National Library of Energy BETA

Sample records for varnish cache server

  1. Index of /datasets/files/41/pub/PUBID8_3989

    Open Energy Info (EERE)

    Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 2142255935 Varnish cache server Directory Listing This is a file-level view of...

  2. Purge Lock Server

    Energy Science and Technology Software Center (OSTI)

    2012-08-21

    The software provides a simple web api to allow users to request a time window where a file will not be removed from cache. HPSS provides the concept of a "purge lock". When a purge lock is set on a file, the file will not be removed from disk, entering tape only state. A lot of network file protocols assume a file is on disk so it is good to purge lock a file beforemore »transferring using one of those protocols. HPSS's purge lock system is very coarse grained though. A file is either purge locked or not. Nothing enforces quotas, timely unlocking of purge locks, or managing the races inherent with multiple users wanting to lock/unlock the same file. The Purge Lock Server lets you, through a simple REST API, specify a list of files to purge lock and an expire time, and the system will ensure things happen properly.« less

  3. Checkpointing in speculative versioning caches

    DOE Patents [OSTI]

    Eichenberger, Alexandre E; Gara, Alan; Gschwind, Michael K; Ohmacht, Martin

    2013-08-27

    Mechanisms for generating checkpoints in a speculative versioning cache of a data processing system are provided. The mechanisms execute code within the data processing system, wherein the code accesses cache lines in the speculative versioning cache. The mechanisms further determine whether a first condition occurs indicating a need to generate a checkpoint in the speculative versioning cache. The checkpoint is a speculative cache line which is made non-speculative in response to a second condition occurring that requires a roll-back of changes to a cache line corresponding to the speculative cache line. The mechanisms also generate the checkpoint in the speculative versioning cache in response to a determination that the first condition has occurred.

  4. Index of /datasets/files/41/pub/PUBID8_0772

    Open Energy Info (EERE)

    :49 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 979859490 Varnish cache server Directory Listing This is a file-level view...

  5. Index of /datasets/files/41/pub/PUBID8_3844

    Open Energy Info (EERE)

    :01 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 979859543 Varnish cache server Directory Listing This is a file-level view...

  6. Index of /datasets/files/41/pub/PUBID8_2886

    Open Energy Info (EERE)

    :32 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 994569761 Varnish cache server Directory Listing This is a file-level view...

  7. Index of /datasets/files/41/pub/PUBID8_0001/Base

    Open Energy Info (EERE)

    Sim1 18-Apr-2012 11:06 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 653191374 Varnish cache server Directory Listing This...

  8. Index of /datasets/files/41/pub/PUBID8_4214

    Open Energy Info (EERE)

    - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 994569787 Varnish cache server Directory Listing This is a file-level view of...

  9. Index of /datasets/files/41/pub/PUBID8_1613

    Open Energy Info (EERE)

    429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 994569752 Varnish cache server Directory Listing This is a file-level view of...

  10. Nercenergy Microsoft Exchange Servers

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Pillars of Web Application Monitoring http:www.nercenergy.comthe-four-pillars-of-microsoft-exchange-server-monitoring http:www.nercenergy.comthe-four-pillars-of-microsoft-...

  11. EnCache: A Dynamic Profiling Based Reconfiguration Technique for Improving Cache Energy Efficiency

    SciTech Connect (OSTI)

    Mittal, Sparsh; Zhang, Zhao

    2014-01-01

    With each CMOS technology generation, leakage energy consumption has been dramatically increasing and hence, managing leakage power consumption of large last-level caches (LLCs) has become a critical issue in modern processor design. In this paper, we present EnCache, a novel software-based technique which uses dynamic profiling-based cache reconfiguration for saving cache leakage energy. EnCache uses a simple hardware component called profiling cache, which dynamically predicts energy efficiency of an application for 32 possible cache configurations. Using these estimates, system software reconfigures the cache to the most energy efficient configuration. EnCache uses dynamic cache reconfiguration and hence, it does not require offline profiling or tuning the parameter for each application. Furthermore, EnCache optimizes directly for the overall memory subsystem (LLC and main memory) energy efficiency instead of the LLC energy efficiency alone. The experiments performed with an x86-64 simulator and workloads from SPEC2006 suite confirm that EnCache provides larger energy saving than a conventional energy saving scheme. For single core and dual-core system configurations, the average savings in memory subsystem energy over a shared baseline configuration are 30.0% and 27.3%, respectively.

  12. Method and structure for cache aware transposition via rectangular...

    Office of Scientific and Technical Information (OSTI)

    Method and structure for cache aware transposition via rectangular subsections Citation Details In-Document Search Title: Method and structure for cache aware transposition via...

