National Library of Energy BETA

Sample records for users execute arbitrary

  1. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  2. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  3. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  4. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  5. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  6. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  7. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  8. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  9. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  10. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  11. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  12. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  13. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  14. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  15. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  16. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  17. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  18. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  19. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  20. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  1. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  2. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  3. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  4. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Energy Savers [EERE]

    iOS. A remote user can cause arbitrary code to be executed on the target user's system. ... A remote user can create a specially crafted file that, when loaded by the target user, ...

  5. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  6. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  7. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  8. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  9. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  10. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  11. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  12. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  13. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  14. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  15. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  16. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  17. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  18. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  19. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  20. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  1. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  2. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  3. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  4. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  5. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  6. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  7. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  8. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  9. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates.

  10. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  11. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  12. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  13. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  14. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

  15. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  16. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  17. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  18. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  19. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  20. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  1. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  2. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  3. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  4. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  5. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - ...

  6. NIF User Group Executive Board

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    executive board NIF User Group Executive Board Professor Don Lamb (Chair) University of Chicago Professor Farhat Beg (Vice Chair) University of California, San Diego Professor Justin Wark (Past Chair) University of Oxford Dr. Riccardo Betti University of Rochester Dr. Kirk Flippo Los Alamos National Laboratory Professor Gianluca Gregori University of Oxford Professor Michel Koenig École Polytechnique Dr. Chikang Li Massachusetts Institute of Technology Dr. Jena Meinecke Young Researcher:

  7. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  8. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core

  9. User Executive Committee Charter (Program Document) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    User Executive Committee Charter Citation Details In-Document Search Title: User Executive Committee Charter Publication Date: 2014-10-01 OSTI Identifier: 1167400 Report Number(s): ...

  10. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  11. CNM Users Executive Committee By-Laws | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users Executive Committee By-Laws This charter defines the roles and responsibilities of Argonne's Center for Nanoscale Materials Users Executive Committee. PDF icon CNM_users_organization_bylaws

  12. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  13. Soliciting Candidates for NERSC User Group Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Soliciting Candidates for NERSC User Group Executive Committee Soliciting Candidates for NERSC User Group Executive Committee November 12, 2014 by Francesca Verdier The NERSC User Group is soliciting candidates for the upcoming election for NUGEX, the executive committee of the NERSC Users' Group (NUG). NUGEX is the voice of the user community to NERSC and DOE and is consulted on many NERSC policy issues, e.g., batch configurations, disk quotas, services and training offerings. There are 8

  14. LCLS Users' Organization Executive Committee | Linac Coherent Light Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Organization Executive Committee SAVE THE DATE: SSRL/LCLS Users' Conference and Workshops, October 5-7, 2016 Read summary of 2015 users' conference. During the annual meeting, users also have the opportunity to vote for their Users Executive Committee Representatives. The LCLS Users' Organization (LCLS UO) provides an organized framework and independent vehicle for interaction between the scientists who are interested in using the Linac Coherent Light Source (the users) and LCLS/SLAC

  15. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  16. Users Executive Committee | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    provides advice to the Director on matters affecting the user community, and ensures good communication between the CNM user community and CNM management. The CNM UEC is also...

  17. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users...

  18. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  19. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  20. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  1. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  2. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  3. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  4. T-619: Skype for Mac Message Processing Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A remote user can send a specially crafted message to a Skype user to execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

  5. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  6. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  7. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN ...

  8. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code | Department of Energy 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in

  9. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  10. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  11. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  12. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  13. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  14. U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges.

  15. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 5: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can

  16. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  17. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL...

  18. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  19. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution...

  20. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  1. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  2. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or ...

  3. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  4. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  5. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  6. User Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Information User Information Print ALSHub User Portal User Guide A step-by-step guide for users about how to apply and prepare for beam time at the ALS. Experiment Safety Upon receiving beam time, complete an Experiment Safety Sheet Prospective Users Users from Industry Contacts for Users User Policy Data Management Users' Executive Committee (UEC) User Meeting

  7. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    overflow CVE-2012-0670. A specially crafted '.pict' file can trigger a memory corruption error CVE-2012-0671. Impact: A remote user can create a file that, when loaded by...

  8. T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability

    Broader source: Energy.gov [DOE]

    It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code).

  9. T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in the Windows Kernel. A local user can obtain elevated privileges on the target system. A local user can trigger a use-after free or null pointer dereference to execute arbitrary commands on the target system with kernel level privileges.

  10. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    510-486-7118 David Shuh (2013-2015) Chemical Sciences Division, Berkeley Lab Gyorgy Snell (2011-2013) Takeda San Diego, Inc. Tel: 858-622-8588 Yuri Suzuki (2012-2014)...

  11. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (with terms), as of January 1, 2015, are Chris Cappa, chair (2012-2015) Civil and Environmental Engineering Department, University of California, Davis Peter Nico, past...

  12. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Berkeley Lab 2015 ALS UEC members (from left): Alessandro Sepe, Monika Blum, Tanja Cuk, Scott Classen, Tyler Troy, Andreas Scholl, David Shuh, Chris Cappa, Brian Collins, Peter...

  13. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Berkeley Lab Tel: 510-495-2594 Brandy Toner, past chair (2010-2012) Department of Soil, Water, and Climate; University of Minnesota Tel: 612-624-1362 Artur Braun...

  14. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Artur Braun (2013-2015) EMPA, Laboratory for High-Performance Ceramics, Dbendorf, Switzerland William Chueh (2015-2017) Stanford University Scott Classen (2013-2015) Physical...

