senior level industry manufacturing and research executives, were asked by Ms. Denise Swink of OIT at DOE to take the added responsibility of bringing DOE developed energy conservation technology to the paper industry. This project was funded by a DOE grant of $950,000.

Rice, E.J. "Woody"; Frederick, W. James

2005-12-05T23:59:59.000Z

198

Other Executive Positions | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Executive Positions | National Nuclear Security Administration Executive Positions | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Other Executive Positions Home > Federal Employment > Our Jobs > Executive Positions > Other Executive Positions Other Executive Positions NNSA seeks highly qualified senior professionals to apply their knowledge,

199

T-557: Microsoft Office Excel Office Art Object Parsing Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Office Excel Office Art Object Parsing Remote Code 7: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability February 15, 2011 - 7:00am Addthis PROBLEM: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability. PLATFORM: Microsoft Office Excel ABSTRACT: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. reference LINKS: ZDI-11-041 ZDI Public Disclosure: Microsoft CVE-2011-0979 IMPACT ASSESSMENT: High Discussion: The flaw occurs when parsing a document with a malformed Excel document.

200

Project Description Executive Summary Report  

E-Print Network (OSTI)

$Total Project Cost: 1,000,000Auxillary Enterprises Balances $ 9,400,000Revenue Financing System Bonds $ 1Project Description Executive Summary Report Project Information Project Budget Project Funding 302-680 Parking Structure Phase I This project consists of a 750 space parking garage of approximately 251

O'Toole, Alice J.

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Executive Order 11988 - Floodplain Management | Open Energy Informatio...  

Open Energy Info (EERE)

- Floodplain Management Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Executive OrderExecutive Order: Executive Order 11988 - Floodplain...

202

FEMA - Executive Order 11990 - Protection of Wetlands 1977 |...  

Open Energy Info (EERE)

Protection of Wetlands 1977 Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Executive OrderExecutive Order: FEMA - Executive Order 11990 -...

203

Department Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Department Codes Department Codes Code Organization BO Bioscience Department BU Business Development & Analysis Office DI Business Operations NC Center for Functional Nanomaterials CO Chemistry Department AD Collider Accelerator Department PA Community, Education, Government and Public Affairs CC Computational Science Center PM Condensed Matter Physics and Materials Science Department CI Counterintelligence AE Department of Energy DC Directorate - Basic Energy Sciences DK Directorate - CEGPA DE Directorate - Deputy Director for Operations DO Directorate - Director's Office DH Directorate - Environment, Safety and Health DF Directorate - Facilities and Operations DA Directorate - Global and Regional Solutions DB Directorate - Nuclear and Particle Physics DL Directorate - Photon Sciences

204

Implementing for Implementing Executive Order 13423  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPLEMENTING EXECUTIVE IMPLEMENTING EXECUTIVE ORDER 13423 "Strengthening Federal Environmental, Energy, and Transportation Management" March 29, 2007 0 Contents I. Introduction ......................................................................................................................1 A. Purpose..................................................................................................................1 B. Authority ...............................................................................................................1 C. Organization and Oversight ..................................................................................1 D. Overarching Policy and Directives .......................................................................4

205

Northwest Energy Efficiency Taskforce Executive Committee  

E-Print Network (OSTI)

#12;Northwest Energy Efficiency Taskforce Executive Committee Chairs Tom Karier, Washington Member, Northwest Energy Efficiency Alliance Bill Gaines, Director/Chief Executive Officer, Tacoma Public Utilities, Cowlitz County Public Utility District Cal Shirley, Vice President for Energy Efficiency Service, Puget

206

UCSF Sustainability Action Plan: Executive Summary  

E-Print Network (OSTI)

UCSF Sustainability Action Plan: Executive Summary Issue Date: April 21, 2011 #12;UCSF Sustainability Action Plan Executive Summary April 21, 2011 Page 1 Table of Contents An Introduction to the Sustainability Action Plan

Yamamoto, Keith

207

High Performance Reach Codes  

E-Print Network (OSTI)

Jim Edelson New Buildings Institute A Growing Role for Codes and Stretch Codes in Utility Programs Clean Air Through Energy Efficiency November 9, 2011 ESL-KT-11-11-39 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 New Buildings Institute ESL..., Nov. 7 ? 9, 2011 ?31? Flavors of Codes ? Building Codes Construction Codes Energy Codes Stretch or Reach Energy Codes Above-code programs Green or Sustainability Codes Model Codes ?Existing Building? Codes Outcome-Based Codes ESL-KT-11...

Edelson, J.

2011-01-01T23:59:59.000Z

208

Coded Data  

Science Journals Connector (OSTI)

An individual is given anumber and all that individual's data is encoded under that number so that the individual cannot be recognized. Data are then collated, analyzed and reported on ... the code to the pers...

2008-01-01T23:59:59.000Z

209

Executive Order 13423- Strengthening Federal Environmental, Energy...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It...

210

Executive Director Carleton Sustainable Energy Research Centre  

E-Print Network (OSTI)

Executive Director Carleton Sustainable Energy Research Centre Carleton University is seeking to appoint an Executive Director to its Sustainable Energy Research Centre. This Centre is one of a series of recent Carleton initiatives in the area of sustainable energy. The Executive Director

Dawson, Jeff W.

211

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users 9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands January 26, 2012 - 6:45am Addthis PROBLEM: Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: CVE-2011-3923 SecurityTracker Alert ID: 1026575 Apache Struts 2 Documentation S2-009 blog.o0o.nu IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. The vulnerability allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject

212

Bureau of Construction Codes - 2009 Michigan Uniform Energy Code - Residential  

NLE Websites -- All DOE Office Websites (Extended Search)

These rules take effect March 9, 2011 (By authority conferred on the director of the department of energy, labor, and economic growth by section 4 of 1972 PA 230, MCL 125.1504, and Executive Reorganization Order Nos. 2003-1 and 2008-20, MCL 445.2011 and MCL 445.2025) R 408.31059, R 408.31060, R 408.31061, R 408.31062, R 408.31063, R 408.31064, R 408.31065, R 408.31066, R 408.31069, and R 408.31070, of the Michigan Administrative Code are amended, and R 408.31060a, R 408.31060b, R 408.31060c, R 408.31060d, R 408.31060e, and R 408.31063a are added to the Code as follows: PART 10 MICHIGAN UNIFORM ENERGY CODE R 408.31059 Applicable code. Rule 1059. The provisions of the international energy conservation code, 2009 edition, except for sections 102.1.1, 107.2 to 107.5, 301.2, 301.3, 402.3.2, 501.1, to 506.6.2 and Tables

213

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

214

EMSL User Executive Committe Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

User Executive User Executive Committee Meeting July 13, 2011 Recommendations Valerie Copie, UEC Chair User Meetings/Workshops EUC Comments & Recommendations: The UEC supports EMSL's focus on specific areas for User meetings and workshops rather than organizing a generalized User Meeting Focused meetings may provide opportunities for users to visit EMSL more often and to participate in team building as envisaged by the new vision of EMSL2.0 The UEC would like EMSL to have broad representations at these workshops to avoid having too many internal participants. The Pore-scale workshop may be a good model to follow for focused workshops While the UEC supports focused workshops, the entire user community should be welcome to attend them and informed about these activities

215

ADEQUACY REPORT … EXECUTIVE SUMMARY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08 08 ADEQUACY REPORT - EXECUTIVE SUMMARY The electricity industry has gone through major changes in structure, shape, and form over the last decade. All signs indicate that business is far from "as usual". It is prudent at this time to ask if the present approaches can ensure reliable and cost effective supply of electricity over the next two decades and if not, then what is needed to achieve that. This was the prime reason for the formation of the Electricity Advisory Committee (EAC) for which this report was done. The answer to that key question is "no, unless....". A concise set of recommendations is included in this executive summary but more detailed lists are listed in the report. Today, the warning signs are here. Fuel transportation, particularly by rail, is congested,

216

U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users 1: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code January 13, 2012 - 9:15am Addthis PROBLEM: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code PLATFORM: McAfee ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026513 Zero Day Initiative ZDI-12-012 McAfee Threat Intelligence IMPACT ASSESSMENT: High Discussion: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of McAfee Security-as-a-Service. User interaction is required to exploit this vulnerability in that the target must visit a

217

Budget Formulation & Execution | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Budget Formulation & Execution Budget Formulation & Execution Budget Formulation & Execution The mission of the Office of Budget (CF-30) is to plan for, formulate, execute, analyze, and defend the Department of Energy's budget; to manage the corporate funds control process; and to serve as the external liaison for the Department of Energy on matters related to its budget. Functions: Coordinate and manage the Department's budget formulation, presentation, and execution processes. Provide central administration of Departmental appropriations, allotments, and financial controls. Formulate procedures for budgetary allocations and controls, reprogrammings, deferrals, and other financial actions. Develop budget tables, histories, statistics, and other data required for budget planning and control.

218

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

system. 1) An unspecified error when handling TeXML files can be exploited to cause memory corruption. 2) A boundary error when handling H.263 encoded movie files can be...

219

Automatic generation of executable communication specifications from parallel applications  

SciTech Connect

Portable parallel benchmarks are widely used and highly effective for (a) the evaluation, analysis and procurement of high-performance computing (HPC) systems and (b) quantifying the potential benefits of porting applications for new hardware platforms. Yet, past techniques to synthetically parameterized hand-coded HPC benchmarks prove insufficient for today's rapidly-evolving scientific codes particularly when subject to multi-scale science modeling or when utilizing domain-specific libraries. To address these problems, this work contributes novel methods to automatically generate highly portable and customizable communication benchmarks from HPC applications. We utilize ScalaTrace, a lossless, yet scalable, parallel application tracing framework to collect selected aspects of the run-time behavior of HPC applications, including communication operations and execution time, while abstracting away the details of the computation proper. We subsequently generate benchmarks with identical run-time behavior from the collected traces. A unique feature of our approach is that we generate benchmarks in CONCEPTUAL, a domain-specific language that enables the expression of sophisticated communication patterns using a rich and easily understandable grammar yet compiles to ordinary C + MPI. Experimental results demonstrate that the generated benchmarks are able to preserve the run-time behavior - including both the communication pattern and the execution time - of the original applications. Such automated benchmark generation is particularly valuable for proprietary, export-controlled, or classified application codes: when supplied to a third party. Our auto-generated benchmarks ensure performance fidelity but without the risks associated with releasing the original code. This ability to automatically generate performance-accurate benchmarks from parallel applications is novel and without any precedence, to our knowledge.

Pakin, Scott [Los Alamos National Laboratory; Wu, Xing [NCSU; Mueller, Frank [NCSU

2011-01-19T23:59:59.000Z

220

Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations  

DOE Patents (OSTI)

Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

Gschwind, Michael K

2013-07-23T23:59:59.000Z

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

222

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

223

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

224

Reducing Energy Demand in Buildings Through State Energy Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes Assistance Project Codes Assistance Project Maureen Guttman, AIA Executive Director, BCAP Alliance to Save Energy 202-530-2211 mguttman@ase.org Tuesday, April 2, 2013 - Thursday, April 4, 2013 Reducing Energy Demand in Buildings Through State Energy Codes - Providing Technical Support and Assistance to States - 2 | Building Technologies Office eere.energy.gov Purpose & Objectives Problem Statement: Buildings = largest sector of energy consumption in America * Energy codes are a ready-made regulatory mechanism * States need support for implementation Impact of Project:

225

Reducing Energy Demand in Buildings Through State Energy Codes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Codes Assistance Project Codes Assistance Project Maureen Guttman, AIA Executive Director, BCAP Alliance to Save Energy 202-530-2211 mguttman@ase.org Tuesday, April 2, 2013 - Thursday, April 4, 2013 Reducing Energy Demand in Buildings Through State Energy Codes - Providing Technical Support and Assistance to States - 2 | Building Technologies Office eere.energy.gov Purpose & Objectives Problem Statement: Buildings = largest sector of energy consumption in America * Energy codes are a ready-made regulatory mechanism * States need support for implementation Impact of Project:

226

FY2006 SSRLUO Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

6 Executive Committee 6 Executive Committee corner corner Environmental Sciences Graduate Student LCLS Macromolecular Crystallography Materials Chemistry SSRL Liaison Biospectroscopy corner corner Juana Acrivos CSU San Jose, Chemistry, 1 Washington Square, SanJose, CA 95192-0101 Juana Acrivos has done experiments at SSRL since 1978. She is a chemist at SJSU (Professor). Her students first work at SSRL (Alan Robertson, Kevin Hathaway) showed how metal (Rb and Ba) in ammonia solutions change valence from 0 (in metallic solutions) to ionic values as the dilution is increased. The dynamics of intercalation chemistry was investigated in the '80s for TaS2 exposed to N2H4 in the beam (John Reynolds, Stuart S P Parkin). Battery action was revealed by investigating the Se edge shifts in (C(graphite|Cx(H2SeO4)|Cx

227

FY2005 SSRLUO Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

5 Executive Committee 5 Executive Committee corner corner Environmental Sciences Graduate Student LCLS Macromolecular Crystallography Materials Chemistry SSRL Liaison Structural Molecular Biology corner corner Juana Acrivos CSU San Jose, Chemistry, 1 Washington Square, SanJose, CA 95192-0101 Juana Acrivos has done experiments at SSRL since 1978. She is a chemist at SJSU (Professor). Her students first work at SSRL (Alan Robertson, Kevin Hathaway) showed how metal (Rb and Ba) in ammonia solutions change valence from 0 (in metallic solutions) to ionic values as the dilution is increased. The dynamics of intercalation chemistry was investigated in the '80s for TaS2 exposed to N2H4 in the beam (John Reynolds, Stuart S P Parkin). Battery action was revealed by investigating the Se edge shifts in (C(graphite|Cx(H2SeO4)|Cx

228

Budget Formulation and Execution | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Formulation and Execution Formulation and Execution Budget Formulation and Execution The Office of Budget works on the Office of Energy Efficiency and Renewable Energy (EERE) corporate budget formulation and defense, annual performance plan facilitation, quarterly program performance reporting, accountability submissions, the Program Assessment Rating Tool (PART), and related President's Management Agenda (PMA) topics. The Office produces budget funding action documents, procurement and loan guarantee procedures, annual operating plans, fund transfers to laboratories, and contractor budget data analysis. The Office leads the budgeting process through two primary functions-formulation and execution: Budget Formulation The Office of Budget facilitates corporate budget formulation through

229

2014 NCAI Executive Council Winter Session  

Office of Energy Efficiency and Renewable Energy (EERE)

The Executive Council Winter Session is a working conference where members convene for in-depthconversations about policy, legislation, and the future of Indian Country.

230

2009 Wind Technologies Market Report: Executive Summary  

SciTech Connect

This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report (DOE/GO-102010-3107).

Wiser, R.; Bolinger, M.

2010-08-01T23:59:59.000Z

231

Microsoft Word - CTF Executive Summary 001.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Component Test Facility Test Loop Pre-Conceptual Design Executive Summary December 2008 BEA Contract No. 000 75310 Disclaimer This report was prepared as an account of work...

232

Federal Executive Institute (FEI) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

together managers and executives from 25 to 30 Federal agencies for a unique, residential learning experience. The objective is to help agencies in the development of their career...

233

Executive Order 11988: Floodplain Management | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Wetland Environmental Review Requirements (10 CFR Parts 1021 and 1022) Executive Order 11990-Protection Of Wetlands NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000...

234

Codes and Standards Activities  

Energy.gov (U.S. Department of Energy (DOE))

TheFuel Cell Technologies Office works with code development organizations, code officials, industry experts, and national laboratory scientists to draft new model codes and equipment standards...