  13. FlexiWay: A Cache Energy Saving Technique Using Fine-grained Cache Reconfiguration

    SciTech Connect (OSTI)

    Mittal, Sparsh ORNL; Zhang, Zhao Iowa State University; Vetter, Jeffrey S ORNL

    2013-01-01

    Recent trends of CMOS scaling and use of large last level caches (LLCs) have led to significant increase in the leakage energy consumption of LLCs and hence, managing their energy consumption has become extremely important in modern processor design. The conventional cache energy saving techniques require offline profiling or provide only coarse granularity of cache allocation. We present FlexiWay, a cache energy saving technique which uses dynamic cache reconfiguration. FlexiWay logically divides the cache sets into multiple (e.g. 16) modules and dynamically turns off suitable and possibly different number of cache ways in each module. FlexiWay has very small implementation overhead and it provides fine-grain cache allocation even with caches of typical associativity, e.g. an 8-way cache. Microarchitectural simulations have been performed using an x86-64 simulator and workloads from SPEC2006 suite. Also, FlexiWay has been compared with two conventional energy saving techniques. The results show that FlexiWay provides largest energy saving and incurs only small loss in performance. For single, dual and quad core systems, the average energy saving using FlexiWay are 26.2%, 25.7% and 22.4%, respectively.

  14. HPSS Disk Cache Upgrade Caters to Capacity

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HPSS Disk Cache Upgrade Caters to Capacity HPSS Disk Cache Upgrade Caters to Capacity Analysis of NERSC Users' Data-Access Habits Reveals Sweet Spot for Short-term Storage October 16, 2015 Contact: Kathy Kincade, +1 510 495 2124, kkincade@lbl.gov HPSS 09 vert NERSC users today are benefiting from a business decision made three years ago by the center's Storage Systems Group (SSG) as they were looking to upgrade the High-Performance Storage System (HPSS) disk cache: rather than focus primarily on

  15. Version pressure feedback mechanisms for speculative versioning caches

    Office of Scientific and Technical Information (OSTI)

    (Patent) | SciTech Connect Version pressure feedback mechanisms for speculative versioning caches Citation Details In-Document Search Title: Version pressure feedback mechanisms for speculative versioning caches Mechanisms are provided for controlling version pressure on a speculative versioning cache. Raw version pressure data is collected based on one or more threads accessing cache lines of the speculative versioning cache. One or more statistical measures of version pressure are

  16. Hydrolyzable polyester resins, varnishes and coating compositions containing the same

    DOE Patents [OSTI]

    Yamamori, Naoki (Minoo, JP); Yokoi, Junji (Nara, JP); Yoshikawa, Motoyoshi (Nara, JP)

    1984-01-01

    Preparation of hydrolyzable polyester resin comprising reacting polycarboxylic acid and polyhydric alcohol components, which is characterized by using, as at least part of said polyhydric alcohol component, a metallic salt of hydroxy carboxylic acid of the formula defined and effecting the polycondensation at a temperature which is no more than the decomposition temperature of said metallic salt. The polyester resins are useful as resinous vehicle of varnishes and antifouling paints.

  17. Secure IRC Server

    Energy Science and Technology Software Center (OSTI)

    2003-08-25

    The IRCD is an IRC server that was originally distributed by the IRCD Hybrid developer team for use as a server in IRC message over the public Internet. By supporting the IRC protocol defined in the IRC RFC, IRCD allows the users to create and join channels for group or one-to-one text-based instant messaging. It stores information about channels (e.g., whether it is public, secret, or invite-only, the topic set, membership) and users (who ismore » online and what channels they are members of). It receives messages for a specific user or channel and forwards these messages to the targeted destination. Since server-to-server communication is also supported, these targeted destinations may be connected to different IRC servers. Messages are exchanged over TCP connections that remain open between the client and the server. The IRCD is being used within the Pervasive Computing Collaboration Environment (PCCE) as the 'chat server' for message exchange over public and private channels. After an LBNLSecureMessaging(PCCE chat) client has been authenticated, the client connects to IRCD with its assigned nickname or 'nick.' The client can then create or join channels for group discussions or one-to-one conversations. These channels can have an initial mode of public or invite-only and the mode may be changed after creation. If a channel is public, any one online can join the discussion; if a channel is invite-only, users can only join if existing members of the channel explicity invite them. Users can be invited to any type of channel and users may be members of multiple channels simultaneously. For use with the PCCE environment, the IRCD application (which was written in C) was ported to Linux and has been tested and installed under Linux Redhat 7.2. The source code was also modified with SSL so that all messages exchanged over the network are encrypted. This modified IRC server also verifies with an authentication server that the client is who he or she claims to be and that this user is authorized to ain access to the IRCD.« less

  18. Microsoft Exchange Servers Archives - Nercenergy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Exchange Servers What Certificates Should My Microsoft Exchange Server Have? Much like any other network application, in order to secure the functionality and safety of Microsoft Exchange Servers, it's essential to adopt specific certificates. Due to the literally thousands, if not millions, of security threats bombarding your Exchange Server every day, these certificates ensure users have a safe messaging experience while simultaneously safeguarding your data and sensitive information from

  19. Cache County, Utah: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    Climate Zone Number 6 Climate Zone Subtype B. Places in Cache County, Utah Amalga, Utah Avon, Utah Benson, Utah Cache, Utah Clarkston, Utah Cornish, Utah Cove, Utah Hyde Park, Utah...