  15. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (2014-2016) NIST Tanja Cuk (2014-2016) University of California, Berkeley Adam Hitchcock (2012-2014) BIMR, Department of Chemistry and Chemical Biology, McMaster University...

  16. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of the committee (with terms), as of January 1, 2015, are Chris Cappa, chair (2012-2015) Civil and Environmental Engineering Department, University of California, Davis Peter...

  17. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Cambridge, UK David Shuh (2013-2015) Chemical Sciences Division, Berkeley Lab Tyler Troy (2014-2016) Chemical Sciences Division, Berkeley Lab 2015 ALS UEC members (from...

  18. 2013 ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 ALS User Meeting banner Home Agenda Awards Exhibitors Lodging Posters Registration T-Shirt Contest Transportation Workshops Contact Us User Meeting Archives Users' Executive...

  19. Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... offered at CAMD's annual user meeting) or by retaking the online CAMD Radiation Safety Test. If your training has expired your access card will not allow access to the ...

  20. T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges.

  1. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  2. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  3. 2012 ALS User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2012 ALS User Meeting Awards Print Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User...

  4. 2012 ALS User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 ALS User Meeting Awards Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User Meeting. David...

  5. User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Meeting Awards Print web banner ALS User Meeting Awards See the 2013 User Meeting Awards Winners Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee The ALS Users' Executive Committee invites ALS users and staff to submit nominations in recognition of the people who have made significant contributions to the scientific

  6. Sandia's Arbitrary Waveform MEMO Actuator

    Energy Science and Technology Software Center (OSTI)

    2003-08-07

    SAMA is a multichannel, arbitrary waveform generator program for driving microelectromechanical systems (MEMS). It allows the user to piece together twelve available wave parts, thereby permitting the user to create practically any waveform, or upload a previously constructed signal. The waveforms (bundled together as a signal) may simultaneously be output through four different channels to actuate MEMS devices, and the number of output channels may be increased depending on the DAQ card or instrument utilized.more » Additionally, real-time changes may be made to the frequency and amplitude. The signal may be paused temporarily. The waveform may be saved to file for future uploading. Recent work for this version has focused on modifications that will allow loading previously generated arbitrary waveforms, independent channel waveform amplification, adding a pause function, separating the "modify waveform: and "end program" functions, and simplifying the user interface by adding test blocks with statements to help the user program and output the desired signals. The program was developed in an effort to alleviate some of the limitations of Micro Driver. For example, Micro Driver will not allow the user to select a segment of a sine wave, but rather the user is limited to choosing either a whole or half sine wave pattern. It therefore becomes quite difficult ot construct partial sine wave patterns out of a "ramp" waveparts for several reasons. First, one must determine on paper how many data points each ramp will cover, and what the slopes of these ramps will be. Second, from what was observed, Micro Driver has difficulty processing more than six distinct waveparts during sequencing. The program will allow the user to input the various waves into the desired sequence; however, it will not allow the user to compile them (by clicking "ok" and returning to the main screen). Third, should the user decide that they want to increase the amplitute of the output signal

  7. T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code

    Broader source: Energy.gov [DOE]

    Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

  8. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Positions Our executive corps is comprised of members of our Senior Executive Service and Pay Band V of the Excepted Service. Our executives use their extensive experience in scientific, engineering, program management or administrative leadership to make decisions that touch the lives of Americans every day. Senior Executive Service Other Executive Positions Learn More Senior Executive Service Other Executive Positions

    Executive Secretariat Executive Secretariat The Office of the

  9. SSRLUO Executive Committee Meetings | Stanford Synchrotron Radiation...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users Executive Committee Representatives. Review summary article about the Annual SSRLLCLS Users' Conference & Workshops, October 7-10, 2015. Review previous programs from the...

  10. Fermilab | Users' Executive Committee | Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Photo and Video Archive Visit Visiting Fermilab Hours, Maps and Directions Tours, Programs and Events Transportation Lederman Science Center Fermilab Cultural Events...

  11. ARM - User Executive Committee Bios

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organization Participants Facility Statistics Forms Contacts Facility Documents ARM ... feedbacks in the Community Earth System Model (CESM) global General Circulation Model. ...

  12. LANSCE | Users | LUG | LUG EC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Committee The LANSCE User Group (LUG) is comprised of current users. LUG provides direct input to LANSCE management, primarily through LUG's Executive Committee. The members of the LANSCE User Group Executive Committee are elected by the vote of the LUG membership, they represent the entire user community and provide direct user input to LANSCE management on matters ranging from current facility operations to planning for the future. Membership terms are staggered to maintain

  13. Tabled Execution in Scheme

    SciTech Connect (OSTI)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  14. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Energy Savers [EERE]

    ... An attacker could create a malicious web page that looks like the normal VPN web login ... This arbitrary executable would be executed with the same operating system privileges ...

  15. SSRLUO Executive Committee Meetings | Stanford Synchrotron Radiation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lightsource Executive Committee Meetings REGISTER TO ATTEND & GIVE A POSTER PRESENTATION AT THE ANNUAL SSRL/LCLS Users' Conference and Workshops, October 5-7, 2016 All users are encouraged to participate in SSRL Users' Organization activities. Meetings of the SSRL Users' Organization Executive Committee (SSRLUO-EC) include open sessions that all members of the SSRL user community are invited to attend. Meetings are held 2-3 times a year and include an annual users' conference. If you

  16. Executive Summary: Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Summary - On the Path to SunShot Executive Summary - On the Path to SunShot The halfway mark of the SunShot Initiative's 2020 target date is a good time to take stock: How much progress has been made? What have we learned? What barriers and opportunities must still be addressed to ensure that solar technologies achieve cost parity in 2020 and realize their full potential in the decades beyond? To answer these questions, the Solar Energy Technology Office launched the On the Path to