235

Green Building Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Green Building Codes Green Building Codes Green building codes go beyond minimum code requirements, raising the bar for energy efficiency. They can serve as a proving ground for future standards, and incorporate elements beyond the scope of the model energy codes, such as water and resource efficiency. As regional and national green building codes and programs become more available, they provide jurisdictions with another tool for guiding construction and development in an overall less impactful, more sustainable manner. ICC ASHRAE Beyond Codes International Green Construction Code (IgCC) The International Code Council's (ICC's) International Green Construction code (IgCC) is an overlay code, meaning it is written in a manner to be used with all the other ICC codes. The IgCC contains provisions for site

236

Microsoft PowerPoint - Executive Order13423rbl  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order 13423 Executive Order 13423 Executive Order 13423 Strengthening Federal Strengthening Federal Environmental, Energy and Environmental, Energy and Transportation Management Transportation Management 2 2 Executive Order 13423 Replaces the Executive Order 13423 Replaces the Greening the Government Series of Greening the Government Series of Executive Orders Executive Orders 13101 Recovered Materials 13101 Recovered Materials 13123 Energy Efficiency 13123 Energy Efficiency 13148 Environment 13148 Environment 13149 Transportation 13149 Transportation BUT BUT 13221 Standby Power was retained 13221 Standby Power was retained 3 3 Two Parts Involved Two Parts Involved Executive Order Executive Order States Policy States Policy Establishes Goals Establishes Goals Assigns Responsibilities for Agencies, CEQ, Assigns Responsibilities for Agencies, CEQ,

237

EXECUTIVE OFFICE OF THE PRESIDENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EXECUTIVE OFFICE OF THE PRESIDENT COUNCIL ON ENVIRONMENTAL QUALITY 722 JACKSON PLACE, N. W. WASHINGTON, D. C. April 30, 1981 MEMORANDUM FOR GENERAL COUNSELS, NEPA LIAISONS AND PARTICIPANTS IN SCOPING SUBJECT: Scoping Guidance As part of its continuing oversight of the implementation of the NEPA regulations, the Council on Environmental Quality has been investigating agency experience with scoping. This is the process by which the scope of the issues and alternatives to be examined in an EIS is determined. In a project led by Barbara Bramble of the General Counsel's staff the Council asked federal agencies to report their scoping experiences; Council staff held meetings and workshops in all regions of the country to discuss scoping practice; and a contract study was performed for the Council to investigate what techniques work best for

238

1.0EXECUTIVE SUMMARY  

NLE Websites -- All DOE Office Websites (Extended Search)

ARC-TR-03-0002 ARC-TR-03-0002 Electrochemical Noise Sensors for Detection of Localized and General Corrosion of Natural Gas Transmission Pipelines Final Report for the Period July 2001 - October 2002 December 2002 Sophie J. Bullard, Bernard S. Covino, Jr., James H. Russell, Gordon R. Holcomb, Stephen D. Cramer, and Margaret Ziomek-Moroz Albany Research Center U.S. Department of Energy Albany, OR PREPARED FOR THE UNITED STATES DEPARTMENT OF ENERGY, NATIONAL ENERGY TECHNOLOGY LABORATORY. Work Performed Under Work Package Number FE-01-06 This page left intentionally blank. 2 Electrochemical Noise Sensors for Detection of Localized and General Corrosion of Natural Gas Transmission Pipelines TABLE OF CONTENTS 1.0 EXECUTIVE SUMMARY

239

Advanced Fuels Campaign Execution Plan  

SciTech Connect

The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

Kemal Pasamehmetoglu

2011-09-01T23:59:59.000Z

240

Carlsbad Area Office Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

June 1998 June 1998 Carlsbad Area Office Executive Summary The mission of the Carlsbad Area Office (CAO) is to protect human health and the environment by opening and operating the Waste Isolation Pilot Plant (WIPP) for safe disposal of transuranic (TRU) waste and by establishing an effective system for management of TRU waste from generation to disposal. It includes personnel assigned to CAO, WIPP site operations, transportation, and other activities associated with the National TRU Program (NTP). The CAO develops and directs implementation of the TRU waste program, and assesses compliance with the program guidance, as well as the commonality of activities and assumptions among all TRU waste sites. A cornerstone of the Department of Energy's (DOE) national cleanup strategy, WIPP is

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

2002 Fusion Summer Study Executive Summary  

E-Print Network (OSTI)

2002 Fusion Summer Study Executive Summary 31 July 2002 #12;page 2 of 15 2002 Fusion Summer Study Executive Summary The 2002 Fusion Summer Study was conducted from July 8-19, 2002, in Snowmass, CO, and carried out a critical assessment of major next-steps in the fusion energy sciences program in both

242

Executive Fleet Vehicles Report | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Fleet Vehicles Report Executive Fleet Vehicles Report Executive Fleet Vehicles Report On May 24, 2011, the President issued a Presidential Memorandum on Federal Fleet Performance. In accordance with Section 1 (b) of the Presidential Memorandum and pursuant to Federal Management Regulation 102-34.50 (41 CFR 102-34.50), executive fleets are required to achieve maximum fuel efficiency; be limited in motor vehicle body size, engine size, and optional equipment to what is essential to meet agency mission; and be midsize or smaller sedans, except where larger sedans are essential to the agency mission. Executive fleet vehicles that are larger than midsize sedans or are not AFVs must be disclosed on the website of the agency operating the vehicles within 180 days of the date of the memorandum (on or before November 17,

243

Sample Project Execution Plan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sample Project Execution Plan Sample Project Execution Plan Sample Project Execution Plan The project execution plan (PEP) is the governing document that establishes the means to execute, monitor, and control projects. The plan serves as the main communication vehicle to ensure that everyone is aware and knowledgeable of project objectives and how they will be accomplished. The plan is the primary agreement between Headquarters and the federal project director and a preliminary plan should be developed and approved at Critical Decision-1. Project objectives are derived from the mission needs statement, and an integrated project team assists in development of the PEP. The plan is a living document and should be updated to describe current and future processes and procedures, such as integrating safety

244

Executive Potential Program (EPP) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Potential Program (EPP) Executive Potential Program (EPP) Executive Potential Program (EPP) January 10, 2014 (All day) Application Procedure: Nomination packages for EPP-2015-1 and EPP 2015-DC, must be received by deadline dates of January 10, 2014 and April 8, 2014 respectively, and must include the following: -The completed Executive Potential Program Application that includes information about the applicant, the applicant's immediate supervisor, and the DOE program coordinator, Johnny McChriston. - A statement from the applicant indicating the purpose for applying and how participation in the Executive Potential Program will support the applicant's career goals. -The applicant's current resume, signed and dated by the applicant - Payment must accompany the application before it will be processed.

245

Monitoring the execution of temporal plans for robotic systems  

E-Print Network (OSTI)

To achieve robustness in dynamic and uncertain environments, robotic systems must monitor the progress of their plans during execution. This thesis develops a plan executive called Pike that is capable of executing and ...

Levine, Steven James

2012-01-01T23:59:59.000Z

246

Monitoring the Execution of Temporal Plans for Robotic Systems  

E-Print Network (OSTI)

To achieve robustness in dynamic and uncertain environments, robotic systems must monitor the progress of their plans during execution. This thesis develops a plan executive called Pike that is capable of executing and ...

Levine, Steven J.

2012-10-04T23:59:59.000Z

247

Introduction Properties of Expander Codes  

E-Print Network (OSTI)

of Expander Codes Our Results Conclusions Background Basic Definitions LDPC Codes Expander Codes Turbo CodesIntroduction Properties of Expander Codes Our Results Conclusions Expander Codes: Constructions, Haifa 32000, Israel. Vitaly Skachek Expander Codes: Constructions and Bounds #12;Introduction Properties

Skachek, Vitaly

248

DOE Code:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

we1rbox installatiOn we1rbox installatiOn ____:....;...=.~;;....:..;=-+- DOE Code: - - !- Project Lead: Wes R1esland NEPA COMPLIANCE SURVEY J 3-24-10 1 Date: Project Information 1. Project Overview What are tne enwonmental mpacts? Contractor~~ _ _ _ _ ] 11 The purpose of this project is to prepare a pad for a 90 ton crane to get 1nto positiOn and ng up so we can 1 set our new weir box into position We will widen the existing road around 20 feet at the north end and taper our fill to about5 feet at the south end for a total of about 200 feeL and budd a near level pad for them tong up the crane on We will use the d1rt from the hill irnrnedJateiy north of the work to oe done 2. 3 4 What*s the legal location? What IS the durabon of the prOJed?

249

POLICY FLASH 2014-12 Executive Compensation Cap | Department...  

Energy Savers (EERE)

2 Executive Compensation Cap POLICY FLASH 2014-12 Executive Compensation Cap Questions concerning this policy flash should be directed to Carol Jenkins, of the Office of...

250

President Obama Announces Commitments and Executive Actions to...  

NLE Websites -- All DOE Office Websites (Extended Search)

Obama Announces Commitments and Executive Actions to Advance Solar Deployment and Energy Efficiency President Obama Announces Commitments and Executive Actions to Advance Solar...

251

A Review of the Department of Energy's Implementation of Executive...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Executive Order 12898 and Recommendations for a Second Five-Year Strategic Plan A Review of the Department of Energy's Implementation of Executive Order 12898 and...

252

Executive Order -- Preparing the United States for the Impacts...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order -- Preparing the United States for the Impacts of Climate Change Executive Order -- Preparing the United States for the Impacts of Climate Change...

253

President Issues Executive Order Aimed at Preparing for the Impacts...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

President Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force President Issues Executive Order Aimed at Preparing for...

254

Renewable Energy Requirement Guidance for EPAct 2005 and Executive...  

Energy Savers (EERE)

Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Guidance specifies...

255

OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental...  

Office of Environmental Management (EM)

OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy and Economic Performance OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy...

256

SPACE UTILIZATION STUDY -EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES  

E-Print Network (OSTI)

SPACE UTILIZATION STUDY - EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES UNIVERSITY School of Medicine & Health Sciences - Space Utilization Study Grand Forks, ND EXECUTIVE SUMMARY SUITAb utilities. · Lackofnaturallight

Delene, David J.

257

Richard Lazarus Named as Executive Director of National Commission...  

Energy Savers (EERE)

Lazarus Named as Executive Director of National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling Richard Lazarus Named as Executive Director of National...

258

Department of Energy and Commercial Real Estate Executives Launch...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Commercial Real Estate Executives Launch Alliance to Reduce Energy Consumption of Buildings Department of Energy and Commercial Real Estate Executives Launch Alliance to Reduce...

259

SHUG Executive Committee | ORNL Neutron Sciences Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Committee Executive Committee SHUG Executive Committee Members Tyrel McQueen Tyrel McQueen mcqueen@jhu.edu Term expires December 2014 Chair: Tyrel McQueen Assistant Professor of Chemistry Johns Hopkins University Research interests: New solid state chemistry materials design and synthesis techniques; experimental condensed matter physics, quantum magnetism, heat- and light-induced charge separation through strong electron correlations; superconductivity. Greg Beaucage Greg Beaucage beaucag@uc.edu Term expires December 2014 Past Chair: Greg Beaucage University of Cincinnati Research interests: Soft condensed matter and polymers, especially quantification of molecular topology using SANS, in the hierarchical structure of ceramic and metallic aggregates, and in the study of protein

260

Usage Codes Observer code Vessel code Trip ID  

E-Print Network (OSTI)

Usage Codes 1 5 2 6 3 7 4 8 Observer code Vessel code Trip ID Permit holder name/address Permit / N MMSI No. Y / N Present? Usage Water capacity (m3): Fuel capacity: m3 / tonnes Other: Other: Kw all that apply & note types of materials for each) Capacity: Usage Incinerator: Net mensuration Y / N

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Usage Codes Observer code Vessel code Trip ID  

E-Print Network (OSTI)

Usage Codes 1 5 2 6 3 7 4 8 Sonar Observer code Vessel code Trip ID Additional Information KHz: RPM / Other _______________Global Registry ID:MMSI No. Permit expiration (dd-mm- yy): Y / N Present? Usage contact Diver / dive equipment Usage Manufacturer Hull mounted / towed Catch Y / N Other: Y / N Y / NOther

262

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 9, 2012 April 9, 2012 U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. April 6, 2012 U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks A remote user can obtain potentially sensitive information. April 2, 2012 U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device. March 30, 2012 U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes

263

Executive Order 13123-Greening the Government Through Efficient Energy Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0851 0851 Federal Register Vol. 64, No. 109 Tuesday, June 8, 1999 Title 3- The President Executive Order 13123 of June 3, 1999 Greening the Government Through Efficient Energy Management By the authority vested in me as President by the Constitution and the laws of the United States of America, including the National Energy Conserva- tion Policy Act (Public Law 95-619, 92 Stat. 3206, 42 U.S.C. 8252 et seq.), as amended by the Energy Policy Act of 1992 (EPACT) (Public Law 102- 486, 106 Stat. 2776), and section 301 of title 3, United States Code, it is hereby ordered as follows: PART 1-PREAMBLE Section 101. Federal Leadership. The Federal Government, as the Nation's largest energy consumer, shall significantly improve its energy management in order to save taxpayer dollars and reduce emissions that contribute to

264

Account Executive Account Manager of Sales  

E-Print Network (OSTI)

Aerospace Engineer Air Quality Engineer Analyst Analyst/Consultant Applications Engineer ASIC VerificationAccount Executive Account Manager of Sales Administrative Assistant Advanced Systems Engineer Engineer Assistant Administrator Assistant Analyst Assistant Development Engineer Assistant Director

265

Project Execution Plan Review Module (RM)  

Energy.gov (U.S. Department of Energy (DOE))

The Project Execution Plan (PEP) Review Module (RM) is a tool that assists DOE federal project review teams in evaluating the adequacy of the PEP development and maintenance for projects of any...

266

Stateless and stateful implementations of faithful execution  

DOE Patents (OSTI)

A faithful execution system includes system memory, a target processor, and protection engine. The system memory stores a ciphertext including value fields and integrity fields. The value fields each include an encrypted executable instruction and the integrity fields each include an encrypted integrity value for determining whether a corresponding one of the value fields has been modified. The target processor executes plaintext instructions decoded from the ciphertext while the protection engine is coupled between the system memory and the target processor. The protection engine includes logic to retrieve the ciphertext from the system memory, decrypt the value fields into the plaintext instructions, perform an integrity check based on the integrity fields to determine whether any of the corresponding value fields have been modified, and provide the plaintext instructions to the target processor for execution.

Pierson, Lyndon G; Witzke, Edward L; Tarman, Thomas D; Robertson, Perry J; Eldridge, John M; Campbell, Philip L

2014-12-16T23:59:59.000Z

267

The Ethics of Hedging by Executives  

Science Journals Connector (OSTI)

These studies include: Bolster et al. (1996...), who discuss the use of equity swaps; Bettis et al. (2001) provide empirical evidence of the use of equity collars by executives; OBrian (1997...) outlines the use...

Lee M. Dunham; Ken Washer

2012-12-01T23:59:59.000Z

268

Senior Executive Fellows | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Overview: The Senior Executive Fellows program is designed for upper-level Overview: The Senior Executive Fellows program is designed for upper-level managers. The curriculum incorporates the executive core qualifications (ECQs) for SES and it is the program of choice for participants in SES Candidate Development Programs and other professionals looking to strengthen skills in problem solving, strategic analysis, persuasion and negotiation. Target Audience: The program focuses on skills associated with the Office of Personnel Management's (OPM) executive core qualifications (ECQs) and is designed for federal government employees at the GS-14/GS-15 levels. Program Cost: Is $19,800 and includes tuition, housing, curricular materials, and most meals. Program Session(s) and Application Deadline(s): Session Date: February 9, 2014 - March 7, 2014, Application

269

PREREM: an interactive data preprocessing code for INREM II. Part I: user's manual. Part II: code structure  

SciTech Connect

PREREM is an interactive computer code developed as a data preprocessor for the INREM-II (Killough, Dunning, and Pleasant, 1978a) internal dose program. PREREM is intended to provide easy access to current and self-consistent nuclear decay and radionuclide-specific metabolic data sets. Provision is made for revision of metabolic data, and the code is intended for both production and research applications. Documentation for the code is in two parts. Part I is a user's manual which emphasizes interpretation of program prompts and choice of user input. Part II stresses internal structure and flow of program control and is intended to assist the researcher who wishes to revise or modify the code or add to its capabilities. PREREM is written for execution on a Digital Equipment Corporation PDP-10 System and much of the code will require revision before it can be run on other machines. The source program length is 950 lines (116 blocks) and computer core required for execution is 212 K bytes. The user must also have sufficient file space for metabolic and S-factor data sets. Further, 64 100 K byte blocks of computer storage space are required for the nuclear decay data file. Computer storage space must also be available for any output files produced during the PREREM execution. 9 refs., 8 tabs.

Ryan, M.T.; Fields, D.E.

1981-05-01T23:59:59.000Z

270

Codes 101 | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes 101 Codes 101 This course covers basic knowledge of energy codes and standards, the development processes of each, historical timelines, adoption, implementation, and enforcement of energy codes and standards, and voluntary energy efficiency programs. Most sections have links that provide additional details on that section's topic as well as additional resources for more information. Begin Learning! Estimated Length: 1-2 hours CEUs Offered: 1.0 AIA/CES LU (HSW); .10 CEUs towards ICC renewal certification. Course Type: Self-paced, online Building Type: Commercial Residential Focus: Adoption Code Development Compliance Code Version: ASHRAE Standard 90.1 International Energy Conservation Code (IECC) Model Energy Code (MEC) Target Audience: Advocate Architect/Designer Builder

271

Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management  

Office of Energy Efficiency and Renewable Energy (EERE)

Full text of Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management.

272

Executive Director, ATN The position of Executive Director, Australian Technology Network  

E-Print Network (OSTI)

to policy direction in the higher education sector, has superior public advocacy and media communication information,visit: www.atn.edu.au/ATN_ED_Position_Details Applications close on 8 September 2014. EnquiriesExecutive Director, ATN The position of Executive Director, Australian Technology Network presents

University of Technology, Sydney

273

DOE-LM Executable Plan Cover Page  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30.2B Executable Plan for LM 30.2B Executable Plan for LM (DOE FEMP Draft) Signature for Site Office Concurrence_______________________________ Digitally signed by Raymond M. Plieness DOE ORDER 430.2B EXECUTABLE PLAN TEAM GOAL SUMMARY Please mark the appropriate box below with an "X" Goal Elements Plan Meets Goal Plan Exceeds Goal Plan Falls Short of Goal Comments Energy Efficiency X LM currently falls short of the goal and shows an increase of energy usage per square foot; however, this is due to the removal of buildings, and plans are in place to ensure that the goal is met by 2015 (by reducing groundwater treatment). Renewable Energy X Water X Transportation/Fleet Management X High Performance and Sustainable Buildings X This page intentionally left blank Page i Contents 1.0

274

2009 Wind Technologies Market Report: Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

1 1 2009 Wind Technologies Market Report Executive Summary Primary authors Ryan Wiser, Lawrence Berkeley National Laboratory Mark Bolinger, Lawrence Berkeley National Laboratory With contributions from Galen Barbose, Naïm Darghouth, Ben Hoen, and Andrew Mills (Berkeley Lab) Kevin Porter and Sari Fink (Exeter Associates) Suzanne Tegen (National Renewable Energy Laboratory) This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report available at http://www.nrel.gov/docs/fy10osti/48666.pdf (PDF 3.1 MB) 2 2009 Wind Technologies Market Report Executive Summary Despite grim predictions at the close of 2008, the U.S. wind power industry experienced yet another record year in 2009, once again surpassing even optimistic growth projections from years past. At the

275

Senior Executive Fellows | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Senior Executive Fellows Senior Executive Fellows Senior Executive Fellows February 7, 2014 (All day) Application Deadline(s): February 7, 2014 and July 12, 2014 Application Process: Please forward your name, organizational name, and program interest date to the DOE Career Development Program Manager via email to; Johnny McChriston not later than February 7, 2014 for the April 13, 2014 program date, and July 12, 2014 for the October 12, 2014 program date. Please go to the link below to complete an application. In addition, please be advised that early submission of your application are encouraged because the program is often filled to capacity. SEF Application Completed application packages should be emailed to the DOE program coordinator, Johnny McChriston or packages can be sent via FedEx, or UPS

276

How to Apply for Senior Executive positions | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

How to Apply for Senior Executive positions How to Apply for Senior Executive positions How to Apply for Senior Executive positions To apply vacancies for SENIOR EXECUTIVE SERVICE (SES) , SENIOR LEVEL (SL), SCIENTIFIC AND PROFESSIONAL (ST) positions within the Department of Energy please visit OPM's website: http://www.usajobs.gov. From this site, you may download announcements for vacancies of interest to you. SENIOR EXECUTIVE SERVICE (SES) The Guide to Senior Executive Service Qualifications provides detailed information about executive qualifications and tips for writing effective qualification statements. What Are Executive Core Qualifications (ECQs) The Executive Core Qualifications (ECQs) define the competencies needed to build a federal corporate culture that drives for results, serves customers, and builds successful teams and coalitions within and outside

277

Executive Leadership Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leadership Program Leadership Program Executive Leadership Program Program Overview: This program is based on the U.S. Office of Personnel Management's Leadership Effectiveness Framework (LEF), a model for effective leadership/managerial performance. The program helps participants acquire or enhance the LEF competencies needed to become a successful government leader and manager. Participants will complete the following activities: individual needs assessment; leadership development plans; leadership development team activities; developmental work assignment; shadowing assignment; executive interviews; management readings; and four residential training sessions. In order to complete all the components of the program, participants will be away from their position of record for a

278

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

279

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

280

Darden Executive Education Management Development Program  

E-Print Network (OSTI)

, or will soon undergo, the transition from a functional to a general management role. They may alsoDarden Executive Education Management Development Program: Driving Vision, Action, and Results ... Change the Way You Think! #12;The Program Organizations globally need to prepare middle management

Acton, Scott

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

EXECUTIVE SUMMARY NEW STUDENT & OWL FAMILY PROGRAMS  

E-Print Network (OSTI)

, and implementation of the program. a. Multiple new programs were enhanced and added to make New Student OrientationEXECUTIVE SUMMARY NEW STUDENT & OWL FAMILY PROGRAMS 2012-2013 Overview The Office of New Student and Owl Family Programs plays an integral role within the University by offering a supportive, innovative

Fernandez, Eduardo

282

Executive Education Program Freight Transportation and  

E-Print Network (OSTI)

Executive Education Program Freight Transportation and Logistics: Delivering Results in a Volatile Environment September 9 ­11, 2013 Northwestern University Transportation Center NonprofitOrganization U.S.Postage PAID NorthwesternUniversity TransportationCenter RobertR.McCormickSchool of

Bustamante, Fabián E.