  20. A Survey of Architectural Techniques For Improving Cache Power Efficiency

    SciTech Connect (OSTI)

    Mittal, Sparsh

    2013-01-01

    Modern processors are using increasingly larger sized on-chip caches. Also, with each CMOS technology generation, there has been a significant increase in their leakage energy consumption. For this reason, cache power management has become a crucial research issue in modern processor design. To address this challenge and also meet the goals of sustainable computing, researchers have proposed several techniques for improving energy efficiency of cache architectures. This paper surveys recent architectural techniques for improving cache power efficiency and also presents a classification of these techniques based on their characteristics. For providing an application perspective, this paper also reviews several real-world processor chips that employ cache energy saving techniques. The aim of this survey is to enable engineers and researchers to get insights into the techniques for improving cache power efficiency and motivate them to invent novel solutions for enabling low-power operation of caches.

  1. Multi-level Hybrid Cache: Impact and Feasibility

    SciTech Connect (OSTI)

    Zhang, Zhe; Kim, Youngjae; Ma, Xiaosong; Shipman, Galen M; Zhou, Yuanyuan

    2012-02-01

    Storage class memories, including flash, has been attracting much attention as promising candidates fitting into in today's enterprise storage systems. In particular, since the cost and performance characteristics of flash are in-between those of DRAM and hard disks, it has been considered by many studies as an secondary caching layer underneath main memory cache. However, there has been a lack of studies of correlation and interdependency between DRAM and flash caching. This paper views this problem as a special form of multi-level caching, and tries to understand the benefits of this multi-level hybrid cache hierarchy. We reveal that significant costs could be saved by using Flash to reduce the size of DRAM cache, while maintaing the same performance. We also discuss design challenges of using flash in the caching hierarchy and present potential solutions.

  2. Constant time worker thread allocation via configuration caching (Patent) |

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect Constant time worker thread allocation via configuration caching Citation Details In-Document Search Title: Constant time worker thread allocation via configuration caching Mechanisms are provided for allocating threads for execution of a parallel region of code. A request for allocation of worker threads to execute the parallel region of code is received from a master thread. Cached thread allocation information identifying prior thread allocations that have been performed

  3. Checkpointing in speculative versioning caches (Patent) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    The mechanisms further determine whether a first condition occurs indicating a need to generate a checkpoint in the speculative versioning cache. The checkpoint is a speculative ...

  4. Cache directory lookup reader set encoding for partial cache line speculation support

    DOE Patents [OSTI]

    Gara, Alan; Ohmacht, Martin

    2014-10-21

    In a multiprocessor system, with conflict checking implemented in a directory lookup of a shared cache memory, a reader set encoding permits dynamic recordation of read accesses. The reader set encoding includes an indication of a portion of a line read, for instance by indicating boundaries of read accesses. Different encodings may apply to different types of speculative execution.

  5. Automated Cache Performance Analysis And Optimization

    SciTech Connect (OSTI)

    Mohror, Kathryn

    2013-12-23

    While there is no lack of performance counter tools for coarse-grained measurement of cache activity, there is a critical lack of tools for relating data layout to cache behavior to application performance. Generally, any nontrivial optimizations are either not done at all, or are done by hand requiring significant time and expertise. To the best of our knowledge no tool available to users measures the latency of memory reference instructions for partic- ular addresses and makes this information available to users in an easy-to-use and intuitive way. In this project, we worked to enable the Open|SpeedShop performance analysis tool to gather memory reference latency information for specific instructions and memory ad- dresses, and to gather and display this information in an easy-to-use and intuitive way to aid performance analysts in identifying problematic data structures in their codes. This tool was primarily designed for use in the supercomputer domain as well as grid, cluster, cloud-based parallel e-commerce, and engineering systems and middleware. Ultimately, we envision a tool to automate optimization of application cache layout and utilization in the Open|SpeedShop performance analysis tool. To commercialize this soft- ware, we worked to develop core capabilities for gathering enhanced memory usage per- formance data from applications and create and apply novel methods for automatic data structure layout optimizations, tailoring the overall approach to support existing supercom- puter and cluster programming models and constraints. In this Phase I project, we focused on infrastructure necessary to gather performance data and present it in an intuitive way to users. With the advent of enhanced Precise Event-Based Sampling (PEBS) counters on recent Intel processor architectures and equivalent technology on AMD processors, we are now in a position to access memory reference information for particular addresses. Prior to the introduction of PEBS counters, cache behavior could only be measured reliably in the ag- gregate across tens or hundreds of thousands of instructions. With the newest iteration of PEBS technology, cache events can be tied to a tuple of instruction pointer, target address (for both loads and stores), memory hierarchy, and observed latency. With this information we can now begin asking questions regarding the efficiency of not only regions of code, but how these regions interact with particular data structures and how these interactions evolve over time. In the short term, this information will be vital for performance analysts understanding and optimizing the behavior of their codes for the memory hierarchy. In the future, we can begin to ask how data layouts might be changed to improve performance and, for a particular application, what the theoretical optimal performance might be. The overall benefit to be produced by this effort was a commercial quality easy-to- use and scalable performance tool that will allow both beginner and experienced parallel programmers to automatically tune their applications for optimal cache usage. Effective use of such a tool can literally save weeks of performance tuning effort. Easy to use. With the proposed innovations, finding and fixing memory performance issues would be more automated and hide most to all of the performance engineer exper- tise under the hood of the Open|SpeedShop performance tool. One of the biggest public benefits from the proposed innovations is that it makes performance analysis more usable to a larger group of application developers. Intuitive reporting of results. The Open|SpeedShop performance analysis tool has a rich set of intuitive, yet detailed reports for presenting performance results to application developers. Our goal was to leverage this existing technology to present the results from our memory performance addition to Open|SpeedShop. Suitable for experts as well as novices. Application performance is getting more difficult to measure as the hardware platforms they run on become more complicated. This makes life dif