  17. Executive Director

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Director Dave Lyons, Executive Director, leads institutional initiatives and provides oversight for numerous Laboratory organizations. Contact Operator Los Alamos National Laboratory (505) 667-5061 David C. Lyons Dave Lyons, Executive Director David C. Lyons became Los Alamos National Laboratory Executive Director in April 2016. He leads institutional initiatives and provides oversight for several Laboratory organizations, including Chief Financial Officer Chief Information Officer

  18. NUG Executive Committee (NUGEX)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NUGEX NUG Executive Committee (NUGEX) NUGEX is the voice of the user community to NERSC and DOE. While all NUG events are open to all NERSC users, NUGEX members regularly participate in the monthly teleconferences and the annual face-to-face meeting. NUGEX is consulted on many NERSC policy issues, e.g., batch configurations, disk quotas, services and training offerings. Members of NUGEX also participate in their office's NERSC Requirements Reviews of High Performance Computing and Storage. There

  19. LANSCE | Users | LUG | Election Ballot

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Committee Election Polls are now open! Polls close on Monday, April 4, 2016. The Executive Committee of the LANSCE User Group (LUG-EC) is seeking new representatives to serve on the Executive Committee beginning CY 2016. The LUG-EC meets onsite at LANSCE annually and engages in monthly teleconferences with LANSCE Management and User Program representatives on behalf of you, the User Community. Further information about the EC and current members can be found on the LUG EC page. Please

  20. LANSCE | Users | LUG

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LUG-EC 2016 LUG EC Meeting 2015 LUG EC Meeting 2014 LUG EC Summary and Charge 2014 LUG EC Meeting 2013 LUG EC Meeting LUG Charter LUG Election LUG 2015 Meeting LUG 2012 Meeting Rosen Scholar Rosen Prize Users dotline LANSCE User Group (LUG) 2016 LUG Executive Committee Election Election is now closed. Thank you for voting! Results will be announced soon. The Executive Committee of the LANSCE User Group (LUG-EC) is seeking new representatives to serve on the Executive Committee beginning CY 2016.

  1. 2011 User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 User Meeting Agenda Home Agenda Awards Exhibitors Lodging Posters Registration Photo Contest Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee The 2011 ALS User Meeting begins registation begins at 07:30 on Monday, October 3, outside the Building 50 Auditorium. The meeting itself will start at 08:25 inside the Building 50 Auditorium; all plenary sessions will also be held at

  2. Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Summary September 2015 Quadrennial Technology Review ES Executive Summary ES Executive Summary Introduction The United States is in the midst of an energy revolution. Over the last decade, the United States has slashed net petroleum imports, dramatically increased shale gas production, scaled up wind and solar power, and cut the growth in electricity consumption to nearly zero through widespread efficiency measures. Emerging advanced energy technologies provide a rich set of options to

  3. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Orders Defining Tribal Relationships Executive Orders Defining Tribal Relationships Executive Order 13592 Improving American Indian and Alaska Native Educational Opportunities and Strengthening Tribal Colleges and Universities (2011). Superseded EO 13021 to ensure that all American Indian students, regardless of which institution they attend, receive support from the federal government at elementary through college levels. This EO also creates an Interagency Working Group on AI/AN

  4. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  5. LANSCE | Users | User Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Office LANSCE User Office and Visitor Center The LANSCE User Office is responsible for coordinating the users with LANSCE instrument scientist and the facility. Users contact the User Office weeks before they arrive at the LANSCE Visitor Center at Technical Area 53. Among their many responsibilities, the team issues the call for proposals, coordinates proposal experiment schedules, directs users to the training center, issues badges and dosimeters, helps to arrange tours of the facilities,

  6. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

  7. ALS Users' Association Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee ALS Users' Association Charter Print The purpose of the Advanced Light Source Users' Association (ALSUA) is to provide an organized framework for the interaction between those who use the Advanced Light Source (ALS) at the Lawrence Berkeley Laboratory (LBL) for their research and the ALS management, as well as to provide a channel for communication with other synchrotron radiation laboratories and, on suitable occasions, with federal agencies. The ALSUA, representing

  8. 2011 User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agenda Home Agenda Awards Exhibitors Lodging Posters Registration Photo Contest Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee The 2011 ALS User Meeting begins registation begins at 07:30 on Monday, October 3, outside the Building 50 Auditorium. The meeting itself will start at 08:25 inside the Building 50 Auditorium; all plenary sessions will also be held at this location.

  9. 2011 User Meeting Workshops

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2011 User Meeting Workshops Home Agenda Awards Exhibitors Lodging Posters Registration Photo Contest Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee Workshops will follow the end of the plenary sessions on Tuesday and continue through Wednesday.When registering , you will be asked to select the workshop that you plan to attend; this helps organizers plan room assignments and

  10. 2012 User Meeting Workshops

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Workshops 2012 ALS User Meeting Workshops Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee Advanced Characterization of Critical Magnetic Materials Catherine Jenkins, Peter Fischer, Elke Arenholz, and David Shuh (LBNL) 67-3111 (Wed.) Automating Tomographic Data Analysis: Transfer, Storage, Processing, and Simulation Dula

  11. 2013 User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 User Meeting Awards Recipients of the 2013 Users' Executive Committee awards and the Student Poster Competition awards, were presented Tuesday, October 8, at the ALS User Meeting. David A. Shirley Award for Outstanding Scientific Achievement at the ALS 2013-shirley The David A. Shirley Award for Scientific Achievement went to Harald Ade, North Carolina State University, "For achievements in polymer science and in particular the elucidation of the chemical nano-morphology of complex