283

A Market Feasibility Study Executive Summary  

E-Print Network (OSTI)

popular areblack,green,andoolongteas.Lesswellknowntypesincludewhiteand Puer tea. There is a high levelA Market Feasibility Study Executive Summary Hawai`i-Grown Tea Pacific Asian Center for Entrepreneurship #12;Overview This report is a feasibility study for developing tea into a viable and sustainable

284

Hawaii energy strategy: Executive summary, October 1995  

SciTech Connect

This is an executive summary to a report on the Hawaii Energy Strategy Program. The topics of the report include the a description of the program including an overview, objectives, policy statement and purpose and objectives; energy strategy policy development; energy strategy projects; current energy situation; modeling Hawaii`s energy future; energy forecasts; reducing energy demand; scenario assessment, and recommendations.

NONE

1995-10-01T23:59:59.000Z

285

Carbon Management Plan 1. Executive summary 5  

E-Print Network (OSTI)

of energy intensive buildings have been constructed, whilst at the same time disposals have concentrated. Background and context 16 4. Carbon management strategy 18 5. Carbon emissions baseline and projections 22 6 Plan interventions 55 Appendix B: Possible future actions 76 #12;4 #12;5 1. EXECUTIVE SUMMARY Foreword

Haase, Markus

286

TABLE OF CONTENTS 3 Executive Summary  

E-Print Network (OSTI)

. JISAO's four major research themes, Fisheries Recruitment (Marine Ecosystems), Climate, Environmental Ecosystems 34 Climate 60 Environmental Chemistry 70 Coastal Oceanography 75 Appendices 75 Appendix 1 Senior;3 EXECUTIVE SUMMARY The Joint Institute for the Study of the Atmosphere and Ocean (JISAO) fosters

Rigor, Ignatius G.

287

National Academy of Sciences Executive Office  

E-Print Network (OSTI)

, and the Columbia River Inter-Tribal Fish Commission, the National Research Council's Board on Environmental Studies Board (ISAB) and Independent Scientific Review Panel (ISRP). Dr. David Policansky of the NRC's Board1 National Academy of Sciences Executive Office 2101 Constitution Avenue, NW Washington, DC 20418

288

Microsoft Word - Building Energy Codes Survey Report GEO _2_.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Building & Energy Codes Building & Energy Codes Survey Results Prepared by the Governor's Energy Offi ce July 2009 The Governor's Energy Offi ce 1580 Logan Street, Suite 100 Denver, CO 80203 www.colorado.gov/energy (303) 866-2100 Executive Summary Colorado Governor Bill Ritter, Jr., issued an Executive Order on April 16, 2007, re-creating the Governor's Office of Energy Management and Conservation as the Governor's Energy Office (GEO). The GEO's mission is to lead Colorado to a New Energy Economy by advancing energy efficiency and renewable, clean energy resources. The New Energy Economy embraces energy conservation as an important component in our energy future, yet requires a broader mission to meet the goals of expanding renewable and clean energy resources and opportunities for the state's economy, environment and energy

289

A Principal Components Analysis of Executive Processes: Exploring the Structure of Executive Functions using Neuropsychological Tests  

E-Print Network (OSTI)

, Dual-Tasking and Planning) and their relationship to Intelligence. The separability of these executive functions was explored. Ten neuropsychological tests were administered to young and healthy participants (N =103). Correlations between tests...

Maner, Safir

2011-11-23T23:59:59.000Z

290

Executive Summaries for the Hydrogen Storage Materials Center...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Summaries for the Hydrogen Storage Materials Center of Excellence - Chemical Hydrogen Storage CoE, Hydrogen Sorption CoE, and Metal Hydride CoE Executive Summaries for...

291

The Senior Executive Service (SES) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Resources » The Senior Executive Service Executive Resources » The Senior Executive Service (SES) The Senior Executive Service (SES) The Senior Executive Service (SES) is a corps of men and women who administer public programs at the highest levels of Federal Government utilizing well-honed executive skills and broad perspectives of government and public service. Positions are primarily managerial and supervisory and serve just below top Presidential appointees forming a vital link between these appointees and the rest of the Federal workforce. Members of the SES are selected according to their leadership qualifications based on criteria established by the Office of Personnel Management which manages the overall Federal executive personnel system. The SES was established by the Civil Service Reform Act (CSRA) of 1978 as a

292

A Hybrid Procedural Deductive Executive For Autonomous Spacecraft  

E-Print Network (OSTI)

autonomy, including robust plan execution Pell et al. 1997b. Since aborting a plan and taking time to re of robust plans, which incorpo- rate exibility to be used by the execution system in case problems

Williams, Brian C.

293

SEAMOPT: A Stirling engine performance optimization code  

SciTech Connect

A computer code for Stirling engine research and design is described. The code system, SEAMOPT, has been used to: optimize component and engine performance, modify an existing engine to meet new application requirements, and identify design methods that lead to performance improvement and simplified engine design. SEAMOPT consists of a full Stirling engine simulation linked to a rigorous optimization code through an interface module which defines performance objectives and constraints which might limit values of design variables. Calculated results are presented from two example problems using the GPU-3 Stirling engine as a base design. The first example shows how regenerator dimensions can be changed to achieve three different performance objectives. The second example shows changes in the entire thermodynamic section needed to increase power by a factor of 8 while maintaining efficiency. The code, which requires 65K words of memory, executed problem 1 in 45 seconds and problem 2 in 10 minutes on an IBM 3033. 13 refs., 10 figs., 10 tabs.

Heames, T.J.; Daley, J.G.; Minkoff, M.

1986-05-01T23:59:59.000Z

294

Model Building Energy Code  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

295

Building Energy Code  

Energy.gov (U.S. Department of Energy (DOE))

''Note: Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For...

296

Building Energy Code  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

297

Coding AuthentiCity  

E-Print Network (OSTI)

This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

Mercier, Rachel Havens

2008-01-01T23:59:59.000Z

298

Introduction to Algebraic Codes  

E-Print Network (OSTI)

for health care. These self-correcting codes that occur in nature might be better than all of. our coding theory based on algebra or algebraic geometry. It is a myth

299

Approaches to Distributed Execution of Scientific Workflows in Kepler  

Science Journals Connector (OSTI)

The Kepler scientific workflow system enables creation, execution and sharing of workflows across a broad range of scientific and engineering disciplines while also facilitating remote and distributed execution of workflows. In this paper, we present ... Keywords: Distributed Execution, Kepler, Scientific Workflow

Marcin P?ciennik; Tomasz ?ok; Ilkay Altintas; Jianwu Wang; Daniel Crawl; David Abramson; Frederic Imbeaux; Bernard Guillerminet; Marcos Lopez-Caniego; Isabel Campos Plasencia; Wojciech Pych; Pawel Cieciel?g; Bartek Palak; Micha? Owsiak; Yann Frauel

2013-07-01T23:59:59.000Z

300

Contracts for Model Execution Verification Eric Cariou1  

E-Print Network (OSTI)

Contracts for Model Execution Verification Eric Cariou1 , Cyril Ballagny2 , Alexandre Feugas3 a contract-based approach to specify an execution semantics for a meta-model. We show that an execution model transformation contracts for controlling the dynamic con- sistent evolution of a model during its

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Sustainable Acquisition Coding System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System More Documents &...

302

GENII Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GENII Code GENII Code GENII is a second generation of environmental dosimetry computer code compiled in the Hanford Environmental Dosimetry System (Generation II). GENII provides a...

303

The Implementation of a Hybrid-Execute-In-Place Architecture to Reduce the Embedded System Memory Footprint and Minimize Boot Time  

E-Print Network (OSTI)

Footprint and Minimize Boot Time Tony Benavides, Justin Treon, Jared Hulbert, and Willie Chang1 Flash Memory effectiveness and performance. The ability for an operating system to boot quickly combined with speedy-system where the code gets copied to RAM at boot time and executes out of the RAM. This paper explores

Chang, Weide

304

Mr. William Mendoza Acting Executive Director  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

William Mendoza William Mendoza Acting Executive Director Department of Energy Washing!on, DC 20585 May4, 2011 White House Initiative on Tribal Colleges and Universities Department of Education 400 Maryland A venue, SW Washington, DC 20202 Dear Mr. Mendoza: Enclosed is the Department of Energy's (DOE) Fiscal Year (FY) 2010 Annual Performance Report on our activities to assist Tribal College and Universities (TCUs). DOE is submitting this information in accordance with Executive Order 13270. In FY 2010, DOE provided $275,000 in total expenditures for TCUs, an increase of $169,500 from the amount provided to TCU s in FY 2009. In an effort to raise the level of support in future years, DOE will continue to set funding goals and to identify opportunities for additional

305

SAMPLE MODEL AGREEMENT … NOT FOR EXECUTION  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MODEL AGREEMENT - NOT FOR EXECUTION MODEL AGREEMENT - NOT FOR EXECUTION 5/2/11 Template start-up option 1 of 8 OPTION AGREEMENT This option agreement (the "Agreement") is made by and is effective as of the date of last signature ("Effective Date") by Name of Contractor ("Abbreviated name of the Contractor" or "Lab"), which operates Name of National Laboratory at Address of the Lab (hereinafter "Abbreviated name of the Laboratory") under Contract No. ####### with the United States Department of Energy ("DOE") and Name of Company ("Abbreviated name of the Company" or "Company"), having a principal place of business at Address of the Company. 1. BACKGROUND 1.1. Lab owns certain U.S. patent properties related to describe the technology

306

Executive Fleet Vehicles DOE HQ 2011  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Motor Vehicle Management Report Motor Vehicle Management Report U.S. Department of Energy - HQ Pursuant to Federal Management Regulation 102-34.50 (41 CFR 102-34.50) November 14, 2011 Background: On May 24, 2011, the President issued a Presidential Memorandum on Federal Fleet Performance. In accordance with Section 1 (b) of the Presidential Memorandum and pursuant to Federal Management Regulation 102-34.50 (41 CFR 102-34.50), executive fleets are required to achieve maximum fuel efficiency; be limited in motor vehicle body size, engine size, and optional equipment to what is essential to meet agency mission; and be midsize or smaller sedans, except where larger sedans are essential to the agency mission. Within 180 days of the date of the Presidential Memorandum, any executive fleet vehicles that are larger than a midsize sedan or do not comply with alternative fueled

307

TRAN-STAR EXECUTIVE LIMOUSINE COMPANY  

NLE Websites -- All DOE Office Websites (Extended Search)

TRAN-STAR EXECUTIVE LIMOUSINE COMPANY TRAN-STAR EXECUTIVE LIMOUSINE COMPANY http://www.tranexec.com 20% off published rates for BNL Our reservation center is open 24 hours a day, 365 days a year, so you will always talk to a live agent who has direct contact with our chauffeurs. You can make reservations via phone, website or a simple e-mail to customerservice@tranexec.com once a profile has been established. Our advanced reservation system will track any flight and you can rest assured someone will always be there to meet the arriving passenger, no matter what time the flight arrives. http://www.tranexec.com/TranStarSalesBrochure.pdf These rates are inclusive rates, meaning they include gratuity, taxes....everything. They do not include parking or tolls

308

Executive Order 13007 Indian Sacred Sites (1996)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6771 6771 Federal Register / Vol. 61, No. 104 / Wednesday, May 29, 1996 / Presidential Documents Executive Order 13007 of May 24, 1996 Indian Sacred Sites By the authority vested in me as President by the Constitution and the laws of the United States, in furtherance of Federal treaties, and in order to protect and preserve Indian religious practices, it is hereby ordered: Section 1. Accommodation of Sacred Sites. (a) In managing Federal lands, each executive branch agency with statutory or administrative responsibility for the management of Federal lands shall, to the extent practicable, permitted by law, and not clearly inconsistent with essential agency functions, (1) accommodate access to and ceremonial use of Indian sacred sites by Indian religious practitioners and (2) avoid adversely affecting the physical integrity

309

Executive Order 13514 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

514 514 Executive Order 13514 October 8, 2013 - 1:41pm Addthis Executive Order (E.O.) 13514, Federal Leadership in Environmental, Energy, and Economic Performance, was signed on October 5, 2009. It expanded upon the energy reduction and environmental performance requirements of E.O. 13423. E.O. 13514 sets numerous Federal energy requirements the following. This summary is intended as a reference only. Refer to the full text of E.O. 13514 for more details relevant to your work. Accountability and Transparency E.O. 13514 accountability, transparency, and reporting requirements include: Within 30 days, Federal agency heads must designate a senior management official to serve as Senior Sustainability Officer accountable for agency conformance. The Senior Sustainability Officer designation must be reported

310

PROJECT MANGEMENT PLAN EXAMPLES Project Execution Example  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Execution Example Project Execution Example Example 73 6.3 Project Approach The overall schedule strategy for the PFP project includes ongoing minimum safe activities, combined with stabilization of materials followed by materials disposition, and subsequent transition of the PFP complex to a decommissioned state. The PFP material stabilization baseline was developed using a functionally-based work WBS. The WBS defines all activities required to take each material stream from their current location/conditions through stabilization (as required), and disposition the stabilized material as solid waste for shipment to WIPP or as product material for shipment to SRS. Initially, workshops were held with subject matter experts, project managers, schedulers, and support personnel (experts in the

311

Executive Order 12968 Access to Classified Information  

NLE Websites -- All DOE Office Websites (Extended Search)

40243 40243 Monday August 7, 1995 Part IV The President Executive Order 12968-Access to Classified Information Presidential Determination No. 95-32 of July 28, 1995 Presidential Determination No. 95-33 of July 31, 1995 Presidential Documents 40245 Federal Register Vol. 60, No. 151 Monday, August 7, 1995 Title 3- The President Executive Order 12968 of August 2, 1995 Access to Classified Information The national interest requires that certain information be maintained in confidence through a system of classification in order to protect our citizens, our democratic institutions, and our participation within the community of nations. The unauthorized disclosure of information classified in the national interest can cause irreparable damage to the national security and loss of human life.

312

Executive Potential Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Potential Program Potential Program Executive Potential Program Program Overview: This is a one year training program designed to help senior leaders understand and meet the challenges facing today's federal workforce. Through personal and professional development, The Executive Potential Program builds leadership capacity through strengthening the competencies needed to help today's leaders create a work environment prepared to meet changing agency initiatives. Nomination Due Date: Nomination Due Date: The nomination package must be received by the nomination deadline, which are as follows. (For EEP 2015-1 January 10, 2014 or until filled). (For EPP 2015-DC, April 8, 2014 or until filled) Please be advised that for the 2015-DC session only, there is a limit of 30 participants on a first come basis. Applicants are advised

313

Renewable Electricity Futures Study: Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

Executive Summary Executive Summary NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. Volume 2 PDF Volume 3 PDF Volume 1 PDF Volume 4 PDF Renewable Electricity Futures Study Edited By Hand, M.M. National Renewable Energy Laboratory Baldwin, S. U.S. Department of Energy DeMeo, E. Renewable Energy Consulting Services, Inc. Reilly, J.M. Massachusetts Institute of Technology Mai, T. National Renewable Energy Laboratory Arent, D. Joint Institute for Strategic Energy Analysis Porro, G. National Renewable Energy Laboratory Meshek, M. National Renewable Energy Laboratory Sandor, D. National Renewable Energy Laboratory Suggested Citations Renewable Electricity Futures Study (Entire Report)

314

Correct Execution of Reconfiguration for Stateful Components  

Science Journals Connector (OSTI)

In component-based software engineering, reconfiguration describes structural changes to the architecture of a component system. For stateful components, not only structural but also behavioural aspects have to be taken into account in reconfiguration. We present a procedure to conduct reconfiguration in systems of concurrent, stateful components that interferes as little as possible with unchanged subsystems. Reconfiguration is described by a plan for adding, deleting and reconnecting components. A plan is executed by a sequence of simple, local steps, which are suitable for implementation in a programming language. We prove that plan execution is indistinguishable from atomic reconfiguration and use this fact for state-space reduction for verifying properties by model checking.