  6. Version pressure feedback mechanisms for speculative versioning caches

    DOE Patents [OSTI]

    Eichenberger, Alexandre E.; Gara, Alan; O'Brien, Kathryn M.; Ohmacht, Martin; Zhuang, Xiaotong

    2013-03-12

    Mechanisms are provided for controlling version pressure on a speculative versioning cache. Raw version pressure data is collected based on one or more threads accessing cache lines of the speculative versioning cache. One or more statistical measures of version pressure are generated based on the collected raw version pressure data. A determination is made as to whether one or more modifications to an operation of a data processing system are to be performed based on the one or more statistical measures of version pressure, the one or more modifications affecting version pressure exerted on the speculative versioning cache. An operation of the data processing system is modified based on the one or more determined modifications, in response to a determination that one or more modifications to the operation of the data processing system are to be performed, to affect the version pressure exerted on the speculative versioning cache.

  7. ESnet IPv6 Mirror Servers

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mirror Servers Engineering Services The Network OSCARS Fasterdata IPv6 Network IPv6 Implementation Checklist ESnet IPv6 Mirror Servers ESnet IPv6 History ESnet supports Sandia and APNIC IPv6 Background Radiation research Network Performance Tools The ESnet Engineering Team Contact Us Technical Assistance: 1 800-33-ESnet (Inside US) 1 800-333-7638 (Inside US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net ESnet

  8. Constant time worker thread allocation via configuration caching

    DOE Patents [OSTI]

    Eichenberger, Alexandre E; O'Brien, John K. P.

    2014-11-04

    Mechanisms are provided for allocating threads for execution of a parallel region of code. A request for allocation of worker threads to execute the parallel region of code is received from a master thread. Cached thread allocation information identifying prior thread allocations that have been performed for the master thread are accessed. Worker threads are allocated to the master thread based on the cached thread allocation information. The parallel region of code is executed using the allocated worker threads.

  9. Method and structure for cache aware transposition via rectangular

    Office of Scientific and Technical Information (OSTI)

    subsections (Patent) | SciTech Connect cache aware transposition via rectangular subsections Citation Details In-Document Search Title: Method and structure for cache aware transposition via rectangular subsections A method and structure for transposing a rectangular matrix A in a computer includes subdividing the rectangular matrix A into one or more square submatrices and executing an in-place transposition for each of the square submatrices A.sub.ij. Authors: Gustavson, Fred Gehrung ;

  10. Constant time worker thread allocation via configuration caching (Patent) |

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect Constant time worker thread allocation via configuration caching Citation Details In-Document Search Title: Constant time worker thread allocation via configuration caching × You are accessing a document from the Department of Energy's (DOE) SciTech Connect. This site is a product of DOE's Office of Scientific and Technical Information (OSTI) and is provided as a public service. Visit OSTI to utilize additional information resources in energy science and technology. A paper

  11. Version pressure feedback mechanisms for speculative versioning caches

    Office of Scientific and Technical Information (OSTI)

    (Patent) | SciTech Connect Version pressure feedback mechanisms for speculative versioning caches Citation Details In-Document Search Title: Version pressure feedback mechanisms for speculative versioning caches × You are accessing a document from the Department of Energy's (DOE) SciTech Connect. This site is a product of DOE's Office of Scientific and Technical Information (OSTI) and is provided as a public service. Visit OSTI to utilize additional information resources in energy science

  12. Cache directory look-up re-use as conflict check mechanism for speculative memory requests

    DOE Patents [OSTI]

    Ohmacht, Martin

    2013-09-10

    In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous.

  13. PDS: A Performance Database Server

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Berry, Michael W.; Dongarra, Jack J.; Larose, Brian H.; Letsche, Todd A.