  12. 2011 User Meeting Award Recipients

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2011 User Meeting Award Recipients Print Recipients of the 2011 Users' Executive Committee awards, Student Poster Competition awards, and Photography Contest awards were announced Tuesday, October 4th at the ALS User Meeting. Winners are pictured below with UEC Chair David Obsorn. David A. Shirley Award for Outstanding Scientific Achievement at the ALS Dr. Subrata Chakraborty, for "the design and execution of the most important and difficult experiment relevant to understanding the origin

  13. LANSCE | Users | LUG | LUG EC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LUG 2014 Summary and Charge LANSCE User Group Executive Committee Onsite Meeting, March 2014 Summary On March 14th, 2014, the LANSCE user group executive committee (LUG-EC) convened a meeting with representatives from LANSCE management, and the management of each represented user facility - Weapons Neutron Research / Nuclear Science (WNR), Ultracold Neutrons (UCN), Proton Radiography (pRad), Isotope Production Facility (IPF), and the Lujan Neutron Scattering Center (Lujan Center). Each facility

  14. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  15. LANSCE | Users | User Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LANSCE User Program LANSCE's User Program ensures the research it oversees represents the cutting edge of nuclear and materials science and technology. The User Program plays a key role in training the next generation of top scientists, attracting the best graduate students, postdoctoral researchers, and early-career scientists (defined as those less than 40-years old). The User Program typically begins with the first call for proposals and run until the end of the run-cycle. The User-Program

  16. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  17. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    execute arbitrary code. 4) An error within the internal memory mapping of non-local JavaScript variables can be exploited to cause a buffer overflow and potentially execute...

  18. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  19. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  20. EXECUTIVE SUMMARY

    National Nuclear Security Administration (NNSA)

    FUSION ENERGY SCIENCE ADVISORY COMMITTEE Panel on High Energy Density Laboratory Plasmas ADVANCING THE SCIENCE OF HIGH ENERGY DENSITY LABORATORY PLASMAS January 2009 UNITED STATES DEPARTMENT OF ENERGY 1 TABLE OF CONTENTS EXECUTIVE SUMMARY.......................................................................................... 5 1 HIGH ENERGY DENSITY LABORATORY PLASMA SCIENCE .................................... 15 2 THE CHARGE TO FESAC

  1. 2011 User Meeting Workshops

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Workshops Home Agenda Awards Exhibitors Lodging Posters Registration Photo Contest Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee Workshops will follow the end of the plenary sessions on Tuesday and continue through Wednesday.When registering , you will be asked to select the workshop that you plan to attend; this helps organizers plan room assignments and refreshments.

  2. LANSCE | Users | Rosen Prize

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Rosen Prize Current Recipient Past Recipients Call for Nominations Users dotline The Louis Rosen Prize Adam T. Holley Adam T. Holley Named 24th Rosen Prize Recipient The LANSCE User Group Executive Committee is pleased to announce that Adam Holley has been awarded the 2013 Rosen Prize for his doctoral thesis on "Ultracold Neutron Polarimetry in a Measurement of the β Asymmetry". His work demonstrated excellence in a number of facets the selection committee considered, including

  3. 2011 User Meeting Award Recipients

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Award Recipients Recipients of the 2011 Users' Executive Committee awards, Student Poster Competition awards, and Photography Contest awards were announced Tuesday, October 4th at the ALS User Meeting. Winners are pictured below with UEC Chair David Obsorn. David A. Shirley Award for Outstanding Scientific Achievement at the ALS Dr. Subrata Chakraborty, for "the design and execution of the most important and difficult experiment relevant to understanding the origin and evolution of the

  4. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  5. SSRL Users' Organization | Stanford Synchrotron Radiation Lightsource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Organization Charter | Committee Members | Committee Meetings | SSRLUO Activism SNUG Group Synchrotron and Neutron User's Group (SNUG) visit to Washington DC, April 2009. Left to right: Ryan Toomey, U. South Florida; Mark Dadmun, U. Tennessee; Christopher Kim, Chapman U. (SNUG Chair); Hendrik Ohldag, Stanford U. The SSRL Users' Organization (SSRLUO) is broadly concerned with representing the interests of the SSRL users (see Charter). Users elect members to serve on the Users' Executive

  6. LANSCE | User Resources | User Satisfaction Survey

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Satisfaction Survey We hope that your research at the Los Alamos Neutron Science Center was productive and successful. Your feedback is important to the Department of Energy and us. Please take a few minutes to respond to the questions on the following page. Your assessment of your experience at LANSCE is used by DOE to evaluate and fund the facility, by the User Group Executive Committee to determine issues and to make recommendations to address them, and by the management and staff of

  7. T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

  8. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Contact User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment...