Moritz Hammer; Alexander Knapp

2010-01-01T23:59:59.000Z

315

Executive Order 13221 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

221 221 Executive Order 13221 October 8, 2013 - 1:48pm Addthis Executive Order (E.O.) 13221, Energy-Efficient Standby Power Devices, calls for Federal agencies to purchase products that use minimal standby power when possible. It was signed on August 2, 2001. Requirements for Energy Efficiency and Standby Power This section outlines major requirements defined by E.O. 13221. The content is intended as a reference only. You should refer to the text of E.O. 13221 for more details relevant to your work. Federal agencies must purchase products that use no more than one watt in standby power consuming mode when purchasing commercially-available, off-the-shelf products that use external standby power devices or that contain an internal standby power function. If such products are not available, agencies shall purchase products with

316

Executive Order 13423 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

423 423 Executive Order 13423 October 8, 2013 - 1:44pm Addthis Executive Order (E.O.) 13423, Strengthening Federal Environmental, Energy, and Transportation Management, was signed on January 24, 2007, to strengthen key goals for the Federal Government. It set more challenging goals than the Energy Policy Act of 2005 (EPAct 2005) and superseded E.O. 13123 and E.O. 13149. This summary below is intended as a reference only. You should refer to the full text of E.O. 13423 for more details relevant to your work. Implementing Instructions In consultation with the Director of the Office of Management and Budget, the Chairman of the Council on Environmental Quality issued instructions and defined requirements for implementing E.O. 13423. The implementation instructions identify the entities responsible for coordination and

317

Code of Conduct  

NLE Websites -- All DOE Office Websites (Extended Search)

Governance » Governance » Ethics, Accountability » Code of Conduct Code of Conduct Helping employees recognize and resolve the ethics and compliance issues that may arise in their daily work. Contact Code of Conduct (505) 667-7506 Code of Conduct LANL is committed to operating in accordance with the highest standards of ethics and compliance and with its core values of service to our nation, ethical conduct and personal accountability, excellence in our work, and mutual respect and teamwork. LANL must demonstrate to customers and the public that the Laboratory is accountable for its actions and that it conducts business in a trustworthy manner. What is LANL's Code of Conduct? Charlie McMillan 1:46 Laboratory Director Charlie McMillan introduces the code LANL's Code of Conduct is designed to help employees recognize and

318

Code Red 2 kills off Code Red 1  

E-Print Network (OSTI)

#12;#12;Code Red 2 kills off Code Red 1 Code Red 2 settles into weekly pattern Nimda enters the ecosystem Code Red 2 dies off as programmed CR 1 returns thanks to bad clocks #12;Code Red 2 dies off as programmed Nimda hums along, slowly cleaned up With its predator gone, Code Red 1 comes back, still

Paxson, Vern

319

Code loops in both parities  

Science Journals Connector (OSTI)

We present equivalent definitions of code loops in any characteristic p?0. The most natural definition is via combinatorial polarization, but we also show how to realize code loops by linear codes and as a class of symplectic conjugacy ... Keywords: Characteristic form, Code loop, Combinatorial polarization, Conjugacy closed loop, Doubly even code, Even code loop, Kronecker product, Moufang loop, Odd code loop, Self-orthogonal code, Small Frattini loop, Symmetric associator, Symplectic loop

Ale Drpal; Petr Vojt?chovsk

2010-06-01T23:59:59.000Z

320

Stimulation at Desert Peak -modeling with the coupled THM code FEHM  

SciTech Connect

Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

sharad kelkar

2013-04-30T23:59:59.000Z

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Mechanical code comparator  

DOE Patents (OSTI)

A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)

2002-01-01T23:59:59.000Z

322

Difficulties in vector-parallel processing of Monte Carlo codes  

SciTech Connect

Experiences with vectorization of production-level Monte Carlo codes such as KENO-IV, MCNP, VIM, and MORSE have shown that it is difficult to attain high speedup ratios on vector processors because of indirect addressing, nests of conditional branches, short vector length, cache misses, and operations for realization of robustness and generality. A previous work has already shown that the first, second, and third difficulties can be resolved by using special computer hardware for vector processing of Monte Carlo codes. Here, the fourth and fifth difficulties are discussed in detail using the results for a vectorized version of the MORSE code. As for the fourth difficulty, it is shown that the cache miss-hit ratio affects execution times of the vectorized Monte Carlo codes and the ratio strongly depends on the number of the particles simultaneously tracked. As for the fifth difficulty, it is shown that remarkable speedup ratios are obtained by removing operations that are not essential to the specific problem being solved. These experiences have shown that if a production-level Monte Carlo code system had a capability to selectively construct source coding that complements the input data, then the resulting code could achieve much higher performance.

Higuchi, Kenji; Asai, Kiyoshi [Japan Atomic Energy Research Inst., Tokyo (Japan). Center for Promotion of Computational Science and Engineering; Hasegawa, Yukihiro [Research Organization for Information Science and Technology, Tokai, Ibaraki (Japan)

1997-09-01T23:59:59.000Z

323

Building Codes Resources  

Energy.gov (U.S. Department of Energy (DOE))

Some commercial and/or residential construction codes mandate certain energy performance requirements for the design, materials, and equipment used in new construction and renovations.

324

" Row: NAICS Codes;" " Column...  

U.S. Energy Information Administration (EIA) Indexed Site

2 Number of Establishments by Usage of General Energy-Saving Technologies, 2010;" " Level: National Data; " " Row: NAICS Codes;" " Column: Usage within General Energy-Saving...

325

" Row: NAICS Codes;"  

U.S. Energy Information Administration (EIA) Indexed Site

3 Number of Establishments by Usage of Cogeneration Technologies, 2010;" " Level: National Data; " " Row: NAICS Codes;" " Column: Usage within Cogeneration Technologies;" " Unit:...

326

" Row: NAICS Codes;"  

U.S. Energy Information Administration (EIA) Indexed Site

3 Number of Establishments by Usage of Cogeneration Technologies, 2002; " " Level: National Data; " " Row: NAICS Codes;" " Column: Usage within Cogeneration Technologies;" " Unit:...

327

Tokamak Systems Code  

SciTech Connect

The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

1985-03-01T23:59:59.000Z

328

" Row: NAICS Codes;"  

U.S. Energy Information Administration (EIA) Indexed Site

Establishment","Onsite","per Establishment" "Code(a)","Subsector and Industry","(million sq ft)","(counts)","(sq ft)","(counts)","(counts)" ,,"Total United...

329

Codes and Standards  

Energy.gov (U.S. Department of Energy (DOE))

Currently, thirteen U.S. and two international standards development organizations (SDOs) are developing and publishing the majority of the voluntary domestic codes and standards. These...

330

" Row: NAICS Codes;" " ...  

U.S. Energy Information Administration (EIA) Indexed Site

1.3. Number of Establishments by Quantity of Purchased Electricity, Natural Gas, and Steam, 1998;" " Level: National Data; " " Row: NAICS Codes;" " Column: Supplier Sources of...

331

EIA - Annual Energy Outlook 2009 - Executive Summary  

Gasoline and Diesel Fuel Update (EIA)

Executive Summary Executive Summary Annual Energy Outlook 2009 with Projections to 2030 Executive Summary The past year has been a tumultuous one for world energy markets, with oil prices soaring through the first half of 2008 and diving in its second half. The downturn in the world economy has had a significant impact on energy demand, and the near-term future of energy markets is tied to the downturn’s uncertain depth and persistence. The recovery of the world’s financial markets is especially important for the energy supply outlook, because the capital-intensive nature of most large energy projects makes access to financing a critical necessity. The projections in AEO2009 look beyond current economic and financial woes and focus on factors that drive U.S. energy markets in the longer term. Key issues highlighted in the AEO2009 include higher but uncertain world oil prices, growing concern about greenhouse gas (GHG) emissions and its impacts on energy investment decisions, the increasing use of renewable fuels, the increasing production of unconventional natural gas, the shift in the transportation fleet to more efficient vehicles, and improved efficiency in end-use appliances. Using a reference case and a broad range of sensitivity cases, AEO2009 illustrates these key energy market trends and explores important areas of uncertainty in the U.S. energy economy. The AEO2009 cases, which were developed before enactment of the American Recovery and Reinvestment Act of 2009 (ARRA2009) in February 2009, reflect laws and policies in effect as of November 2008.

332

NREL: Energy Executive Leadership Academy - Leadership Institute  

NLE Websites -- All DOE Office Websites (Extended Search)

Institute Institute Participants in NREL's Executive Energy Leadership Institute learn about renewable energy and energy efficiency from the experts through this accelerated training program typically conducted over a three-day period. Course content includes briefings by technology experts on renewable energy and energy efficiency technologies, market assessments, and analytical and financial tools, as well as associated technology tours. Tours of NREL research facilities are a key component of the Institute. All sessions originate and end at NREL's campus in Golden, Colorado. For additional details, including a customized Leadership Institute in your region, see the sample syllabus or contact Energy Execs. Qualified individuals are invited to apply for the upcoming 2014 Institute.

333

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 T-566: Citrix Secure Gateway Unspecified Vulnerability A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. February 18, 2011 T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device. February 17, 2011 T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via

334

Executive Order 13583, Establishing a Coordinated Government-Wide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order 13583, Establishing a Coordinated Government-Wide Executive Order 13583, Establishing a Coordinated Government-Wide Initiative to Promote Diversity and Inclusion in the Federal Workforce Executive Order 13583, Establishing a Coordinated Government-Wide Initiative to Promote Diversity and Inclusion in the Federal Workforce August 18, 2011 - 11:15am Addthis Executive Order 13583 Established a "coordinated government-wide initiative to promote diversity and inclusion in the federal workforce". Wherever possible, the Federal Government must also seek to consolidate compliance efforts established through related or overlapping statutory mandates, directions from Executive Orders, and regulatory requirements. Addthis Related Articles A Government-Wide Approach to a Diverse Workforce Executive Order 13583, Establishing a Coordinated Government-Wide Initiative to Promote Diversity and Inclusion in the Federal Workforce

335

FY 2006 Executive Order 13101 Report: Department of Energy Affirmative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FY 2006 Executive Order 13101 Report: Department of Energy FY 2006 Executive Order 13101 Report: Department of Energy Affirmative Procurement and Recycling Fiscal Year 2006 Report, 3/12/07 FY 2006 Executive Order 13101 Report: Department of Energy Affirmative Procurement and Recycling Fiscal Year 2006 Report, 3/12/07 The Department of Energy (DOE) is pleased to transmit the enclosed report in fulfillment of the annual reporting requirements under Executive Order 13101, Greening the Government through Waste Prevention, Recycling, and Federal Acquisition. The report was prepared in accordance with the survey instructions provided in your letter to Agency Environmental Executives and Senior Procurement Executives, dated November 2, 2006. DOE's report contains the specific purchasing data that you requested on the eight (8)

336

Runtime optimization of an application executing on a parallel computer  

DOE Patents (OSTI)

Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

Faraj, Daniel A; Smith, Brian E

2014-11-25T23:59:59.000Z

337

Runtime optimization of an application executing on a parallel computer  

DOE Patents (OSTI)

Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

Faraj, Daniel A; Smith, Brian E

2014-11-18T23:59:59.000Z

338

A New Project Execution Methodology; Integrating Project Management Principles with Quality Project Execution Methodologies  

E-Print Network (OSTI)

On an annual basis, there are numerous reports in regards to a particular company or functions inability to execute on a large number of projects. The reasons vary widely from a lack of an initial understanding of what the customer was really...

Schriner, Jesse J.

2008-07-25T23:59:59.000Z

339

CODES: Enabling Co-Design of Multilayer Exascale Storage Architectures |  

NLE Websites -- All DOE Office Websites (Extended Search)

CODES: Enabling Co-Design of Multilayer Exascale Storage Architectures CODES: Enabling Co-Design of Multilayer Exascale Storage Architectures CODES seeks to enable the exploration and co-design of exascale storage systems by providing a detailed, accurate, and highly parallel simulation of exascale storage and the surrounding environment. Specifically the intention is to (1) portray realistic application checkpointing and analysis workloads, (2) capture the complexity, scale, and multilayer nature of exascale storage hardware and software, and (3) execute in a timeframe that enables "what if'" exploration of design concepts. To this end we develop models of the major hardware and software components in an exascale storage system, as well as the application I/O workloads that drive them. We will use our simulation system to investigate critical

340

Trusted Computing Technologies, Intel Trusted Execution Technology.  

SciTech Connect

We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

Guise, Max Joseph; Wendt, Jeremy Daniel

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Memorandum of Understanding on Environmental Justice and Executive Order 12898  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ON ON ENVIRONMENTAL JUSTICE AND EXECUTIVE ORDER 12898 WHEREAS, on February 11, 1994, the President signed Executive Order 12898, "Federal Actions to Address Environmental Justice in Minority Populations and Low-Income Populations" ("Executive Order 12898" or "Order"), and issued an accompanying Presidential Memorandum (references to this Order herein also generally include this Memorandum), and WHEREAS, Executive Order 12898 applies to the following agencies: the Department of Agriculture, Department of Commerce, Department of Defense, Department of Energy, Department of Health and Human Services, Department of Housing and Urban Development, Department of the Interior, Department of Justice, Department of Labor, Department of Transportation, and the Environmental

342

Executive Order 13148-Greening the Government Through Leadership in  

NLE Websites -- All DOE Office Websites (Extended Search)

48-Greening the Government Through Leadership 48-Greening the Government Through Leadership in Environmental Management Executive Order 13148-Greening the Government Through Leadership in Environmental Management The head of each Federal agency is responsible for ensuring that all necessary actions are taken to integrate environmental accountability into agency day-to-day decisionmaking and long-term planning processes, across all agency missions, activities, and functions. Executive Order 13148-Greening the Government Through Leadership in Environmental Management More Documents & Publications Executive Order 12969-Federal Acquisition and Community RightTo-Know Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000

343

Department of Energy Guide for Project Execution Plans - DOE...  

NLE Websites -- All DOE Office Websites (Extended Search)

5, Department of Energy Guide for Project Execution Plans by John Makepeace Functional areas: Program Management, Project Management This directive provides guidance for the...

344

PIA - Savannah River Operations Office Executive Commitment Action...  

Office of Environmental Management (EM)

River Operations Office Executive Commitment Action Tracking System More Documents & Publications PIA - GovTrip (DOE data) PIA - Bonneville Power Adminstration Ethics Helpline...

345

Optimal Execution Under Jump Models For Uncertain Price Impact  

E-Print Network (OSTI)

Aug 13, 2012 ... A major source of the execution cost comes from price impacts of both the investor's own trades and other concurrent institutional trades.

Somayeh Moazeni

2012-08-13T23:59:59.000Z

346

The Health Benefits of Tackling Climate Change: An Executive...  

Open Energy Info (EERE)

Benefits of Tackling Climate Change: An Executive Summary for The Lancet Series Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Health Benefits of Tackling Climate...

347

Engaging Non-IT Executives in IT Infrastructure Decisions  

E-Print Network (OSTI)

This case study describes how information technology (IT) managers from Insurance Co. successfully engaged non-IT executives in IT infrastructure investment decisions. This

Fonstad, Nils O.

2008-07-01T23:59:59.000Z

348

Stopping executions, saving computers with new malware detection...  

NLE Websites -- All DOE Office Websites (Extended Search)

saving computers with new malware detection tool A computer tool that allows the machine to identify malicious executable files without being exposed to their harmful...

349

Implementation of Executive Order 13514, Federal Leadership in...  

Energy Savers (EERE)

in Environmental, Energy, and Economic Performance 2010.03.31 Secretary Memo - Scope 1 GHG reduction goal.pdf More Documents & Publications OVERVIEW OF EXECUTIVE ORDER 13XXX...

350

Executive Order 13045, Protection of Children from Environmental...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

45, Protection of Children from Environmental Health Risks and Safety Risks Executive Order 13045, Protection of Children from Environmental Health Risks and Safety Risks Each...

351

Executive Order 13514-Federal Leadership in Environmental, Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14-Federal Leadership in Environmental, Energy, and Economic Performance Executive Order 13514-Federal Leadership in Environmental, Energy, and Economic Performance It is therefore...

352

Women executed by the state of Connecticut / Heather Pollard.  

E-Print Network (OSTI)

??The Purpose of this thesis was to add to the general information about the women executed by the state of Connecticut. It also sought to (more)

Pollard, Heather Ann, 1977-

2009-01-01T23:59:59.000Z

353

DOE executes a diverse portfolio of capital asset projects supporting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

impacting the project must be endorsed by the project's Acquisition Executive per DOE Order 413.3B (the Order). Selecting an appropriate acquisition strategy, establishing a...

354

Draft Revised Guidelines for Implementing Executive Order 11988, "Floodplain Management"  

Energy.gov (U.S. Department of Energy (DOE))

The Federal Emergency Management Agency published the draft Revised Guidelines for Implementing Executive Order 11988, Floodplain Management for public review and comment on January 30, 2015.

355

Mr. Stephen J. Wright Administrator and Chief Executive Officer  

NLE Websites -- All DOE Office Websites (Extended Search)

8, 2008 Mr. Stephen J. Wright Administrator and Chief Executive Officer Bonneville Power Administration P.O. Box 3621 Portland, Oregon 97208-3621 Subject: Slice Product...

356

Work Planning, Control and Execution | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Conclusion Work Planning, Control and Execution More Documents & Publications DOE Handbook: Implementing Activity-level Work Planning & Control at Nuclear Facilities...

357

Executive Order 11990-Protection Of Wetlands | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

90-Protection Of Wetlands Executive Order 11990-Protection Of Wetlands in order to avoid to the extent possible the long and short term adverse impacts associated with the...

358

11. CONTRACT ID CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

1 PAGE 1 OF2 AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT PAGES 2. AMENDMENT/MODIFICATION NO. I 3. EFFECTIVE DATE M191 See Block 16C 4. REQUISITION/PURCHASE I 5. PROJECT NO. (If applicable) REQ. NO. 6.ISSUED BY CODE U.S. Department of Energy National Nuclear Security Administration Service Center Property and M&O Contract Support Department P.O. Box 5400 Albuquerque, NM 87185-5400 7. ADMINISTERED BY (If other than Item 6) CODE U.S. Department of Energy National Nuclear Security Administration Manager, Pantex Site Office P.O. Box 30030 Amarillo, TX 79120 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120 CODE I FACILITY CODE SA. AMENDMENT OF SOLICITATION NO.