    1994-01-01

    The process of gathering, archiving, and distributing computer benchmark data is a cumbersome task usually performed by computer users and vendors with little coordination. Most important, there is no publicly available central depository of performance data for all ranges of machines from personal computers to supercomputers. We present an Internet-accessible performance database server (PDS) that can be used to extract current benchmark data and literature. As an extension to the X-Windows-based user interface (Xnetlib) to the Netlib archival system, PDS provides an on-line catalog of public domain computer benchmarks such as the LINPACK benchmark, Perfect benchmarks, and the NAS parallelmore » benchmarks. PDS does not reformat or present the benchmark data in any way that conflicts with the original methodology of any particular benchmark; it is thereby devoid of any subjective interpretations of machine performance. We believe that all branches (research laboratories, academia, and industry) of the general computing community can use this facility to archive performance metrics and make them readily available to the public. PDS can provide a more manageable approach to the development and support of a large dynamic database of published performance metrics.« less

  14. Property:Building/SPElectrtyUsePercLargeComputersServers | Open...

    Open Energy Info (EERE)

    Jump to: navigation, search This is a property of type String. Large computers servers Pages using the property "BuildingSPElectrtyUsePercLargeComputersServers"...

  15. U-200: Red Hat Directory Server Information Disclosure Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

  16. New Servers Implemented | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    New Servers Implemented Cyber Train Changes have been made to the implementation of Cyber Train. More information about how to acces Cyber Train from either on or off site can be...

  17. Improving energy efficiency of Embedded DRAM Caches for High-end Computing Systems

    SciTech Connect (OSTI)

    Mittal, Sparsh; Vetter, Jeffrey S; Li, Dong

    2014-01-01

    With increasing system core-count, the size of last level cache (LLC) has increased and since SRAM consumes high leakage power, power consumption of LLCs is becoming a significant fraction of processor power consumption. To address this, researchers have used embedded DRAM (eDRAM) LLCs which consume low-leakage power. However, eDRAM caches consume a significant amount of energy in the form of refresh energy. In this paper, we propose ESTEEM, an energy saving technique for embedded DRAM caches. ESTEEM uses dynamic cache reconfiguration to turn-off a portion of the cache to save both leakage and refresh energy. It logically divides the cache sets into multiple modules and turns-off possibly different number of ways in each module. Microarchitectural simulations confirm that ESTEEM is effective in improving performance and energy efficiency and provides better results compared to a recently-proposed eDRAM cache energy saving technique, namely Refrint. For single and dual-core simulations, the average saving in memory subsystem (LLC+main memory) on using ESTEEM is 25.8% and 32.6%, respectively and average weighted speedup are 1.09X and 1.22X, respectively. Additional experiments confirm that ESTEEM works well for a wide-range of system parameters.

  18. Dense Servers for Reduced Energy Use and Facility Space Requirements |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Dense Servers for Reduced Energy Use and Facility Space Requirements Dense Servers for Reduced Energy Use and Facility Space Requirements Server Architecture Improves Energy Consumption and Utilization Information technology (IT) and telecommunications facilities account for ~3% of all U.S. electricity consumption. In data centers, volume servers account for 68% of the power consumed. The U.S. Department of Energy (DOE) identified the main areas where energy use or loss

  19. Energy Efficiency in Small Server Rooms: Field Surveys and Findings

    SciTech Connect (OSTI)

    Cheung, Iris; Greenberg, Steve; Mahdavi, Roozbeh; Brown, Richard; Tschudi, William

    2014-08-11

    Fifty-seven percent of US servers are housed in server closets, server rooms, and localized data centers, in what are commonly referred to as small server rooms, which comprise 99percent of all server spaces in the US. While many mid-tier and enterprise-class data centers are owned by large corporations that consider energy efficiency a goal to minimize business operating costs, small server rooms typically are not similarly motivated. They are characterized by decentralized ownership and management and come in many configurations, which creates a unique set of efficiency challenges. To develop energy efficiency strategies for these spaces, we surveyed 30 small server rooms across eight institutions, and selected four of them for detailed assessments. The four rooms had Power Usage Effectiveness (PUE) values ranging from 1.5 to 2.1. Energy saving opportunities ranged from no- to low-cost measures such as raising cooling set points and better airflow management, to more involved but cost-effective measures including server consolidation and virtualization, and dedicated cooling with economizers. We found that inefficiencies mainly resulted from organizational rather than technical issues. Because of the inherent space and resource limitations, the most effective measure is to operate servers through energy-efficient cloud-based services or well-managed larger data centers, rather than server rooms. Backup power requirement, and IT and cooling efficiency should be evaluated to minimize energy waste in the server space. Utility programs are instrumental in raising awareness and spreading technical knowledge on server operation, and the implementation of energy efficiency measures in small server rooms.

  20. What Certificates Should My Microsoft Exchange Server Have? - Nercenergy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    What Certificates Should My Microsoft Exchange Server Have? Much like any other network application, in order to secure the functionality and safety of Microsoft Exchange Servers, it's essential to adopt specific certificates. Due to the literally thousands, if not millions, of security threats bombarding your Exchange Server every day, these certificates ensure users have a safe messaging experience while simultaneously safeguarding your data and sensitive information from being intercepted.

  1. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  2. Covered Product Category: Enterprise Servers | Department of Energy

    Office of Environmental Management (EM)

    Enterprise Servers Covered Product Category: Enterprise Servers The Federal Energy Management Program (FEMP) provides acquisition guidance for enterprise servers, a product category covered by the ENERGY STAR program. Federal laws and requirements mandate that agencies buy ENERGY STAR-qualified products in all product categories covered by this program and any acquisition actions that are not specifically exempted by law. MEETING EFFICIENCY REQUIREMENTS FOR FEDERAL PURCHASES The U.S.