  9. 2012 ALS User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 ALS User Meeting Awards Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User Meeting. David A. Shirley Award for Outstanding Scientific Achievement at the ALS shirley award The David A. Shirley Award for Scientific Achievement went to, from left, Carl Percival (University of Manchester), Dudley Shallcross [(University of Bristol) not pictured], and Craig Taatjes and David Osborn (Sandia), for making the first

  10. Senior Executive Service | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Senior Executive Service

  11. User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Facilities User Facilities User facility agreements allow Los Alamos partners and other entities to conduct research at our unique facilities. In 2011, LANL hosted more than 1,200 users at CINT, LANSCE, and NHMFL. Users came from across the DOE complex, from international academia, and from industrial companies from 45 states across the U.S. Unique world-class user facilities foster rich research opportunities Through its technology transfer efforts, LANL can implement user facility

  12. LANSCE | Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Rosen Scholar Rosen Prize Users dotline User Information Planning for Arrival: Contact the User Office several weeks before arriving at LANSCE. The LANSCE User Office will assist you in preparing for your visit to LANSCE. Plan to arrive one day prior to your scheduled beam time. User Office Contacts Division Office Ph: 505.667.5051 Lujan Center User Office lujan-uo@lanl.gov WNR User Program Administrator Tanya Herrera Ph: 505.667.6797 User Office Main Desk Email: lansce-user-office@lanl.gov Ph:

  13. SSRLUO 2015 Executive Committee Members | Stanford Synchrotron Radiation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lightsource 2015 Executive Committee Members REGISTER TO ATTEND & GIVE A POSTER PRESENTATION AT THE ANNUAL SSRL/LCLS Users' Conference and Workshops, October 5-7, 2016 The SSRL Users Executive Committee (UEC) encourages users to participate in SSRL events and contact UEC members to share feedback or suggestions: Edward Snell , Hauptman Woodward Institute, Buffalo, NY (SSRL UEC Chair) David Bushnell, Stanford University, Stanford, CA Kelly Chacón, Oregon Health & Science University,

  14. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users...

  15. EMC User Safety | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Argonne Policies Safety at Work EMC User Safety Scheduled Maintenance Periods Transportation For Industrial Users Acknowledgment Statements for Publications End of Experiment Survey Users Executive Committee People Publications 2015 Publications 2014 Publications 2013 Publications 2012 Publications 2011 Publications 2010 Publications 2009 Publications 2008 Publications 2007 Publications 2006 Publications Fact Sheets & Other Documents Acknowledgment Statement News & Events RESEARCH

  16. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Proposals for beam time User publications database Guest logistics and parking Loan of laptop, stealth phone and projector Logisitics for the annual users' meeting ALS Experiment...

  17. 2012 LANSCE Topical User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 LANSCE Topical User Meeting January 9-10, 2012 The Office of Defense Programs is developing a long-term strategy for the construction of new experimental science facilities supporting NNSA missions. The new facilities will provide the critical science and technology capabilities necessary to execute the 21 st century responsibilities of NNSA in executing its mission and in supporting the broader national security agenda. The call focuses on large facilities with costs exceeding $100M. The NNSA

  18. Facility Operations and User Support | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Facility Operations and User Support This sub-program provides both necessary physical ... groups that enable the program to improve its planning and execution of its mission. ...

  19. LCLS User Check-In Procedures | Linac Coherent Light Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Check-In Procedures Data Collection & Analysis | Policies | Proposals | Schedules | Shipping | User Portal Prior to traveleing to SLAC, review changes for badging/automated access and updated user check-in procedures: STEP 1. Register or Update User Portal. Provide or update your user information through the user portal (this must be completed prior to arrival). Ensure that you have correctly listed your current institution. If a user agreement with your institution is not executed in

  20. LANSCE | Users | LUG | Topical User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agenda (some presentations are included below) Sunday 4:00pm-6:00pm Registration: Best Western Monday 7:30am Registration: LANSCE, Bldg 1 Facility Presentations | LANSCE, Rosen Auditorium 8:15am-8:22am LANSCE User Group Executive Committee Welcome: Steve Conradson 2011 LUG-EC Chair 8:23am-8:30am Worshop Goals/Processes Kurt Schoenberg LANSCE Facility Director 8:30am-9:00am LANSCE Overview and Future Opportunities Kurt Schoenberg LANSCE Facility Director 9:00am-9:30am Nuclear Neutron Science at

  1. Implementing Executive Order 13423

    Broader source: Energy.gov [DOE]

    Guide describes the instructions on the requirements and how fleets should implement the Executive Order 13423.

  2. MRDAP User/Developer Documentation

    SciTech Connect (OSTI)

    Joshua Cogliati; Michael Milvich

    2009-09-01

    The Multi-Reactor Design and Analysis Platform (MRDAP) is designed to simplify the creation, transfer and processing of data between computational codes. MRDAP accomplishes these objectives with three parts: 1. allows each integrated code, through a plugin, to specify the required input for execution and the required output needed, 2. creates an interface for execution and data transfer, 3. enables the creation of Graphical User Interfaces (GUI) to assist with input preparation and data visualization. Ultimately, the main motivation of this work is to enable analysts (who perform reactor physics calculations routinely), by providing a tool that increases efficiency and minimizes the potential for errors or failed executions.

  3. User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Facilities User Facilities A new research frontier awaits! Our door is open, and we thrive on mutually beneficial partnerships and collaborations that drive innovations and new technologies. Unique world-class user facilities foster rich research opportunities Through its technology transfer efforts, Los Alamos National Laboratory can implement user facility agreements that allow its partners and other entities to conduct research at many of its unique facilities. While our largest user

  4. ALEGRA: User Input and Physics Descriptions Version 4.2 (Technical...

    Office of Scientific and Technical Information (OSTI)

    ALEGRA: User Input and Physics Descriptions Version 4.2 Citation Details In-Document Search Title: ALEGRA: User Input and Physics Descriptions Version 4.2 ALEGRA is an arbitrary ...

  5. Center for Nanophase Materials Sciences (CNMS) - CNMS User Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Group and User Executive Committee MEETING MINUTES 2015 Conf. Calls Jan. 6 Feb. 3 Mar. 3 Apr. 7 May 5 July 7 Aug. 4 Oct. 2 Nov. 6 Dec. 4 2014 Conf. Calls Jan. 9 Feb. 5 Mar. 5...