359

PETSc: Docs: Code Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Management Code Management Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation SAWs Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site In this file we list some of the techniques that may be used to increase one's efficiency when developing PETSc application codes. We have learned to use these techniques ourselves, and they have improved our efficiency tremendously. Editing and Compiling The biggest time sink in code development is generally the cycle of EDIT-COMPILE-LINK-RUN. We often see users working in a single window with a cycle such as: Edit a file with emacs. Exit emacs. Run make and see some error messages. Start emacs and try to fix the errors; often starting emacs hides

360

Hydrogen Codes and Standards  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes and Standards Codes and Standards James Ohi National Renewable Energy Laboratory 1617 Cole Blvd. Golden, CO 80401 Background The development and promulgation of codes and standards are essential if hydrogen is to become a significant energy carrier and fuel because codes and standards are critical to establishing a market-receptive environment for commercializing hydrogen-based products and systems. The Hydrogen, Fuel Cells, and Infrastructure Technologies Program of the U.S. Department of Energy (DOE) and the National Renewable Energy Laboratory (NREL), with the help of the National Hydrogen Association (NHA) and other key stakeholders, are coordinating a collaborative national effort by government and industry to prepare, review, and promulgate hydrogen codes and standards needed to expedite hydrogen infrastructure development. The

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Residential Building Code Compliance  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 Residential Building Code Compliance: Recent Findings and Implications Energy use in residential buildings in the U.S. is significant-about 20% of primary energy use. While several approaches reduce energy use such as appliance standards and utility programs, enforcing state building energy codes is one of the most promising. However, one of the challenges is to understand the rate of compliance within the building community. Utility companies typically use these codes as the baseline for providing incentives to builders participating in utility-sponsored residential new construction (RNC) programs. However, because builders may construct homes that fail to meet energy codes, energy use in the actual baseline is higher than would be expected if all buildings complied with the code. Also,

362

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability  

Energy.gov (U.S. Department of Energy (DOE))

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

363

Unspecified Journal Volume 00, Number 0, Pages 000000  

E-Print Network (OSTI)

0000 (copyright holder) 1 #12;2 W.S. CHEUNG, XUHUA LIU AND T.Y. TAM Theorem 1.1. ([9, p.50-51]) Let, BOUNDARY POINTS, AND JOINT NUMERICAL RANGES WAI-SHUN CHEUNG, XUHUA LIU AND TIN-YAU TAM Abstract

Tam, Tin-Yau

364

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticate...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with...

365

A Fault-Oblivious Extreme-Scale Execution Environment (FOX)  

SciTech Connect

IBM Researchs contribution to the Fault Oblivious Extreme-scale Execution Environment (FOX) revolved around three core research deliverables: ? collaboration with Boston University around the Kittyhawk cloud infrastructure which both enabled a development and deployment platform for the project team and provided a fault-injection testbed to evaluate prototypes ? operating systems research focused on exploring role-based operating system technologies through collaboration with Sandia National Labs on the NIX research operating system and collaboration with the broader IBM Research community around a hybrid operating system model which became known as FusedOS ? IBM Research also participated in an advisory capacity with the Boston University SESA project, the core of which was derived from the K42 operating system research project funded in part by DARPAs HPCS program. Both of these contributions were built on a foundation of previous operating systems research funding by the Department of Energys FastOS Program. Through the course of the X-stack funding we were able to develop prototypes, deploy them on production clusters at scale, and make them available to other researchers. As newer hardware, in the form of BlueGene/Q, came online, we were able to port the prototypes to the new hardware and release the source code for the resulting prototypes as open source to the community. In addition to the open source coded for the Kittyhawk and NIX prototypes, we were able to bring the BlueGene/Q Linux patches up to a more recent kernel and contribute them for inclusion by the broader Linux community. The lasting impact of the IBM Research work on FOX can be seen in its effect on the shift of IBMs approach to HPC operating systems from Linux and Compute Node Kernels to role-based approaches as prototyped by the NIX and FusedOS work. This impact can be seen beyond IBM in follow-on ideas being incorporated into the proposals for the Exasacale Operating Systems/Runtime program.

Van Hensbergen, Eric; Speight, William; Xenidis, Jimi

2013-03-15T23:59:59.000Z

366

Microsoft Word - Executive Summary.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar PEIS ES-1 December 2010 Solar PEIS ES-1 December 2010 EXECUTIVE SUMMARY 1 2 3 ES.1 BACKGROUND 4 5 The U.S. Department of the Interior (DOI) Bureau of Land Management (BLM) and the 6 U.S. Department of Energy (DOE) are each considering taking actions to facilitate solar energy 7 development in compliance with various orders, mandates, and agency policies. For the BLM, 8 these actions include the evaluation of a new BLM Solar Energy Program applicable to utility- 9 scale solar energy development on BLM-administered lands in six southwestern states (Arizona, 10 California, Colorado, Nevada, New Mexico, and Utah). 1 For DOE, they include the evaluation 11 of developing new program guidance relevant to DOE-supported solar projects. 12 13 The BLM and DOE are working jointly as lead agencies to prepare this programmatic 14

367

Federal Energy Management Program: Executive Order 13514  

NLE Websites -- All DOE Office Websites (Extended Search)

514 514 Executive Order (E.O.) 13514; Federal Leadership in Environmental, Energy, and Economic Performance; was signed on October 5, 2009. It expanded upon the energy reduction and environmental performance requirements of E.O. 13423. E.O. 13514 sets numerous Federal energy requirements in several areas, including: Accountability and Transparency Strategic Sustainability Performance Planning Greenhouse Gas Management Sustainable Buildings and Communities Water Efficiency Electronic Products and Services Fleet and Transportation Management Pollution Prevention and Waste Reduction The summary below is intended as a reference only. Refer to the full text of E.O. 13514 for more details relevant to your work. Accountability and Transparency E.O. 13514 accountability, transparency, and reporting requirements include:

368

Microsoft Word - Executive Summary.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Generation-IV Roadmap Generation-IV Roadmap Report of the Fuel Cycle Crosscut Group March 18, 2001 "This document has not been patent-cleared and has not received DOE approval for external release. Do not distribute beyond the Generation IV Roadmap Project Participants" FCCG Rpt Executive Sum FR03-00 18-Mar-2002 Page ii Generation-IV Roadmap Report of the Fuel Cycle Crosscut Group (FCCG) March 18, 2002 FCCG Membership Organization TWG Arden Bement Purdue Gas Cooled Doug Crawford ANL-W Evaluation Methodology Charles Forsberg* ORNL Non Classical Steve Herring INEEL Non Classical Bill Halsey LLNL Evaluation Methodology Dave Lewis ANL-E Non Classical Chuck Boardman GE Metal Cooled Per Peterson UC Berkeley Evaluation Methodology

369

Loss PreventionIBM Retail Store Solutions Executive Brief  

E-Print Network (OSTI)

Loss PreventionIBM Retail Store Solutions Executive Brief Getting smarter about retail loss prevention. Wayne Truhan, business development executive, IBM Retail Store Solutions #12;2 Getting smarter about retail loss prevention. "With the downturn in the economy, we have seen an increase in theft

370

Event-based distributed workflow execution with EVE  

Science Journals Connector (OSTI)

In event-driven workflow execution, events and event-condition-action rules are the fundamental metaphors for defining and enforcing workflow logic. Processing entities enact workflows by reacting to and generating new events. The foundation on events ... Keywords: distributed workflow execution, event-based systems, workflow management

Andreas Geppert; Dimitrios Tombros

2009-11-01T23:59:59.000Z

371

Developing and Executing Goal-Based, Adjustably Autonomous Procedures  

E-Print Network (OSTI)

Developing and Executing Goal-Based, Adjustably Autonomous Procedures David Kortenkamp, R. Peter@jsc.nasa.gov This paper describes an approach to representing, authoring and executing procedures during human spaceflight missions. The approach allows for the explicit incorporation of goals into procedures. The approach also

Kortenkamp, David

372

Execution-Less Performance Modeling Roman Iakymchuk and Paolo Bientinesi  

E-Print Network (OSTI)

Execution-Less Performance Modeling Roman Iakymchuk and Paolo Bientinesi AICES, RWTH Aachen occurring in higher- level algorithms--like a matrix factorization--is then pre- dicted by combining a priori; the prediction of performance therefore reduces to the pre- diction of Execution time. Our

373

Software Pipelined Execution of Stream Programs on GPUs  

E-Print Network (OSTI)

Software Pipelined Execution of Stream Programs on GPUs Abhishek Udupa, R. Govindarajan, Matthew J task, data and pipeline parallelism which can be exploited on modern Graphics Processing Units (GPUsIt to GPUs and propose an efficient technique to software pipeline the execution of stream programs on GPUs

Plotkin, Joshua B.

374

CRITIQUING TEAM PROCEDURE EXECUTION Stephanie Guerlain Peter Bullemer  

E-Print Network (OSTI)

3-515 CRITIQUING TEAM PROCEDURE EXECUTION Stephanie Guerlain Peter Bullemer University of Virginia a single person performing a static, non time-critical task. We have now' developed a critiquing system in the more dynamic world of process control. Specifically, we support the execution of complex procedures

Virginia, University of

375

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris  

E-Print Network (OSTI)

for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects computing architecture, Cerium, that uses a se- cure processor to protect a program's execution, so. Instead, Cerium tells a user what pro- gram executed and what hardware and software envir- onment

376

Project Execution Plan Electron Beam Ion Source Project  

E-Print Network (OSTI)

Project Execution Plan for the Electron Beam Ion Source Project (EBIS) Project # 07-SC-02 of Nuclear Physics (SC ­ 26) Rev. 1 May 2008 #12;#12;#12;4 Project Execution Plan for the Electron Beam Ion Source Project (EBIS) Change Log Revision No. Pages Affected Effective Date Revision 0 Baseline Document

377

Code of Ethics  

Science Journals Connector (OSTI)

Acode of ethics clarifies the ethical principles that are followed in aspecific field. In this context we refer to the , formally adopted by the American Public Health Association in 2002. It is the first b...

2008-01-01T23:59:59.000Z

378

ANNOUNCEMENT: ZIP Code Information.  

Science Journals Connector (OSTI)

THE U. S. Post Office Department has announced that the use of ZIP Codes will be mandatory on all domestic addresses for subscriptions and other mailings by 1 January 1967. Accordingly, the American Institute of Physics has established a procedure for obtaining the necessary information. You are requested to follow this procedure exactly.First, do not submit a change of address request consisting merely of the addition of your ZIP Code. Second, if your address changes in any other way, do include the ZIP Code of the new address. Third, and most important, be sure to furnish your ZIP Code in accordance with instructions included with all renewal invoices and renewal orders which have been sent out by the AIP.Failure to conform to this procedure may result in delays.

1965-09-27T23:59:59.000Z

379

Executive Orders Defining Tribal Relationships | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Orders Defining Tribal Relationships Executive Orders Defining Tribal Relationships Executive Orders Defining Tribal Relationships Executive Order 13592 Improving American Indian and Alaska Native Educational Opportunities and Strengthening Tribal Colleges and Universities (2011). Superseded EO 13021 to ensure that all American Indian students, regardless of which institution they attend, receive support from the federal government at elementary through college levels. This EO also creates an Interagency Working Group on AI/AN Education to establish educational goals across the government. Executive Order 13096 American Indian and Alaska Education (1998). Directs federal agencies to improve the academic performance of American Indian and Alaska Native students via six goals: (1) improving reading and mathematics (2) increasing high school completion

380

DOE Announces New Executive Director of Loan Guarantee Program | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Director of Loan Guarantee Program Executive Director of Loan Guarantee Program DOE Announces New Executive Director of Loan Guarantee Program November 10, 2009 - 12:00am Addthis Washington D.C. --- Underscoring his commitment to strengthen and streamline the Department of Energy's operations, Secretary Steven Chu today named Jonathan Silver Executive Director of the Department's loan program office. In this role, Silver will oversee the Department's Loan Guarantee Program as well as the Advanced Technology Vehicles Manufacturing (ATVM) loan program. Silver will report directly to Secretary Chu, helping accelerate the application review process for both programs. As Executive Director, Silver will be responsible for staffing the programs and leading origination, analysis, and negotiation, as well as managing the full range of the

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Executive Order 13212 - Actions To Expedite Energy-Related Projects:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order 13212 - Actions To Expedite Energy-Related Executive Order 13212 - Actions To Expedite Energy-Related Projects: Federal Register Notice Volume 66, No. 99 - May 18, 2001 Executive Order 13212 - Actions To Expedite Energy-Related Projects: Federal Register Notice Volume 66, No. 99 - May 18, 2001 The increased production and transmission of energy in a safe and environmentally sound manner is essential to the well-being of the American people. In general, it is the policy of this Administration that executive departments and agencies (agencies) shall take appropriate actions, to the extent consistent with applicable law, to expedite projects that will increase the production, transmission, or conservation of energy. Executive Order 13212: 66 FR 28357 (22 May 2001) More Documents & Publications

382

African American Federal Executive Association, Inc. 9th Annual Training  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

African American Federal Executive Association, Inc. 9th Annual African American Federal Executive Association, Inc. 9th Annual Training Workshop African American Federal Executive Association, Inc. 9th Annual Training Workshop September 16, 2013 9:00AM EDT to September 17, 2013 5:00PM EDT Washington, DC The African American Federal Executive Association, Inc. (AAFEA) will hold its 9th Annual Training Workshop (TW) September 16-17, 2013 in Washington, DC. The theme of this year's TW is "LEADING CHANGE." This training is focused on the programs, policies, practices, and processes that promote career-enhancing opportunities and the core subjects critical for becoming a member of the Senior Executive Service (SES). This TW qualifies as training in compliance with 5 U.S.C. chapter 41, and is open to GS-13/14/15 Federal employees and SES members. It will provide

383

Office of Executive Resources (HC-40) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Resources (HC-40) Executive Resources (HC-40) Office of Executive Resources (HC-40) Mission and Function Statement This organization provides a full range of human capital management workforce services and support as well as policy guidance functions to senior level positions (SES, SL, and ST), excepted service positions (EJ, EK, and ARPA-E ET/ER) and political appointments for the Department. This includes: Providing operational and advisory executive services to Headquarters and field components, including political appointees and the immediate Office of the Secretary. Providing operational support to the Department's Executive Resources and Performance Review Boards. Administering the SES and SL/ST performance management systems and recognition and awards programs. Managing the SES Candidate Development Program.

384

Quantum error control codes  

E-Print Network (OSTI)

QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major... Subject: Computer Science QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

Abdelhamid Awad Aly Ahmed, Sala

2008-10-10T23:59:59.000Z

385

Joint design of multi-resolution codes and intra / inter- layer network coding  

E-Print Network (OSTI)

In this thesis, we study the joint design of multi-resolution (MR) coding and network coding. The three step coding process consists of MR source coding, layer coding and multi-stream coding. The source coding considers ...

Wang, Tong, S.M. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

386

Maine | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Maine Maine Last updated on 2013-11-04 Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 Amendments / Additional State Code Information As of September 28, 2011, municipalities over 4,000 in population were required to enforce the new code if they had a building code in place by August 2008. Municipalities under 4,000 are not required to enforce it unless they wish to do so and have the following options: 1. Adopt and enforce the Maine Uniform Building and Energy Code 2. Adopt and enforce the Maine Uniform Building Code (the building code without energy) 3. Adopt and enforce the Maine Uniform Energy Code (energy code only) 4. Have no code Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Maine (BECP Report, Sept. 2009)

387

Nested Quantum Error Correction Codes  

E-Print Network (OSTI)

The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

Zhuo Wang; Kai Sun; Hen Fan; Vlatko Vedral

2009-09-28T23:59:59.000Z

388

20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview...  

Office of Environmental Management (EM)

1: Executive Summary and Overview Summary Slides 20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview Summary Slides Summary and overview slides for 20% Wind Energy...

389

EXECUTIVE OFFICE OF THE PRESIDENT O  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

M M A N A G E M E N T A N D B U D G E T W AS H I N G T O N , D . C . 2 0 5 0 3 O F F I C E O F F E D E R A L P R O C U R E M E N T P O L I C Y September 29, 2011 MEMORANDUM FOR CHIEF ACQUISTION OFFICERS SENIOR PROCUREMENT EXECUTIVES FROM: Daniel I. Gordon Administrator SUBJECT: Development, Review and Approval of Business Cases for Certain Interagency and Agency-Specific Acquisitions It is critical that the Federal Government, in its procurement activity, leverage its buying power to the maximum extent as well as achieve administrative efficiencies and cost savings. Too often, however, agencies establish new overlapping and duplicative contracts for supplies or services, because the agencies have not adequately considered the suitability of existing interagency contract vehicles: government-wide acquisition contracts (GWACs), multi-agency

390

Executive Order 13175: Consultation and Coordination with Indian Tribal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

175: Consultation and Coordination with Indian 175: Consultation and Coordination with Indian Tribal Governments (2000) Executive Order 13175: Consultation and Coordination with Indian Tribal Governments (2000) Executive Order 13175: Consultation and Coordination with Indian Tribal Governments (2000). Establishes standards for regular and meaningful consultation with Tribal officials to strengthen the government-to-government relationships with Indian tribes, including establishment of fundamental principles, policymaking criteria, special requirements of legislative proposals, consultation, accountability principles, and increasing flexibility for Indian Tribal Waivers. EO 13175 supersedes EO 13084. Executive Order 13175: Consultation and Coordination with Indian Tribal Governments (2000) More Documents & Publications

391

Executive Order 13423- Strengthening Federal Environmental, Energy, and  

NLE Websites -- All DOE Office Websites (Extended Search)

423- Strengthening Federal Environmental, 423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It is the policy of the United States that Federal agencies conduct their environmental, transportation, and energy-related activities under the law in support of their respective missions in an environmentally, economically and fiscally sound, integrated, continuously improving, efficient, and sustainable manner. Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management More Documents & Publications Executive Order 13514-Federal Leadership in Environmental, Energy, and Economic Performance EPAct 2005. Conference Report, July 27, 2005 In the Senate of the United States,June 28, 2005.