  3. 2014-02-21 Issuance: Proposed Determination of Computer Servers...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a Covered Consumer Product; Withdrawal 2014-02-21 Issuance: Proposed Determination of Computer Servers as a Covered Consumer Product; Withdrawal This document is a pre-publication...

  4. Evict on write, a management strategy for a prefetch unit and/or first level cache in a multiprocessor system with speculative execution

    DOE Patents [OSTI]

    Gara, Alan; Ohmacht, Martin

    2014-09-16

    In a multiprocessor system with at least two levels of cache, a speculative thread may run on a core processor in parallel with other threads. When the thread seeks to do a write to main memory, this access is to be written through the first level cache to the second level cache. After the write though, the corresponding line is deleted from the first level cache and/or prefetch unit, so that any further accesses to the same location in main memory have to be retrieved from the second level cache. The second level cache keeps track of multiple versions of data, where more than one speculative thread is running in parallel, while the first level cache does not have any of the versions during speculation. A switch allows choosing between modes of operation of a speculation blind first level cache.

  5. Sandia Text ANaLysis Extensible librarY Server

    Energy Science and Technology Software Center (OSTI)

    2006-05-11

    This is a server wrapper for STANLEY (Sandia Text ANaLysis Extensible librarY). STANLEY provides capabilities for analyzing, indexing and searching through text. STANLEY Server exposes this capability through a TCP/IP interface allowing third party applications and remote clients to access it.

  6. Simplifying and speeding the management of intra-node cache coherence

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Phillip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Yorktown Heights, NY)

    2012-04-17

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

  7. V-163: Red Hat Network Satellite Server Inter-Satellite Sync...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass May...

  8. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  9. V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache HTTP Server modrewrite and "httpOnly" Cookie Disclosure Vulnerabilities V-206: Apache HTTP Server modrewrite and "httpOnly" Cookie Disclosure Vulnerabilities July 30,...

  10. Managing storage en masse with a shared server

    SciTech Connect (OSTI)

    Platz, R.L.; Blackledge, R.C.; Hughes, J.H.

    1983-05-01

    Incorporating parallel processing, bit-slice technology, and queued instructions into mass storage control has a dramatic result. A single server can attend to several host processors while overseeing scores of storage peripherals.

  11. U-181: IBM WebSphere Application Server Information Disclosure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    or 8.0.0.4. Addthis Related Articles V-054: IBM WebSphere Application Server for zOS Arbitrary Command Execution Vulnerability U-272: IBM WebSphere Commerce User...

  12. Creating Large Scale Database Servers (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    access to such a large quantity of data through a database server is a daunting task. ... This paper will describe the design of the database and the changes that we needed to make ...

  13. How to secure your servers, code and data

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. Advice and best practices regarding the security of your servers, code and data will be presented. We will also describe how the Computer Security Team can help you reduce the risks.

  14. T-542: SAP Crystal Reports Server Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system.

  15. Comparing Server Energy Use and Efficiency Using Small Sample Sizes

    SciTech Connect (OSTI)

    Coles, Henry C.; Qin, Yong; Price, Phillip N.

    2014-11-01

    This report documents a demonstration that compared the energy consumption and efficiency of a limited sample size of server-type IT equipment from different manufacturers by measuring power at the server power supply power cords. The results are specific to the equipment and methods used. However, it is hoped that those responsible for IT equipment selection can used the methods described to choose models that optimize energy use efficiency. The demonstration was conducted in a data center at Lawrence Berkeley National Laboratory in Berkeley, California. It was performed with five servers of similar mechanical and electronic specifications; three from Intel and one each from Dell and Supermicro. Server IT equipment is constructed using commodity components, server manufacturer-designed assemblies, and control systems. Server compute efficiency is constrained by the commodity component specifications and integration requirements. The design freedom, outside of the commodity component constraints, provides room for the manufacturer to offer a product with competitive efficiency that meets market needs at a compelling price. A goal of the demonstration was to compare and quantify the server efficiency for three different brands. The efficiency is defined as the average compute rate (computations per unit of time) divided by the average energy consumption rate. The research team used an industry standard benchmark software package to provide a repeatable software load to obtain the compute rate and provide a variety of power consumption levels. Energy use when the servers were in an idle state (not providing computing work) were also measured. At high server compute loads, all brands, using the same key components (processors and memory), had similar results; therefore, from these results, it could not be concluded that one brand is more efficient than the other brands. The test results show that the power consumption variability caused by the key components as a group is similar to all other components as a group. However, some differences were observed. The Supermicro server used 27 percent more power at idle compared to the other brands. The Intel server had a power supply control feature called cold redundancy, and the data suggest that cold redundancy can provide energy savings at low power levels. Test and evaluation methods that might be used by others having limited resources for IT equipment evaluation are explained in the report.