  6. V-170: Apache Subversion Hook Scripts Arbitrary Command Injection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability June 4, 2013 - 12:17am...

  7. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contacts for Users User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address

  8. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Guide Print 1. Register with the ALS Create an account on ALSHub-the ALS user portal. 2. Apply for Beam Time 3. Establish a User Agreement 4. Comply with Experiment Safety Requirements Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User Satisfaction Survey 9. Report Publications, Awards, Talks, Acknowledging Work at ALS

  9. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs

  10. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Guide Print 1. Register with the ALS Create an account on ALSHub-the ALS user portal. 2. Apply for Beam Time 3. Establish a User Agreement 4. Comply with Experiment Safety Requirements Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User Satisfaction Survey 9. Report Publications, Awards, Talks, Acknowledging Work at ALS

  11. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs

  12. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Guide User Guide Print 1. Register with the ALS Create an account on ALSHub-the ALS user portal. 2. Apply for Beam Time 3. Establish a User Agreement 4. Comply with Experiment Safety Requirements Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User Satisfaction Survey 9. Report Publications, Awards, Talks, Acknowledging Work at ALS

  13. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Policy User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing

  14. User Packages

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Packages User Packages There is more than one way for users to manage installation of Python packages on their own. Users of the Anaconda distribution may create their own environments as described here. Users of the NERSC-built modules can use virtualenv, pip, or compile and install Python packages directly. Using "pip" on Edison and Cori There is an issue with the pip command on the Cray systems because of an SSL certificate verification problem. One symptom is that you create

  15. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Author Guidelines User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address

  16. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected from

  17. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  18. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  19. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  20. Sample Project Execution Plan

    Office of Energy Efficiency and Renewable Energy (EERE)

    The project execution plan (PEP) is the governing document that establishes the means to execute, monitor, and control projects.  The plan serves as the main communication vehicle to ensure that...

  1. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  2. Writing Effective Executive Accomplishment Narratives Executive...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    you overcame * Use first person, past tense and non-jargon terms; PRB members may not ... it is an executive who: o Demonstrates the high level of performance expected and actions ...

  3. Becoming a User | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Proposal Process in Brief Proposal Form Guidelines Preparing for Your Visit Working at CNM For Industrial Users Acknowledgment Statements for Publications End of Experiment Survey Users Executive Committee People Publications 2015 Publications 2014 Publications 2013 Publications 2012 Publications 2011 Publications 2010 Publications 2009 Publications 2008 Publications 2007 Publications 2006 Publications Fact Sheets & Other Documents Acknowledgment Statement News & Events RESEARCH

  4. SES Executive Development

    Broader source: Energy.gov [DOE]

    Development continues once an individual enters into the SES. Faced with constant challenges, changing technologies and a fluid environment, executives need to pursue ongoing professional executive development. It is crucial that executives continue to strengthen and reinforce their Executive Core Qualifications (ECQs), skills and knowledge. http://www.opm.gov/ses/executive_development/index.asp Federal agencies are required by law (Title 5, U.S. Code, Section 3396) to establish programs for the continuing development of senior executives. DOE’s Office of Learning & Workforce Development is available to assist you in determining a course of action your executive development. They have a guidebook that “contains descriptions of over 350 courses, offered by 56 colleges and universities throughout the continental United States as well as by the Office of Personnel Management.”

  5. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs

  6. Industrial Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Industrial Users The facility has been used for more than a decade by a virtual Who's Who of the semiconductor industry to simulate the potential failures posed by cosmic-ray-induced neutrons upon miniature electronic devices, such as chips that help control aircraft or complex integrated circuits in automobiles. Industrial User Information The Neutron and Nuclear Science (WNR) Facility welcomes proposals for beam time experiments from industry users. Proprietary and non-proprietary industrial

  7. User Program Performance Monitor

    Energy Science and Technology Software Center (OSTI)

    1983-09-30

    PROGLOOK makes it possible to monitor the execution of virtually any OS/MVT or OS/VS2 Release 1.6 load module. The main reason for using PROGLOOK is to find out which portions of a code use most of the CPU time so that those parts of the program can be rewritten to reduce CPU time. For large production programs, users have typically found it possible to reduce CPU time by 10 to 30 percent without changing themore » program''s function.« less

  8. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected from

  9. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected from

  10. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User ...

  11. Industrial Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Industrial Users - Media Publications and Information The Invisible Neutron Threat Neutron-Induced Failures in Semiconductor Devices Nuclear Science Research at the LANSCE-WNR...

  12. Prospective Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An...

  13. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  14. LTS Execution - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Execution About Us Hanford Cultural Resources LTS Home Page LTS Project Management LTS Transition and Timeline LTS Execution LTS Background LTS Information Management LTS Fact Sheets / Briefings LTS In The News LTS Related Links LTS Contact Us LTS Execution Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size The Hanford LTS Program is described in the Hanford LTS Program Plan and includes two distinct elements: Transition process is a disciplined process that is used

  15. CBECS 1995 - Executive Summary

    U.S. Energy Information Administration (EIA) Indexed Site

    Executive Summary The Commercial Buildings Energy Consumption Survey (CBECS) collects information on physical characteristics of commercial buildings, building use and occupancy...

  16. Prospective Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the ALS with all the technical, experiment, and administrative support they require for successful and efficient use of beam time. The kinds of access for users, i.e., General...