392

Alabama | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Adoption » Status of State Energy Code Adoption Adoption » Status of State Energy Code Adoption Site Map Printable Version Development Adoption Adoption Process State Technical Assistance Status of State Energy Code Adoption Compliance Regulations Resource Center Alabama Last updated on 2013-05-31 Current News The Alabama Energy and Residential Codes Board adopted the 2009 International Energy Conservation Code (IECC) for Commercial Buildings and the 2009 International Residential Code (IRC) for Residential Construction. The new codes will become effective on October 1, 2012. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information N/A Approved Compliance Tools State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in Alabama (BECP Report, Sept. 2009)

393

Washington | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Washington Washington Last updated on 2013-11-05 Current News The Washington State Building Code Council recently completed deliberations on adoption and amendment of the 2012 codes. This includes adoption of the 2012 IECC with state amendments. The new codes became effective July 1, 2013. Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information WA 2012 Nonresidential Codes Approved Compliance Tools Nonresidential Energy Code Compliance Tools Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2010 Effective Date 07/01/2013 Adoption Date 02/01/2013 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: Yes Washington DOE Determination Letter, May 31, 2013 Washington State Certification of Commercial and Residential Building Energy Codes

394

NAICS Codes Description:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Codes Codes Description: Filters: Date Signed only show values between '10/01/2006' and '09/30/2007', Contracting Agency ID show only ('8900'), Contracting Office ID show only ('00001') Contracting Agency ID: 8900, Contracting Office ID: 00001 NAICS Code NAICS Description Actions Action Obligation 541519 OTHER COMPUTER RELATED SERVICES 251 $164,546,671 541611 ADMINISTRATIVE MANAGEMENT AND GENERAL MANAGEMENT CONSULTING SERVICES 236 $52,396,806 514210 DATA PROCESSING SERVICES 195 $28,941,727 531210 OFFICES OF REAL ESTATE AGENTS AND BROKERS 190 $6,460,652 541330 ENGINEERING SERVICES 165 $33,006,079 163 $11,515,387 541690 OTHER SCIENTIFIC AND TECHNICAL CONSULTING SERVICES 92 $40,527,088 531390 OTHER ACTIVITIES RELATED TO REAL ESTATE 79 -$659,654 337214 OFFICE FURNITURE (EXCEPT WOOD) MANUFACTURING 78 $1,651,732

395

Building Energy Codes Fact Sheet  

Energy.gov (U.S. Department of Energy (DOE))

Building energy codes have been in place for over 20 years. Today's codes are providing energy savings of more than 30% compared to the codes of a decade ago. They're also saving consumers an estimated $5 billion annually as of 2012. Since 1992, building codes have saved about 300 million tons of carbon cumulatively. Read the fact sheet below to learn more about the Building Technologies Office's Building Energy Codes program.

396

Coding for Cooperative Communications  

E-Print Network (OSTI)

develop and design practical coding strategies which perform very close to the infor- mation theoretic limits. The cooperative communication channels we consider are: (a) The Gaussian re- lay channel, (b) the quasi-static fading relay channel, (c... modulation. The CF strategy is implemented with low-density parity-check (LDPC) and irregular repeat- accumulate codes and is found to operate within 0.34 dB of the theoretical limit. For the quasi-static fading relay channel, we assume that no channel...

Uppal, Momin Ayub

2011-10-21T23:59:59.000Z

397

Codes and Standards Tech Team (CSTT) Purpose & Operation  

NLE Websites -- All DOE Office Websites (Extended Search)

FreedomCAR and Fuel Partnership FreedomCAR and Fuel Partnership Codes and Standards Tech Team (CSTT) Overview & Introduction CSTT Purpose & Operation C&S Roadmap & Fuel Purity Brad Smith, Shell Hydrogen - CSTT co-lead April 26, 2004 Members FreedomCAR and Fuel Partnership ChevronTexaco EXONMobil ConocoPhillips w/ National Labs Organization Executive Steering Group OEM & Energy R&D VPs DOE-EE Asst Sec Fuel Cell & Vehicle Tech Teams OEM Tech Experts DOE Tech Experts Fuel Operations Group Energy Directors DOE Program Managers Fuel Tech Teams Energy Tech Experts DOE Tech Experts FreedomCAR Operations Group OEM Directors DOE Program Managers Hydrogen Storage Tech Team OEM & Energy & DOE Tech Experts Codes & Standards Tech Team OEM & Energy & DOE

398

National Electric Transmission Congestion Study 2006 Executive Summary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EXECUTIVE EXECUTIVE SUMMARY AUGUST 2006 U.S. Department of Energy NATIONAL ELECTRIC TRANSMISSION CONGESTION STUDY EXECUTIVE SUMMARY AUGUST 2006 U.S. Department of Energy Executive Summary Section 1221(a) of the Energy Policy Act of 2005 amended the Federal Power Act (FPA) by adding a new section 216 to that Act. FPA section 216(a) di- rected the Secretary of Energy to conduct a nation- wide study of electric transmission congestion 1 by August 8, 2006. Based upon the congestion study, comments thereon, and considerations that include economics, reliability, fuel diversity, national en- ergy policy, and national security, the Secretary may designate "any geographic area experiencing electric energy transmission capacity constraints or congestion that adversely affects customers as a na- tional interest electric transmission corridor." The national congestion study

399

Senior Executive Service Candidate Development Program | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Service Candidate Development Program Service Candidate Development Program Senior Executive Service Candidate Development Program The Office of Learning and Workforce Development coordinates applications for all DOE Federal Employees. Overview The Department of Energy's (DOE) Senior Executive Service (SES) Candidate Development Program (SESCDP) is a critical component of the Department's succession planning strategy for executives. We currently project approximately from 25 to 50 Senior Executive vacancies every year over the next several years. DOE's SESCDP is intended to produce a cadre of SES-ready federal employees capable of being placed non-competitively into SES vacancies. Although successful completion of the SESCDP does not guarantee placement into an SES position, it does result in

400

Department of Energy and Commercial Real Estate Executives Launch Alliance  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Commercial Real Estate Executives Launch and Commercial Real Estate Executives Launch Alliance to Reduce Energy Consumption of Buildings Department of Energy and Commercial Real Estate Executives Launch Alliance to Reduce Energy Consumption of Buildings April 9, 2009 - 12:00am Addthis WASHINGTON, D.C. - Top executives from 19 commercial real estate companies met with U.S. Department of Energy (DOE) officials in New York City today to discuss plans to dramatically reduce the sector's energy consumption and greenhouse gas emissions. The meeting officially launched DOE's Commercial Real Estate Energy Alliance (CREEA), a partnership of commercial real estate owners and operators who have volunteered to work together with DOE to make lasting change in the energy consumption of commercial real estate buildings in the United States. Currently, commercial buildings

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Implementation of Executive Order 12114 Environmental Effects Abroad of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Implementation of Executive Order 12114 Environmental Effects Implementation of Executive Order 12114 Environmental Effects Abroad of Major Federal Actions: Final Guideline Implementation of Executive Order 12114 Environmental Effects Abroad of Major Federal Actions: Final Guideline The Department of Energy hereby adopts final Departmental guidelines implementing Executive Order 12114-Environmental Effecrs Abroad of Major Federal Actions, whic was issued on January 4, 1979. G-DOE-effects_abroad.pdf More Documents & Publications Environmental Effects Abroad of Major Federal Actions EIS-0386: Notice of Intent to Prepare a Programmatic Environmental Impact Statement, Amend Relevant Agency Land Use Plans, and Conduct Public Scoping Meetings, and Notice of Floodplain and Wetlands Involvement EIS-0481: Notice of Intent to Prepare a Programmatic Environmental Impact

402

Executive Order 13212: 66 FR 28357 (22 May 2001)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Executive Order 13212: 66 FR 28357 (22 May 2001) Executive Order 13212: 66 FR 28357 (22 May 2001) Executive Order 13212--Actions To Expedite Energy-Related Projects May 18, 2001 By the authority vested in me as President by the Constitution and the laws of the United States of America, and in order to take additional steps to expedite the increased supply and availability of energy to our Nation, it is hereby ordered as follows: Section 1. Policy. The increased production and transmission of energy in a safe and environmentally sound manner is essential to the well-being of the American people. In general, it is the policy of this Administration that executive departments and agencies (agencies) shall take appropriate actions, to the extent consistent with applicable law, to expedite projects that will increase the

403

Implementation of Executive Order 12114 Environmental Effects Abroad of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Implementation of Executive Order 12114 Environmental Effects Implementation of Executive Order 12114 Environmental Effects Abroad of Major Federal Actions: Final Guideline Implementation of Executive Order 12114 Environmental Effects Abroad of Major Federal Actions: Final Guideline The Department of Energy hereby adopts final Departmental guidelines implementing Executive Order 12114-Environmental Effecrs Abroad of Major Federal Actions, whic was issued on January 4, 1979. G-DOE-effects_abroad.pdf More Documents & Publications Environmental Effects Abroad of Major Federal Actions EO 12114: Environmental Effects Abroad of Major Federal Actions EIS-0386: Notice of Intent to Prepare a Programmatic Environmental Impact Statement, Amend Relevant Agency Land Use Plans, and Conduct Public Scoping Meetings, and Notice of Floodplain and Wetlands Involvement

404

Fiscal Year 2008 Annual Federal Performance Report On Executive Agency  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fiscal Year 2008 Annual Federal Performance Report On Executive Fiscal Year 2008 Annual Federal Performance Report On Executive Agency Actions To Assist Historically Black Colleges And Universities Fiscal Year 2008 Annual Federal Performance Report On Executive Agency Actions To Assist Historically Black Colleges And Universities Packet of information to the Secretary of Education Fiscal Year 2008 Annual Federal Performance Report On Executive Agency Actions To Assist Historically Black Colleges And Universities More Documents & Publications Minority Serving Institutions (MSIs): Bridging the Gap between Federal Agencies and MSIs Office of Energy Efficiency and Renewable Energy (EERE) -Historically Black Colleges and Universities 12 Annual Small Business Conference & Expo Minority Serving Institutions (MSIs)-Bridging the Gap Between Federal Agencies and MSIs

405

Robust execution of bipedal walking tasks from biomechanical principles  

E-Print Network (OSTI)

Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

Hofmann, Andreas G. (Andreas Gunther)

2006-01-01T23:59:59.000Z

406

Executive Order 12088: Federal Compliance with Pollution Control Standards  

Energy.gov (U.S. Department of Energy (DOE))

The head of each Executive agency is responsible for ensuring that all necessary actions are taken for the prevention, control, and abatement of environmental pollution with respect to Federal...

407

Continuous execution : improving user feedback in the development cycle  

E-Print Network (OSTI)

Programming environments are increasing the amount of feedback given to users during the development cycle. This work continues with this trend by exploring continuous execution, a programming environment where the result ...

Su, Kevin

2007-01-01T23:59:59.000Z

408

Executive Function and Pediatric Overweight: A Problem-Solving Framework  

E-Print Network (OSTI)

together to solve a problem: recognizing the problem, planning a course of action, executing the action, and evaluating the success of the action. Participants (78 children and their caregivers) between the ages of four and seven had their heights...

Johnson, Audrea

2012-10-19T23:59:59.000Z

409

Fast detection of communication patterns in distributed executions  

Science Journals Connector (OSTI)

Understanding distributed applications is a tedious and difficult task. Visualizations based on process-time diagrams are often used to obtain a better understanding of the execution of the application. The visualization tool we use is Poet, an event ...

Thomas Kunz; Michiel F. H. Seuren

1997-11-01T23:59:59.000Z

410

The Western Wind and Solar Integration Study Phase 2: Executive...  

NLE Websites -- All DOE Office Websites (Extended Search)

STUDY PHASE 2: Executive Summary Debra Lew and Greg Brinkman National Renewable Energy Laboratory Prepared under Task Nos. OE10.3020, SS12.2720, SM12.2010, and WE11.0810...

411

New Executive Order Establishes a Federal Flood Risk Management Standard  

Energy.gov (U.S. Department of Energy (DOE))

President Obama signed Executive Order (E.O.) 13690, Establishing a Federal Flood Risk Management Standard and a Process for Further Soliciting and Considering Stakeholder Input, on January 30, 2015.

412

MARKETING PORTFOLIO SAMPLES OF CONTENT FOR EXECUTIVE SUMMARIES*  

E-Print Network (OSTI)

MARKETING PORTFOLIO SAMPLES OF CONTENT FOR EXECUTIVE SUMMARIES* Table of Contents Professional Marketing (Rainbow Realty) Page 6 Marketing Research (Kroger, Private Label) Page 8 Consumer Behavior (Slim Fast) Page 10 Marketing Information Technology (Sierra Nevada

de Lijser, Peter

413

Nuclear Energy In the United States Executive Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

0 Status and Outlook for Nuclear Energy In the United States Executive Summary The U.S. nuclear power industry continues to make pro- gress toward the construction of new nuclear...

414

Usage Codes Vessel name  

E-Print Network (OSTI)

Usage Codes 1 5 2 6 3 7 4 8 Vessel name Int'l radio call sign (IRCS) Generator Other: Max hoisting Sonar Power (Kw) KHz: KHz: VMS Usage Y / N GPS: Internal / external KHz: KHz: Ratio Accuracy (m Incinerator: Burned on board: Net sensors Hull mounted / towed Wired / wireless Y / N Y / N Usage Manufacturer

415

Usage Codes Additional Information  

E-Print Network (OSTI)

Usage Codes 1 5 2 6 3 7 4 8 Additional Information Winches (on deck) Electronics RPM: Max hoistingPresent? Usage Model Ratio Accuracy (m) Type: Electric / Hydraulic / Other _________________ KHz: GPS: Internal Other: Y / N Other: Y / N Y / NOther: Hydrophone Burned on board: Net sensors Usage Manufacturer High

416

The Woodland Carbon Code  

E-Print Network (OSTI)

The Woodland Carbon Code While society must continue to make every effort to reduce greenhouse gas a role by removing carbon dioxide from the atmosphere. The potential of woodlands to soak up carbon to help compensate for their carbon emissions. But before investing in such projects, people want to know

417

Nebraska | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Nebraska Nebraska Last updated on 2013-11-04 Current News Nebraska Legislature adopted the 2009 IECC/ASHRAE 90.1-2007. The code became effective August 27, 2011. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Cities and counties may adopt codes that differ from the Nebraska Energy Code; however, state law requires the adopted code to be equivalent to the Nebraska Energy Code. For existing buildings, only those renovations that will cost more than 50 percent of the replacement cost of the building must comply with the code. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Nebraska (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC

418

Summary | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Summary The impact of energy codes on our future is apparent. From environmental and resource conservation to national security, energy concerns, and our economic challenges, energy codes will continue to be a key component of a sound public policy. For further information on building energy code adoption, compliance, and enforcement, review the ACE toolkits Adoption Compliance Enforcement Popular Links ACE Learning Series ACE Overview Top 10 Reasons for Energy Codes Development of Energy Codes Adoption of Energy Codes Compliance with Energy Codes Enforcement of Energy Codes Going Beyond Code Summary Acronyms and Abbreviations Toolkit Definitions Adoption Toolkit Compliance Toolkit Enforcement Toolkit Contacts Web Site Policies U.S. Department of Energy USA.gov Last Updated: Thursday, January 31, 2013 - 15:19

419

Florida | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Florida Florida Last updated on 2013-11-18 Current News The triennial code change process is currently underway. Florida expects to be equivalent to ASHRAE 90.1-10 and IECC 2012 by early 2014. Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information N/A Approved Compliance Tools Can use State specific EnergyGauge Summit FlaCom State Specific Research Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 03/15/2012 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Florida DOE Determination Letter, May 31, 2013 Florida State Certification of Commercial Building Codes Current Code State Specific Amendments / Additional State Code Information Florida Building Code

420

Building Energy Codes 101: An Introduction | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes 101: An Introduction Codes 101: An Introduction In order to provide a basic introduction to the varied and complex issues associated with building energy codes, the U.S. Department of Energy's Building Energy Codes Program, with valued assistance from the International Codes Council and ASHRAE, has prepared Building Energy Codes 101: An Introduction. This guide is designed to speak to a broad audience with an interest in building energy efficiency, including state energy officials, architects, engineers, designers, and members of the public. Publication Date: Wednesday, February 17, 2010 BECP_Building Energy Codes 101_February2010_v00.pdf Document Details Last Name: Britt Initials: M Affiliation: PNNL Document Number: PNNL-70586 Focus: Adoption Code Development Compliance Building Type:

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Compliance with Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Compliance with Energy Codes Compliance with Energy Codes Energy code compliance must be achieved to realize the considerable benefits inherent in energy codes. BECP supports successful compliance by making no-cost compliance tools, REScheck(tm) and COMcheck(tm), and other resources widely available to everyone. BECP has also developed several resources to help states uniformly assess the rate of compliance with their energy codes for residential and commercial buildings. It is important to note that regardless of the level of enforcement, as a law the building owner/developer is ultimately responsible to comply with the energy code. Compliance will be increased if the adopting agency prepares the building construction community to comply with the energy code and provides resources to code officials to enforce it.

422

Job submission system and its execution monitoring for improving data processing in high energy physics experiments  

E-Print Network (OSTI)

Job submission system and its execution monitoring for improving data processing in high energy physics experiments

Jurkowski, Igor; Czekierda, ?ukasz

423

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 16, 2011 May 16, 2011 T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks The software does not properly filter HTML code from user-supplied input before displaying the input. May 13, 2011 T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user. May 10, 2011 T-620: Microsoft Security Bulletin Advance Notification for May 2011

424

Adaptive code generators for tree coding of speech  

E-Print Network (OSTI)

Tree coding is a promising way of obtaining good performance for medium-to-low rate speech coding. The key part of a tree coder is the code generator which consists of a short-term predictor and a long-term predictor. The best predictor designed...

Dong, Hui

1998-01-01T23:59:59.000Z

425

SIID Tangible CONTROLLED OBJECT CODES: CAPITALIZED OBJECT CODES  

E-Print Network (OSTI)

vehicle 1811 - Motor Vehicle Other 1812 - Aircraft 1813 - Motor Vehicle (Natural Gas conversion -Passengers Cars 1814 - Motor Vehicles - Natural Gas Conversion-other 1820 - Boats 1841- Software > 100kSIID Tangible CONTROLLED OBJECT CODES: CAPITALIZED OBJECT CODES: Capital Objects Codes That Do

Hofmann, Hans A.