  16. Three Elements to Remember When Establishing Your Microsoft Exchange Server

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    - Nercenergy Three Elements to Remember When Establishing Your Microsoft Exchange Server Microsoft Exchange Server is among the world's most popular email messaging and collaborative systems. Due to its advanced-level structuring, yet user-friendly interface, it's utilized by businesses and corporations of all sizes. While you may be familiar with Exchange, and perhaps you even utilize this service for your email communications, there are several elements you must remember while you

  17. A Survey Of Architectural Approaches for Managing Embedded DRAM and Non-volatile On-chip Caches

    SciTech Connect (OSTI)

    Mittal, Sparsh; Vetter, Jeffrey S; Li, Dong

    2014-01-01

    Recent trends of CMOS scaling and increasing number of on-chip cores have led to a large increase in the size of on-chip caches. Since SRAM has low density and consumes large amount of leakage power, its use in designing on-chip caches has become more challenging. To address this issue, researchers are exploring the use of several emerging memory technologies, such as embedded DRAM, spin transfer torque RAM, resistive RAM, phase change RAM and domain wall memory. In this paper, we survey the architectural approaches proposed for designing memory systems and, specifically, caches with these emerging memory technologies. To highlight their similarities and differences, we present a classification of these technologies and architectural approaches based on their key characteristics. We also briefly summarize the challenges in using these technologies for architecting caches. We believe that this survey will help the readers gain insights into the emerging memory device technologies, and their potential use in designing future computing systems.

  18. In-depth survey report: control technology for falling solids at Cincinnati Paint and Varnish, Cincinnati, Ohio

    SciTech Connect (OSTI)

    Heitbrink, W.A.

    1988-04-01

    A visit was made to the Cincinnati Paint and Varnish Company, Cincinnati, Ohio, to determine the effectiveness of control measures used to contain dust generated during the manufacturing of custom coatings. Dust arose when 50 pound bags of different powdered materials, titanium dioxide, talc, and crystalline silica, were emptied into 600-gallon mixing tanks by a worker. The worker slit the bags with a knife, lifted the bag, poured the contents into the mixer, and returned the empty bags to the floor. Exterior surfaces of the bags were dusty; handling them released some dust into the atmosphere. A slot hood was used to capture dust generated during the operation. Air velocity toward th slot hood along the lip of the tank where the bags were emptied ranged from 50 to 100 feet per minute. The total dust concentrations determined for crystalline silica during this operation averaged 3.0mg/cum. During a revisit to the site this worker's exposure was below 0.15mg/cum for a time-weighted average of less than 0.004 mg/m/sup 3/. The difference in liquid level in the tank at the time each powdered ingredient was added may have significantly affected the amount of dust released. Measurements of the actual process indicated that the silica had to fall almost 1 meter before reaching any liquid in the mixing tank whereas the talc had to fall only 25 centimeters.

  19. T-621: Citrix XenServer Lets Local Administrative Users on the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 -...

  20. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 -...

  1. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative...

  2. V-166: HP-UX Directory Server Discloses Passwords to Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May...

  3. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

  4. T-602: BlackBerry Enterprise Server Input Validation Flaw in...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation...

  5. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    server and command line utilities for server administration. Addthis Related Articles T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges V-041: Red Hat...

  6. U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability

    Broader source: Energy.gov [DOE]

    If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password.

  7. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  8. Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA, Information

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Resourses Management Division | Department of Energy SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management Division Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management Division Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management Division PDF icon Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management Division More Documents & Publications

  9. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  10. Vectorization, threading, and cache-blocking considerations for hydrocodes on emerging architectures

    SciTech Connect (OSTI)

    Fung, J.; Aulwes, R. T.; Bement, M. T.; Campbell, J. M.; Ferenbaugh, C. R.; Jean, B. A.; Kelley, T. M.; Kenamond, M. A.; Lally, B. R.; Lovegrove, E. G.; Nelson, E. M.; Powell, D. M.

    2015-07-14

    This work reports on considerations for improving computational performance in preparation for current and expected changes to computer architecture. The algorithms studied will include increasingly complex prototypes for radiation hydrodynamics codes, such as gradient routines and diffusion matrix assembly (e.g., in [1-6]). The meshes considered for the algorithms are structured or unstructured meshes. The considerations applied for performance improvements are meant to be general in terms of architecture (not specifically graphical processing unit (GPUs) or multi-core machines, for example) and include techniques for vectorization, threading, tiling, and cache blocking. Out of a survey of optimization techniques on applications such as diffusion and hydrodynamics, we make general recommendations with a view toward making these techniques conceptually accessible to the applications code developer. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  11. Vectorization, threading, and cache-blocking considerations for hydrocodes on emerging architectures

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Fung, J.; Aulwes, R. T.; Bement, M. T.; Campbell, J. M.; Ferenbaugh, C. R.; Jean, B. A.; Kelley, T. M.; Kenamond, M. A.; Lally, B. R.; Lovegrove, E. G.; et al

    2015-07-14

    This work reports on considerations for improving computational performance in preparation for current and expected changes to computer architecture. The algorithms studied will include increasingly complex prototypes for radiation hydrodynamics codes, such as gradient routines and diffusion matrix assembly (e.g., in [1-6]). The meshes considered for the algorithms are structured or unstructured meshes. The considerations applied for performance improvements are meant to be general in terms of architecture (not specifically graphical processing unit (GPUs) or multi-core machines, for example) and include techniques for vectorization, threading, tiling, and cache blocking. Out of a survey of optimization techniques on applications such asmore » diffusion and hydrodynamics, we make general recommendations with a view toward making these techniques conceptually accessible to the applications code developer. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.« less

  12. T-589: Citrix XenApp and Citrix Presentation Server Bug

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system.