  17. NIF Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    users NIF Users Research Opportunities at the National Ignition Facility The National Ignition Facility provides the scientific community with an unprecedented capability for studying materials at extreme pressures, temperatures, and densities. NIF is expected to achieve temperatures and densities almost an order of magnitude greater than those in the sun's core and pressures far in excess of those at the core of Jupiter. The density of neutrons during the tens of picoseconds the NIF target

  18. Efficient isoparametric integration over arbitrary space-filling...

    Office of Scientific and Technical Information (OSTI)

    Efficient isoparametric integration over arbitrary space-filling Voronoi polyhedra for electronic structure calculations Prev Next Title: Efficient isoparametric integration ...

  19. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  20. User Program | Prospective Users US

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Click on the "User Satisfaction Survey" link on the "main menu" page. If you don't have an account you will need to create one. Your login ID (username and email) is the same as ...

  1. User Accounts and Emails

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Accounts and Emails Print User Accounts Once a User Agreement is signed, users may ... and Information System (IRIS) . User Emails Users may sign up for a Berkeley Lab ...

  2. AVRAM user's manual

    SciTech Connect (OSTI)

    McGrady, P.W.

    1988-02-01

    This document details the use of the reliability code for the Atomic Vapor Laser Isotope Separation (AVLIS) project. This code was designed by Tom Anklam and John Harris. In late 1984 Patrick McGrady and Elena Koontz of C and TD/TA were assigned the task of improving the code and converting it for use on the DEC-10 system. In early 1986, Patric McGrady converted it to the CRAY. The AVRAM code is divided into distinct parts (often referred to as programs in this document). There is a COSMOS file that controls the execution of the FORTRAN code and controls the naming of output datasets and the deletion of temporary datasets created by the code. The FORTRAN code consists of a main program as a driver and of three main subroutines: EDIT, PARAM, and AVRAM. The EDIT program allows the user to create a new user defined system or add to an existing system or to change certain parameters. The PARAM program allows the user to alter system parameters and to select options such as economics run, criticality analysis or sensitivity studies. The AVRAM program does a reliability analysis of the system.

  3. Arbitrary Lagrangian Eulerian Adaptive Mesh Refinement

    Energy Science and Technology Software Center (OSTI)

    2009-09-29

    This is a simulation code involving an ALE (arbitrary Lagrangian-Eulerian) hydrocode with AMR (adaptive mesh refinement) and pluggable physics packages for material strength, heat conduction, radiation diffusion, and laser ray tracing developed a LLNL, UCSD, and Berkeley Lab. The code is an extension of the open source SAMRAI (Structured Adaptive Mesh Refinement Application Interface) code/library. The code can be used in laser facilities such as the National Ignition Facility. The code is alsi being appliedmore » to slurry flow (landslides).« less

  4. Executive Branch Management Scorecard | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Branch Management Scorecard Executive Branch Management Scorecard PDF icon Executive Branch Management Scorecard More Documents & Publications Executive Branch Management Scorecard ...

  5. ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Meeting ALS User Meeting web banner ALS User Meeting: October 5-7, 2015 Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops Contact Us User...

  6. Executive Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Services » Executive Resources Executive Resources Executive Resources provides integrated executive policy and operational personnel support services in a centralized location to the Senior Executive Service (SES), Senior-Level (SL), Scientific and Professional (ST), Excepted Service and political appointees. Click the "Contacts" Link to find a list of HR Specialist by the organizations they service. HR Contacts The Senior Executive Service (SES) Excepted Service Authorities

  7. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a.m. - 12.00 p.m. and 1.00 p.m. - 4.00 p.m. User Office Staff Deborah Smith adriana reza This e-mail address is being protected from spambots. You need JavaScript enabled to...

  8. Budget Formulation & Execution

    Broader source: Energy.gov [DOE]

    The mission of the Office of Budget (CF-30) is to plan for, formulate, execute, analyze, and defend the Department of Energy's budget; to manage the corporate funds control process; and to serve as...

  9. Infrastructure Security Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Summary Energy, Climate, and Infrastructure Executive Summary / 3 Message from the VP Rick Stulen, Vice President Energy, Climate, & Infrastructure Security SMU Access to reliable, affordable, and sustainable sources of energy is essential for all modern economies. Since the late 1950s, we Americans have not been energy self-sufficient. Our addiction to foreign oil and fossil fuels puts our economy, our environment, and ultimately our national security at risk. Furthermore, there

  10. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  11. U-022: Apple QuickTime Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  12. 27th Annual SSRL Users' Meeting -- Lytle Award

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3rd Annual Farrel W. Lytle Award -- Nominations Due October 2 The SSRL Users' Organization Executive Committee has established this award to promote important technical or scientific accomplishments in synchrotron radiation-based science and to foster collaboration and efficient use of beam time among users and staff at SSRL. All SSRL users and staff are eligible for this award. The Lytle Award consists of a plaque that is displayed in the User Research Administration Office at SSRL and $1000.

  13. Document issued in preparation for the ATLAS User Workshop 2006

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    goals, in the context of long- term plans for the ATLAS facility. The current ATLAS Strategic Plan was crafted in 2009 by the Executive Committee of the ATLAS Users group and...