426

Methane Hydrates Code Comparison  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Comparison Code Comparison Set-up for Problem 7 (Long-term simulations for Mt Elbert and PBU L- Pad "Like" Deposits) As discussed in the phone conference held on 11/9/2007, it is proposed that Problem 7 be made up of three separate cases: Problem 7a will look at a deposit similar to the Mt Elbert site. Problem 7b will be based on the PBU L-Pad site, and Problem 7c will be a down-dip version of the L-Pad site. In all three cases, a standard set of parameters will be used based on those found in Problem 6 (the history matches to the MDT data). The parameters chosen were consensus values based on the experiences of the various groups in attempting to match the MDT data for the C2 formation at Mount Elbert. Given below are the detailed descriptions of the three problems and the proposed

427

Minnesota | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Minnesota Minnesota Last updated on 2013-06-03 Current News The 2009 editions of the International Residential Code (IRC), International Building Code (IBC), and International Fire Code (IFC) will be published soon and the Construction Codes and Licensing Division and the State Fire Marshal Division have been discussing this adoption. Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2004 with Amendments Amendments / Additional State Code Information Commercial Energy Code Approved Compliance Tools Compliance forms can be downloaded from ASHRAE State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Minnesota (BECP Report, Sept. 2009) Approximate Energy Efficiency Less energy efficient than ASHRAE 90.1-2004 Effective Date 06/01/2009

428

News | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

News News A variety of resources and news from BECP, states, and other news sources are available for anyone interested in learning more about building energy codes. This includes newsletters, articles, links and more. To receive BECP News and other updates from the Building Energy Codes Program via email, join our mailing list. Featured Codes News DOE Activities and Methodology for Assessing Compliance With Building Energy Codes RFI Mayors Urge Cities to Strengthen Energy Code AZ Legislature Preserves Local Control of Building Energy Efficiency Codes Washington State Home Builders Lead the Nation in Energy Code Compliance Mississippi Invests in Future Growth With Adoption of Best-in-Class Energy Efficiency Legislation Energy 2030 Report Calls for Stricter Energy Building Codes

429

Michigan | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Michigan Michigan Last updated on 2013-06-03 Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 with Amendments Amendments / Additional State Code Information 2009 Commercial MI Uniform Energy Code Rules Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Michigan (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 03/09/2011 Adoption Date 11/08/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: No ASHRAE 90.1-2010: No Michigan DOE Determination Letter, May 31, 2013 Current Code 2009 IECC with Amendments Amendments / Additional State Code Information 2009 Residential MI Uniform Energy Code Rules Approved Compliance Tools Can use REScheck

430

Nevada Energy Code for Buildings  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

431

Network coding for anonymous broadcast  

E-Print Network (OSTI)

This thesis explores the use of network coding for anonymous broadcast. Network coding, the technique of transmitting or storing mixtures of messages rather than individual messages, can provide anonymity with its mixing ...

Sergeev, Ivan A

2013-01-01T23:59:59.000Z

432

Matlab-Kinect Interface Code  

E-Print Network (OSTI)

This .zip file contains code and installation instructions for acquiring 3d arm movements in Matlab using the Microsoft Kinect 3d camera. The provided code has been validated in 32-bit and 64-bit Matlab with 32-bit and ...

Kowalski, Kevin

2012-06-01T23:59:59.000Z

433

Code of Practice Research Degrees  

E-Print Network (OSTI)

........................................................................ 15 Section Ten: FacilitiesCode of Practice For Research Degrees 2014/15 #12;2 Contents Section One: Preface ­ the purpose of the Code........................................................ 3 Section Two: Context

Evans, Paul

434

Georgia | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Georgia Georgia Last updated on 2013-07-18 Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information GA Amendments Approved Compliance Tools Can use COMcheck Must choose ASHRAE 90.1-2007 as code option. State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Georgia (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 01/01/2011 Adoption Date 11/03/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Georgia State Certification of Commercial and Residential Building Codes Extension Request Current Code 2009 IECC with Amendments Amendments / Additional State Code Information GA Amendments Approved Compliance Tools Can use REScheck

435

Statement of the Exploratory Plasma Research (EPR) Executive Committee The members of the EPR (formerly ICC) Executive Committee urge the FESAC subcommittee on  

E-Print Network (OSTI)

Statement of the Exploratory Plasma Research (EPR) Executive Committee The members of the EPR (formerly ICC) Executive Committee urge the FESAC subcommittee on MFE Priorities to consider the following high-level recommendations: 1. The EPR

436

Robust LT codes with alternating feedback  

Science Journals Connector (OSTI)

In this paper, we propose robust LT codes with alternating feedback (LT-AF codes), which lightly utilize the feedback channel and surpass the performance of existing LT codes with feedback. In LT-AF codes, we consider a loss prone feedback channel for ... Keywords: Erasure channel, Feedback channel, Forward error correction codes, LT codes, Rateless codes

Ali Talari, Nazanin Rahnavard

2014-08-01T23:59:59.000Z

437

What's coming in 2012 codes  

E-Print Network (OSTI)

Administration Why Building Energy Codes Matter Why Building Energy Codes Matter ? Buildings account for 70% of electricity use ? Buildings account for 38% of CO2 emissions (Source: US Green Building Council) Residential Progress Commercial Progress... ? Southeast Energy Efficiency Alliance ? Southwest Energy Efficiency Project Why Building Energy Codes Matter Why Building Energy Codes Matter ? Share of Energy Consumed by Major Sectors of the Economy (2010) Source: U.S. Energy Information...

Lacey, E

2011-01-01T23:59:59.000Z

438

2009 Solar Decathlon Building Code  

NLE Websites -- All DOE Office Websites (Extended Search)

BUILDING CODE Last Updated: September 29, 2008 2009 Solar Decathlon Building Code i September 29, 2008 Contents Section 1. Introduction ............................................................................................................................................................. 1 Section 2. Adopted Codes ........................................................................................................................................................ 1 Section 3. Building Planning and Construction .............................................................................................................. 1 3-1. Fire Protection and Prevention ................................................................................................................................. 1

439

Rotationally invariant multilevel block codes  

E-Print Network (OSTI)

The objective of this thesis is to evaluate the performance of block codes that are designed to be rotationally invariant, in a multilevel coding scheme, over a channel modelled to be white gaussian noise. Also, the use of non-binary codes...

Kulandaivelu, Anita

2012-06-07T23:59:59.000Z

440

MATH 406/806 Introduction to Coding Theory  

E-Print Network (OSTI)

, convolutional codes, turbo codes, expander codes, low-density parity-check (LDPC) codes. References: R.M. Roth

Offin, Dan

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Southeast Energy Efficiency Alliance's Building Energy Codes...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Southeast Energy Efficiency Alliance's Building Energy Codes Project Southeast Energy Efficiency Alliance's Building Energy Codes Project Building Codes Project for the 2013...

442

Cal. Wat. Code 13376 | Open Energy Information  

Open Energy Info (EERE)

Wat. Code 13376Legal Abstract Cal. Wat. Code 13376, current through August 14, 2014. Published NA Year Signed or Took Effect 2014 Legal Citation Cal. Wat. Code 13376...

443

AutoAuto--tuned nested parallelism: a way totuned nested parallelism: a way to reduce the execution time of scientificreduce the execution time of scientific  

E-Print Network (OSTI)

AutoAuto--tuned nested parallelism: a way totuned nested parallelism: a way to reduce the execution problems AutoAuto--tuned nested parallelism: a way to reduce the execution time of scientific software in NUMA systemstuned nested parallelism: a way to reduce the execution time of scientific software in NUMA

Giménez, Domingo

444

Development | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Printable Version Printable Version Development Commercial Residential Adoption Compliance Regulations Resource Center Development The U.S. Department of Energy (DOE) supports and participates in the model building energy code development processes administered by the ASHRAE and the International Code Council (ICC). DOE activities include developing and submitting code change proposals, conducting analysis of building energy efficiency and cost savings, and formulating underlying evaluation methodologies. Through participation in model energy code development for both commercial and residential buildings, DOE strives to make cost-effective, energy efficient upgrades to current model codes. DOE also establishes energy efficiency standards for federal buildings and manufactured housing. Further information on this process is defined under

445

Energy Codes at a Glance  

SciTech Connect

Feeling dim from energy code confusion? Read on to give your inspections a charge. The U.S. Department of Energys Building Energy Codes Program addresses hundreds of inquiries from the energy codes community every year. This article offers clarification for topics of confusion submitted to BECP Technical Support of interest to electrical inspectors, focusing on the residential and commercial energy code requirements based on the most recently published 2006 International Energy Conservation Code and ANSI/ASHRAE/IESNA1 Standard 90.1-2004.

Cole, Pamala C.; Richman, Eric E.

2008-09-01T23:59:59.000Z

446

Wyner-Ziv coding based on TCQ and LDPC codes and extensions to multiterminal source coding  

E-Print Network (OSTI)

to approach the Wyner-Ziv distortion limit D??W Z(R), the trellis coded quantization (TCQ) technique is employed to quantize the source X, and irregular LDPC code is used to implement Slepian-Wolf coding of the quantized source input Q(X) given the side...

Yang, Yang

2005-11-01T23:59:59.000Z

447

Pennsylvania | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Pennsylvania Pennsylvania Last updated on 2013-11-05 Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Pennsylvania's current code is the 2009 IECC with reference to ASHRAE 90.1-2007. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Pennsylvania (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 12/31/2009 Adoption Date 12/10/2009 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Pennsylvania DOE Determination Letter, May 31, 2013 Pennsylvania State Certification of Commercial and Residential Building Energy Codes Current Code 2009 IECC Amendments / Additional State Code Information Pennsylvania's current residential code is the 2009 IECC, 2009 IRC, Chapter 11, and/or PA-Alt. Adherence to Pennsylvania's Alternative Residential Energy Provisions 2009 is an acceptable means of demonstrating compliance with the energy conservation code requirements of the Uniform Construction Code.

448

Ohio | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Ohio Ohio Last updated on 2013-10-21 Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Ohio's commercial code is the 2009 IECC with a direct reference to ASHRAE 90.1-07. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Ohio (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 11/01/2011 Adoption Date 03/07/2011 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Ohio DOE Determination Letter, May 31, 2013 Ohio State Certification of Commercila and Residential Building Energy Codes Current Code 2009 IECC with Amendments Amendments / Additional State Code Information Effective January 1, 2013 the residential code in Ohio is based on Chapter 11 of the 2009 IRC. It includes the 2009 IECC and state-specific alternative compliance paths. The 2013 Residential Code of Ohio (RCO) contains amendments to allow compliance to be demonstrated in three ways: (1) 2009 IECC; or (2) RCO Sections 1101 through 1104; or RCO Section 1105 ("The Ohio Homebuilder's Association Alternative Energy Code Option").

449

Kentucky | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Kentucky Kentucky Last updated on 2013-08-02 Current News Kentucky moves forward with the 2009 IECC by reference in their updated 2007 Kentucky Building Code. 2009 IECC is effective 3/6/2011 with mandatory compliance beginning 6/1/2011. Kentucky residential code was also updated to the 2009 IECC. The code is effective 7/1/2012 with an enforcement date of 10/1/2012. Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information Amendments are contained in the latest update to the 2007 Kentucky Building Code. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Kentucky (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC

450

Wyoming | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Wyoming Wyoming Last updated on 2013-06-03 Commercial Residential Code Change Current Code None Statewide Amendments / Additional State Code Information The International Conference of Building Officials (ICBO) Uniform Building Code, which is based on the 1989 Model Energy Code (MEC), may be adopted and enforced by local jurisdictions. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE Standard 90.1-2007 for Commercial Buildings in the State of Wyoming (BECP Report, Sept. 2009) Approximate Energy Efficiency Less energy efficient than 2003 IECC Effective Date 08/13/2008 Code Enforcement Voluntary DOE Determination ASHRAE Standard 90.1-2007: No ASHRAE Standard 90.1-2010: No Wyoming DOE Determination Letter, May 31, 2013 Current Code None Statewide

451

President Bush Issues Executive Order Designating ITER International Fusion  

NLE Websites -- All DOE Office Websites (Extended Search)

President President Bush Issues Executive Order Designating ITER International Fusion Energy Organization A Public Interest Organization News Featured Articles Science Headlines 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 Presentations & Testimony News Archives Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 11.19.07 President Bush Issues Executive Order Designating ITER International Fusion Energy Organization A Public Interest Organization Print Text Size: A A A Subscribe FeedbackShare Page November 19, 2007 The White House today announced that President Bush has issued an Executive Order designating the ITER International Fusion Energy Organization as a public international organization. For the purposes of the International

452

American Indian Policy and Relevant DOE and Executive Orders | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tribal Programs » Tribal Programs » American Indian Policy and Relevant DOE and Executive Orders American Indian Policy and Relevant DOE and Executive Orders Over the course of American history, the Federal government's relationship with Indian Tribes has been defined and modified by treaties, executive orders, court decisions, specific legislation passed by Congress, and regulations. Important rights were guaranteed to Tribes by treaty, with many of these rights still enforceable today. Case law, over the years, has dealt with the status of Indian Tribes and their special relationship to the Federal government. Legislation, passed by Congress reflects the national Indian policy at the time of enactment. Current Federal Indian policy recognizes that Indian Tribes are an integral

453

Executive Order 13175-Consultation and Coordination With Indian Tribal  

NLE Websites -- All DOE Office Websites (Extended Search)

75-Consultation and Coordination With Indian 75-Consultation and Coordination With Indian Tribal Governments Executive Order 13175-Consultation and Coordination With Indian Tribal Governments By the authority vested in me as President by the Constitution and the laws of the United States of America, and in order to establish regular and meaningful consultation and collaboration with tribal officials in the development of Federal policies that have tribal implications, to strengthen the United States government-to-government relationships with Indian tribes, and to reduce the imposition of unfunded mandates upon Indian tribes; it is hereby ordered as follows: Executive Order 13175-Consultation and Coordination With Indian Tribal Governments More Documents & Publications Executive Order 13175: Consultation and Coordination with Indian Tribal

454

Department of Energy Acquisition System - A Guide for Executives |  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy Acquisition System - A Guide for Executives Department of Energy Acquisition System - A Guide for Executives Department of Energy Acquisition System - A Guide for Executives The principal purposes of the Department's acquisition system are to: Deliver on a timely basis the best value product or service to the customer by, for example, Maximizing the use of commercial products and services. Using contractors who have a track record of successful past performance or who demonstrate a current superior ability to perform. Promoting competition. Maintain the public's trust by conducting business with integrity, fairness, openness, and compliance with statutory and regulatory requirements. Minimize administrative operating costs Fulfill public policy objectsives, such as Providing opportunities for small and small disadvantaged business.

455

Canadian Council of Chief Executives | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Canadian Council of Chief Executives Canadian Council of Chief Executives Canadian Council of Chief Executives September 12, 2005 - 10:18am Addthis Remarks Prepared for Energy Secretary Samuel Bodman I am pleased to participate in today's forum with such an impressive group of representatives from the Canadian business sector. My earlier career in business, and my service in two other Cabinet Agencies, have given me a special appreciation for the unique, historic relationship that has always existed between our two nations, which is the subject I wish to speak about today. Canada and the U.S. are neighbors, of course. But our relationship, our partnership, goes much deeper than that. As President Bush said during his trip to Canada in December, the U.S. and Canada have "always agreed on the great principles of liberty derived from

456

VOLTTRON: An Agent Execution Platform for the Electric Power System  

SciTech Connect

Volttron is an agent execution platform that is engineered for use in the electric power system. Volttron provides resource guarantees for agents and the platform including memory and processor utilization; authentication and authorization services; directory services for agent and resource location; and agent mobility. Unlike most other agent platforms, Volttron does not depend on a single agent authoring language. Instead, we chose to design and implement Volttron as a platform service and framework that is decoupled from the agent execution environment. A prototype implementation of Volttron has been written in Python (using Python v2.7.2) and we have executed agents written in Python and Java and as shell scripts. The intended use of Volttron is in the power distribution system for managing distributed generation, demand-response, and plug-in electric vehicles.

Akyol, Bora A.; Haack, Jereme N.; Ciraci, Selim; Carpenter, Brandon J.; Vlachopoulou, Maria; Tews, Cody W.

2012-06-05T23:59:59.000Z

457

Energy End-Use Intensities in Commercial Buildings 1989 -- Executive  

U.S. Energy Information Administration (EIA) Indexed Site

9 Energy End-Use Intensities > Executive Summary 9 Energy End-Use Intensities > Executive Summary Executive Summary Energy End Uses Ranked by Energy Consumption, 1989 Energy End Uses Ranked by Energy Consumption, 1989 Source: Energy Information Administration, Office of Energy Markets and End Use, Forms EIA-871A through F of the 1989 Commercial Buildings Energy Consumption Survey. divider line The demand for energy in U.S. stores, offices, schools, hospitals, and other commercial buildings has been increasing. This report examines energy intensities in commercial buildings for nine end uses: space heating, cooling, ventilation, lighting, water heating, cooking, refrigeration, office equipment, and "other." The objective of this analysis was to increase understanding of how energy is used in commercial buildings and to identify targets for greater energy efficiency which could moderate future growth in demand.