  14. Executive Order 13423 Implementing Instructions

    Broader source: Energy.gov [DOE]

    INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE ORDER 13423“Strengthening Federal Environmental, Energy, and Transportation Management”

  15. STEP Participant Survey Executive Summary

    Broader source: Energy.gov [DOE]

    STEP Participant Survey Executive Summary, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  16. Detection of malicious computer executables

    DOE Patents [OSTI]

    Cai, Dongming M.; Gokhale, Maya

    2009-04-14

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  17. Executive Energy Leadership Academy Alumni

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Committee Meeting Executive Committee Meeting September 7, 2016 6:00PM to 7:30PM EDT The Oak Ridge Site Specific Advisory Board's Executive Committee meeting is open

    Executive Energy Leadership Academy Alumni Since its inception in 2007, decision-makers throughout the country have participated in NREL's Executive Energy Leadership Academy. The following is a list of alumni sorted by program and year. Leadership Program 2015 Participants * Samuel Anderson, Colorado Department of

  18. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  19. Profiling users in the UNIX os environment

    SciTech Connect (OSTI)

    Dao, V N P; Vemuri, R; Templeton, S J

    2000-09-29

    This paper presents results obtained by using a method of profiling a user based on the login host, the login time, the command set, and the command set execution time of the profiled user. It is assumed that the user is logging onto a UNIX host on a computer network. The paper concentrates on two areas: short-term and long-term profiling. In short-term profiling the focus is on profiling the user at a given session where user characteristics do not change much. In long-term profiling, the duration of observation is over a much longer period of time. The latter is more challenging because of a phenomenon called concept or profile drift. Profile drift occurs when a user logs onto a host for an extended period of time (over several sessions).

  20. Post-Fabrication Placement of Arbitrary Chemical Functionality...

    Office of Scientific and Technical Information (OSTI)

    Post-Fabrication Placement of Arbitrary Chemical Functionality on Microphase-Separated Thin Films of Amine-Reactive Block Copolymers Citation Details In-Document Search Title: ...

  1. User Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Environment Environment on Genepool When you log into the Genepool system you will land in your $HOME directory on NERSC's "global homes" file system. The global homes file system is mounted across all NERSC computation systems with the exception of PDSF. The $HOME directory has quota of 40GB and 1,000,000 inodes. To customize your environment, by setting environment variables or aliases, you will need to modify one of the "dot" files that NERSC has created for you. You

  2. Mode coupling evolution in arbitrary inflationary backgrounds

    SciTech Connect (OSTI)

    Bernardeau, Francis

    2011-02-01

    The evolution of high order correlation functions of a test scalar field in arbitrary inflationary backgrounds is computed. Whenever possible, exact results are derived from quantum field theory calculations. Taking advantage of the fact that such calculations can be mapped, for super-horizon scales, into those of a classical system, we express the expected correlation functions in terms of classical quantities, power spectra, Green functions, that can be easily computed in the long-wavelength limit. Explicit results are presented that extend those already known for a de Sitter background. In particular the expressions of the late time amplitude of bispectrum and trispectrum, as well as the whole high-order correlation structure, are given in terms of the expansion factor behavior. When compared to the case of a de Sitter background, power law inflation and chaotic inflation induced by a massive field are found to induce high order correlation functions the amplitudes of which are amplified by almost one order of magnitude. These results indicate that the dependence of the related non-Gaussian parameters — such as f{sub NL} — on the wave-modes is at percent level.

  3. User Financial Account Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    22013 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user ...

  4. User Financial Account Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    102115 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user ...

  5. 2013 ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2013 ALS User Meeting Print banner Home Agenda Awards Exhibitors Lodging Posters Registration T-Shirt Contest Transportation Workshops Contact Us User Meeting Archives Users'...

  6. ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS User Meeting Print web banner ALS User Meeting: October 5-7, 2015 Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops Contact Us User Meeting...

  7. Budget Execution Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-30

    The manual provides the user with a single source for references, definitions, and detailed procedures for distributing and controlling Department funds.Canceled by DOE M 135.1-1A. Does not cancel other directives.

  8. PST user`s guide

    SciTech Connect (OSTI)

    Rempe, J.L.; Cebull, M.J.; Gilbert, B.G.

    1996-10-01

    The Parametric Source Term (PST) software allows estimation of radioactivity release fractions for Level 2 Probabilistic Safety Assessments (PSAs). PST was developed at the Idaho National Engineering Laboratory (INEL) for the Nuclear Regulatory Commission`s (NRC`s) Accident Sequence Precursor (ASP) Program. PST contains a framework of equations that model activity transport between volumes in the release pathway from the core, through the vessel, through the containment, and to the environment. PST quickly obtains exact solutions to differential equations for activity transport in each volume for each time interval. PST provides a superior method for source term estimation because it: ensures conservation of activity transported across various volumes in the release pathway; provides limited consideration of the time-dependent behavior of input parameter uncertainty distributions; allows input to be quantified using state-of-the-art severe accident analysis code results; increases modeling flexibility because linkage between volumes is specified by user input; and allows other types of Light Water Reactor (LWR) plant designs to be evaluated with minimal modifications. PST is a microcomputer-based system that allows the analyst more flexibility than a mainframe system. PST has been developed to run with both MS DOS and MS Windows 95/NT operating systems. PST has the capability to load ASP Source Term Vector (STV) information, import pre-specified default input for the 6 Pressurized Water Reactors (PWRs) initially analyzed in the NRC ASP program, allow input value modifications for release fraction sensitivity studies, export user-specified default input for the LWR being modeled, report results of radioactivity release calculations at each time interval, and generate formatted results that can interface with other risk assessment codes. This report describes the PST model and provides guidelines for using PST.

  9. Business Model Guide Executive Summary

    Broader source: Energy.gov [DOE]

    The Business Model Guide Executive Summary by the U.S. Department of Energy's Better Buildings Neighborhood Program.

  10. STEP Participant Survey Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive S ummary 1 Executive S ummary 2 Executive Summary of Findings July 26th, 2013 Prepared by Jeff Henn Executive S ummary 3 Background information on Baltimore Research Founded in 1960, Baltimore Research is a 53-year old, full service marketing research firm and focus facility located in Towson, MD. We provide research consultation, research design, data collection, analysis, field management, and recruiting and focus facilities. The company offers both qualitative and quantitative