458

Begin execution of implementation plans | Open Energy Information  

Open Energy Info (EERE)

Begin execution of implementation plans Begin execution of implementation plans Jump to: navigation, search Stage 5 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

459

Lucas Group Executive Search, Renewable Energy | Open Energy Information  

Open Energy Info (EERE)

Executive Search, Renewable Energy Executive Search, Renewable Energy Jump to: navigation, search Name Lucas Group Executive Search, Renewable Energy Address 230 West Monroe Place Chicago, Illinois Zip 60606 Sector Renewable energy, Solar, Wind energy Phone number 312 780 0601 Coordinates 41.880697°, -87.634909° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.880697,"lon":-87.634909,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

460

Executive Order 13592: Improving American Indian and Alaska Native  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

592: Improving American Indian and Alaska Native 592: Improving American Indian and Alaska Native Educational Opportunities and Strengthening Tribal Colleges and Universities (2011) Executive Order 13592: Improving American Indian and Alaska Native Educational Opportunities and Strengthening Tribal Colleges and Universities (2011) Superseded EO 13021 to ensure that all American Indian students, regardless of which institution they attend, receive support from the federal government at elementary through college levels. This EO also creates an Interagency Working Group on AI/AN Education to establish educational goals across the government. Executive Order 13592: Improving American Indian and Alaska Native Educational Opportunities and Strengthening Tribal Colleges and Universities (2011) More Documents & Publications

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Executive Order 13270: Tribal Colleges and Universities (2002) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

270: Tribal Colleges and Universities (2002) 270: Tribal Colleges and Universities (2002) Executive Order 13270: Tribal Colleges and Universities (2002) Executive Order 13270: Tribal Colleges and Universities (2002). Ensures that Tribal colleges and universities receive support from the Federal government to assist these schools in providing high-quality educational opportunities for their students. This EO establishes the President's Board on Tribal Colleges and Universities (PBTCU), which includes representatives of tribal colleges. The PBTCU is assisted with its recommendations through consultation with the White House Initiative on Tribal Colleges and Universities, which is composed of an appointed official from each department and agency, as determined by the Secretary of the Department of Education.

462

Executive Order 13270: Tribal Colleges and Universities (2002) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

270: Tribal Colleges and Universities (2002) 270: Tribal Colleges and Universities (2002) Executive Order 13270: Tribal Colleges and Universities (2002) Executive Order 13270: Tribal Colleges and Universities (2002). Ensures that Tribal colleges and universities receive support from the Federal government to assist these schools in providing high-quality educational opportunities for their students. This EO establishes the President's Board on Tribal Colleges and Universities (PBTCU), which includes representatives of tribal colleges. The PBTCU is assisted with its recommendations through consultation with the White House Initiative on Tribal Colleges and Universities, which is composed of an appointed official from each department and agency, as determined by the Secretary of the Department of Education.

463

Building Energy Codes News | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Codes News Building Energy Codes News News Category: National Policy DOE Activities and Methodology for Assessing Compliance With Building Energy Codes RFI Posted: Tuesday, August 6, 2013 On August 6, DOE published an RFI on its methodology for assessing code compliance into the Federal Register. Based on feedback received from the individual state compliance pilot studies in 2011-2012, the RFI seeks input on DOE's methodology and fundamental assumptions from the general public. Read the full article... Source: U.S. Department of Energy Building Energy Codes Program Energy 2030 Report Calls for Stricter Energy Building Codes Posted: Tuesday, February 12, 2013 The Alliance Commission on National Energy Efficiency Policy aims to double US energy productivity by 2030, and one of its many ways to achieve that

464

Top 10 Reasons for Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Top 10 Reasons for Energy Codes Top 10 Reasons for Energy Codes The projected energy savings attributable to energy codes translates into an estimated cumulative savings of 800 million metric tons of carbon dioxide by 2030-that's equivalent to removing 145 million vehicles from our nation's roadways. Here are the top 10 reasons for adopting and implementing energy codes. Today's global energy, economic, and environmental challenges necessitate a U.S. strategy identifying a suite of energy-efficiency-related initiatives that is implemented by the building industry and relevant stakeholders. Energy codes are a core component of that strategy and, in addition, have an impact on other strategies to improve our built environment. Energy Codes... SAVE money and help reduce needless consumption of energy to heat,

465

Arkansas | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Arkansas Arkansas Last updated on 2013-12-10 Current News ASHRAE 90.1-2007 became the effective commercial code in Arkansas on January 1, 2013. Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 with Amendments Amendments / Additional State Code Information Arkansas Supplements and Amendments Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Arkansas Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 01/01/2013 Adoption Date 01/13/2012 Code Enforcement Mandatory DOE Determination ASHRAE Standard 90.1-2007: Yes ASHRAE Standard 90.1-2010: No Energy cost savings for Arkansas resulting from the state updating its commercial and residential building energy codes in accordance with federal law are significant, estimated to be on the order of nearly $100 million annually by 2030.

466

Delaware | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Map Printable Version Development Adoption Adoption Process State Technical Assistance Status of State Energy Code Adoption Compliance Regulations Resource Center Delaware Last updated on 2013-08-02 Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information Agriculture structures are excluded. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Delaware (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 07/01/2010 Adoption Date 07/29/2009 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Delaware DOE Determination Letter, May 31, 2013 Delaware State Certification of Commercial and Residential Building Energy Codes

467

Chapter 28 - Perceptual Audio Coding  

Science Journals Connector (OSTI)

Abstract Audio Coding has proliferated as a mainstream enabling digital technology for all types of applications that provide audio and multimedia to consumers using transmission or storage channels with limited capacity. Since its infancies in the eighties and early nineties, the technology behind low bitrate audio coding has developed rapidly until today. Nonetheless, the technology generations seen to date follow several common themes, including the use of time/frequency-domain processing, redundancy reduction (entropy coding), and irrelevancy removal through the pronounced exploitation of perceptual effects. The latter aspect is of paramount importance to the understanding and the performance of the coding systems and has gained more and more in importance over time. Starting from basic principles, this article provides an overview of methods for low bitrate perceptual audio coding and its evolution over time along with some related coding standards (e.g., mp3) and typical applications.

Jrgen Herre; Sascha Disch

2014-01-01T23:59:59.000Z

468

Robust Execution of Temporally Flexible Plans for Bipedal Walking Devices  

E-Print Network (OSTI)

walking machine. An example task for such a system is to walk to a soccer ball and kick it, as shown 02139 hofma@csail.mit.edu, williams@mit.edu Abstract Robotic wheeled rovers have been successfully controlled by activity execution systems that use plans with temporal flexibility to adapt to disturbances

Williams, Brian C.

469

Guidance for Meeting Executive Order 13514 Water Goals  

Energy.gov (U.S. Department of Energy (DOE))

The Federal Energy Management Program offers guidance to help agencies meet Executive Order (E.O.) 13514 water goals by summarizing key points in the Council on Environmental Qualitys (CEQ) guidance document, Implementing Instructions: Federal Agency Implementation of Water Efficiency and Management Provisions of E.O. 13514.

470

MAPS Executive Board Meeting Tuesday March 5 2013  

E-Print Network (OSTI)

MAPS Executive Board Meeting Tuesday March 5 2013 MAPS Boardroom, MUSC rm 234. Call to order @5, unanimous 2. Action Items from minutes - MAPS Legal Issues - Andrew reported to the board - Last bill 11.5 k ­ Website ­ how to upload changes - MAPS email signatures - Vehicle - in parking lot ­ must do something

Hitchcock, Adam P.

471

Customized Kernel Execution on Reconfigurable Hardware for Embedded Applications  

E-Print Network (OSTI)

1 Customized Kernel Execution on Reconfigurable Hardware for Embedded Applications Muhammad Z and power as well as to harness high performance in embedded systems, high utilization of the hardware in all aspects of everyday life. They normally consume small power and occupy few resources. Numerous

Ziavras, Sotirios G.

472

Executive Summary of Initiative Launching a Re-envisioning Initiative  

E-Print Network (OSTI)

, group work space, and virtual services. It is no longer possible for the Library to support the existing1 Executive Summary of Initiative Launching a Re-envisioning Initiative The UC Berkeley Library has embarked upon a process to re-envision library services that will result in a new service model

California at Berkeley, University of

473

Federated Clusters Using the Transparent Remote Execution (TREx) Environment  

E-Print Network (OSTI)

Federated Clusters Using the Transparent Remote Execution (TREx) Environment Richert Wang1 University of California, Irvine 442 Computer Science Building Irvine, CA 92697-3435 rkwang@ics.uci.edu Enrique Cauich University of California, Irvine 442 Computer Science Building Irvine, CA 92697

Scherson, Isaac D.

474

Synergistic Execution of Stream Programs on Multicores with Accelerators  

E-Print Network (OSTI)

Synergistic Execution of Stream Programs on Multicores with Accelerators Abhishek Udupa R be exploited on accelerators such as Graphics Processing Units (GPUs) or CellBE which support abundantIt program on a multicore platform equipped with an accelerator. The proposed approach identifies, using

Plotkin, Joshua B.

475

Supporting efficient execution of MPI applications across multiple sites  

Science Journals Connector (OSTI)

One of the main goals of the CrossGrid Project [1] is to provide explicit support to parallel and interactive compute- and data- intensive applications. The CrossBroker job manager provides services as part of the CrossGrid middleware and allows execution ...

Enol Fernndez; Elisa Heymann; Miquel ngel Senar

2006-08-01T23:59:59.000Z

476

Executive Summary Critique Air Products and Chemicals, Inc.  

E-Print Network (OSTI)

ME440W Executive Summary Critique Air Products and Chemicals, Inc. Low Fin Tube Heat Exchanger as compared to the bare tubes. However, contrary to Air Products' argument that the heat exchangers were to reduce turbulence of the air before it reaches the fan. The inline fan pulls the air through the test

Demirel, Melik C.

477

EXECUTIVE SUMMARY TERTIARY COAL RESOURCES IN THE NORTHERN  

E-Print Network (OSTI)

EXECUTIVE SUMMARY TERTIARY COAL RESOURCES IN THE NORTHERN ROCKY MOUNTAINS AND GREAT PLAINS REGION RockyMountains and Great Plains region, U.S. Geological Survey Professional Paper 1625-A Click here in the Northern Rocky Mountains and Great Plains region, U.S. Geological Survey Professional Paper 1625-A #12;ES

478

Project Management and Analysis Project Conception and Execution  

E-Print Network (OSTI)

TD 608 Project Management and Analysis Part I Project Conception and Execution Milind Sohoni of the paper? How does the author compare India and Pakistan? Do you agree with the cost-benefit analysis? What are your criticisms? Compare the CBA with our 6-goat system. Comment on the viability of the project

Sohoni, Milind

479

Project Management and Analysis Project Conception and Execution  

E-Print Network (OSTI)

by the World Bank at a cost of $ 600,000. The objectives of the project are: Analyze the supply and demandTD 608 Project Management and Analysis Part I Project Conception and Execution Milind Sohoni Discussion () January 29, 2008 1 / 3 #12;The K-East Ward Water Project Proceed to the web location: www

Sohoni, Milind

480

Reducing Execution Overhead in a Data Stream Manager , Uur etintemel  

E-Print Network (OSTI)

is designed to take advantage of our overhead reducing techniques. We also discuss the specific overheads1 Reducing Execution Overhead in a Data Stream Manager Don Carney , Uur ?etintemel , Alex Rasin applications include sensor networks, position tracking, fabrication line management, network management

Cherniack, Mitch

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Type-dependence Analysis and Program Transformation for Symbolic Execution  

E-Print Network (OSTI)

decision procedure is incapable of (or inefficient in) handling the types of constraints produced during Orso, and Mary Jean Harrold College of Computing, Georgia Institute of Technology {saswat,orso,harrold}@cc.gatech.edu Abstract. Symbolic execution can be problematic when applied to real applications. This paper addresses two

Pratt, Vaughan

482

FWP executive summaries: Basic energy sciences materials sciences programs  

SciTech Connect

This report provides an Executive Summary of the various elements of the Materials Sciences Program which is funded by the Division of Materials Sciences, Office of Basic Energy Sciences, U.S. Department of Energy at Sandia National Laboratories, New Mexico.

Samara, G.A.

1996-02-01T23:59:59.000Z

483

Executive Summary Joint Proposal of the Northwest Utilities  

E-Print Network (OSTI)

1 Executive Summary Joint Proposal of the Northwest Utilities The Future Role of BPA Regarding transfer from BPA to the region's utilities much of the responsibility for securing additional electricity a slice contract, a utility receives power equal to a fixed percentage of the electricity produced

484

ENVIRONMENTAL LEADER: THE EXECUTIVE'S DAILY GREEN BRIEFING APRIL 25, 2008  

E-Print Network (OSTI)

ENVIRONMENTAL LEADER: THE EXECUTIVE'S DAILY GREEN BRIEFING APRIL 25, 2008 Green Business Experts at MMA Renewable Ventures, a renewable energy firm in San Francisco and formerly the Business Solutions Fellow for the Pew Center on Global Climate Change. http://www.environmentalleader.com/2008/04/25/green-business

Hoffman, Andrew J.

485

Executive Summaries Hydrogen Storage Materials Centers of Excellence  

E-Print Network (OSTI)

Executive Summaries for the Hydrogen Storage Materials Centers of Excellence Chemical Hydrogen Storage CoE, Hydrogen Sorption CoE, and Metal Hydride CoE Period of Performance: 2005 of Energy April 2012 #12;2 #12;3 Primary Authors: Chemical Hydrogen Storage (CHSCoE): Kevin Ott, Los

486

OMG! Page 1 BUSINESS WEEK: EXECUTIVE HEALTH November 09, 2010  

E-Print Network (OSTI)

' risk for dangerous health behaviors, including smoking, drinking and sexual activity, a new study can have dangerous health effects on teenagers," lead researcher Dr. Scott Frank, directorOMG! Page 1 BUSINESS WEEK: EXECUTIVE HEALTH November 09, 2010 OMG! Excessive Texting Tied to Risky

Preston, Scott

487

Supporting Higher Education in the Developing World Executive Director Report  

E-Print Network (OSTI)

Supporting Higher Education in the Developing World Executive Director Report Steven Davis science at the Department of Computer Science and Information Technology at the University of Cape Coast programme in computer science and information technology. d) Lisa Fisher is now on assignment at UIN Suka

deYoung, Brad

488

Supporting Risk-Informed Decisions during Business Process Execution  

E-Print Network (OSTI)

be acceptable. Moreover, we have shown that it is not always possible to mitigate all process risks. For exampleSupporting Risk-Informed Decisions during Business Process Execution Raffaele Conforti1 participants in making risk-informed decisions, with the aim to reduce the process risks. Risk reduction

van der Aalst, Wil

489

Nancy Rader, Executive Director California Wind Energy Association  

E-Print Network (OSTI)

Nancy Rader, Executive Director California Wind Energy Association Improving Methods for Estimating Fatality of Birds and Bats at Wind Energy Facilities California Wind Energy Association Public Webinar Wind Energy Development 2008 CEC Research "Roadmap" on Impact Assessment Methods 2008 CEC PIER RFP 2009

490

Office of Nuclear Energy, Science and Technology Executive Summary  

E-Print Network (OSTI)

Office of Nuclear Energy, Science and Technology Executive Summary Mission As we become more in this new century, the benefits of nuclear fission as a key energy source for both the near- and long method of generating energy from nuclear fission in both the United States and the world. A key mission

491

Furlough or Reduction in Force in the Senior Executive Service  

Directives, Delegations, and Requirements

To establish requirements and assign responsibilities for furlough and reduction in force (RIF) of the Senior Executive Service (SES) in the Department of Energy (DOE) and the National Nuclear Security Administration (NNSA). Cancels O DOE 3350.1 Chg 1 and DOE 3351.2 Chg 1.

2003-05-15T23:59:59.000Z

492

Securing Trusted Execution Environments with PUF Generated Secret Keys  

E-Print Network (OSTI)

of New Mexico Department of Electrical and Computer Engineering Albuquerque, New Mexico, USA mareno@ece.unm.edu Jim Plusquellic University of New Mexico Department of Electrical and Computer Engineering Albuquerque, New Mexico, USA jimp@ece.unm.edu Abstract--Trusted Execution Environments are quickly becom- ing

Plusquellic, James

493

Detailed Execution Planning for Large Oil and Gas Construction Projects  

E-Print Network (OSTI)

Detailed Execution Planning for Large Oil and Gas Construction Projects Presented by James Lozon, University of Calgary There is currently 55.8 billion dollars worth of large oil and gas construction projects scheduled or underway in the province of Alberta. Recently, large capital oil and gas projects

Calgary, University of

494

SEAMOPT - Stirling engine optimization code  

SciTech Connect

Experience is described with use of a fast-running Stirling engine optimization code developed at Argonne intended for public release. Stirling engine modeling is provided by the SEAM1 thermodynamic code. An interface was written to combine SEAM1 with a general optimization code and assess maximum component stress levels. Thus full engine thermodynamic and structural simulation is done during the optimization process. Several examples of the use of this code to optimize the GPU-3 engine are described. In one case efficiency was improved by over 25%.

Heames, T.J.; Daley, J.G.

1984-01-01T23:59:59.000Z

495

BPA Hotline & Codes of Conduct  

NLE Websites -- All DOE Office Websites (Extended Search)

Hotline & Codes of Conduct Pages default Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects &...

496

FOUNDATION REVENUE OBJECT CODES LSU Foundation Revenue Object Codes  

E-Print Network (OSTI)

FOUNDATION REVENUE OBJECT CODES 4 page 1 LSU Foundation Revenue Object Codes 0F00 Foundation - Balance Forward 0F01 Foundation - Other Contributions 0F02 Foundation - State of Louisiana 0F03 Foundation - Corporate Contributions 0F04 Foundation - Corporate Match Contributions 0F05 Foundation - Individual

Harms, Kyle E.

497

Guidance on Life-Cycle Cost Analysis Required by Executive Order...  

Energy Savers (EERE)

Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123 Guidance on Life-Cycle Cost Analysis Required by Executive Order 13123 Guide describes the clarification of...

498

Executive Committee on Sustainability and Climate Change (2012-13 Charge/Membership)  

E-Print Network (OSTI)

Executive Committee on Sustainability and Climate Change (2012-13 Charge/Membership) The Chancellor's Executive Committee on Sustainability and Climate Change (ECS) provides a forum for the Chancellor campus leadership on implementation of policies and initiatives to integrate sustainability

California at Santa Cruz, University of

499

Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk  

E-Print Network (OSTI)

Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk Tufts) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance

Patel, Aniruddh D.

500

Static Forecasting of the Execution Times of Complexes of Interrelated Jobs in the Multiprocessor Computer Systems  

Science Journals Connector (OSTI)

Consideration was given to a procedure of approximate forecasting of the execution times of the complexes of interrelated jobs in the multiprocessor computer systems with the Erlangian execution time of each j...

N. N. Ivanov; V. V. Ignatushchenko; A. Yu. Mikhailov