  13. U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system.

  14. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  15. CASL L3 Report: Tally Server implementation in OpenMC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MCH.P6.03 Tally Server Implementation in OpenMC Paul K. Romano, B. Forget MIT October 24, 2013 CASL-U-2013-0215-000 CASL L3 Report: Tally Server implementation in OpenMC Paul K. Romano and B.Forget October 24, 2013 Abstract As part of POR-6, an L3 milestone was completed on the implementation of tally servers in OpenMC. In the present work, we make a number of refinements to a theoretical performance model of the tally server algorithm to better predict the performance of a realistic reactor

  16. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact

    Broader source: Energy.gov [DOE]

    A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service.

  17. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  18. CSU Final Report on the Math/CS Institute CACHE: Communication-Avoiding and Communication-Hiding at the Extreme Scale

    SciTech Connect (OSTI)

    Strout, Michelle

    2014-06-10

    The CACHE project entails researching and developing new versions of numerical algorithms that result in data reuse that can be scheduled in a communication avoiding way. Since memory accesses take more time than any computation and require the most power, the focus on turning data reuse into data locality is critical to improving performance and reducing power usage in scientific simulations. This final report summarizes the accomplishments at Colorado State University as part of the CACHE project.

  19. T-640: RSA Access Manager Server CVE-2011-0322 Update

    Broader source: Energy.gov [DOE]

    RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3 ?Security Hot fix # 6.0.4.60 for RSA Access Manager Server version 6.0.4 ?Security Hot fix # 6.1.2.08 for RSA Access Manager Server version 6.1.2 ?Security Hot fix # 6.1.3.05 for RSA Access Manager Server version 6.1.3

  20. Property:Building/SPBreakdownOfElctrcityUseKwhM2LargeComputersServers...

    Open Energy Info (EERE)

    Jump to: navigation, search This is a property of type String. Large computers servers Pages using the property "BuildingSPBreakdownOfElctrcityUseKwhM2LargeComp...

  1. 2014-02-21 Issuance: Proposed Determination of Computer Servers as a Covered Consumer Product; Withdrawal

    Broader source: Energy.gov [DOE]

    This document is a pre-publication Federal Register notice withdrawing the previously proposed determination that computer servers qualify as a covered product, as issued by the Deputy Assistant Secretary for Energy Efficiency on February 21, 2014.

  2. THE PHOTOMETRIC CLASSIFICATION SERVER FOR Pan-STARRS1

    SciTech Connect (OSTI)

    Saglia, R. P.; Bender, R.; Seitz, S.; Senger, R.; Snigula, J.; Phleps, S.; Wilman, D.; Tonry, J. L.; Burgett, W. S.; Chambers, K. C.; Heasley, J. N.; Kaiser, N.; Magnier, E. A.; Morgan, J. S.; Greisel, N.; Bailer-Jones, C. A. L.; Klement, R. J.; Rix, H.-W.; Smith, K.; Green, P. J.; and others

    2012-02-20

    The Pan-STARRS1 survey is obtaining multi-epoch imaging in five bands (g{sub P1} r{sub P1} i{sub P1} z{sub P1} y{sub P1}) over the entire sky north of declination -30 deg. We describe here the implementation of the Photometric Classification Server (PCS) for Pan-STARRS1. PCS will allow the automatic classification of objects into star/galaxy/quasar classes based on colors and the measurement of photometric redshifts for extragalactic objects, and will constrain stellar parameters for stellar objects, working at the catalog level. We present tests of the system based on high signal-to-noise photometry derived from the Medium-Deep Fields of Pan-STARRS1, using available spectroscopic surveys as training and/or verification sets. We show that the Pan-STARRS1 photometry delivers classifications and photometric redshifts as good as the Sloan Digital Sky Survey (SDSS) photometry to the same magnitude limits. In particular, our preliminary results, based on this relatively limited data set down to the SDSS spectroscopic limits, and therefore potentially improvable, show that stars are correctly classified as such in 85% of cases, galaxies in 97%, and QSOs in 84%. False positives are less than 1% for galaxies, Almost-Equal-To 19% for stars, and Almost-Equal-To 28% for QSOs. Moreover, photometric redshifts for 1000 luminous red galaxies up to redshift 0.5 are determined to 2.4% precision (defined as 1.48 Multiplication-Sign Median|z{sub phot} - z{sub spec}|/(1 + z)) with just 0.4% catastrophic outliers and small (-0.5%) residual bias. For bluer galaxies up to the same redshift, the residual bias (on average -0.5%) trend, percentage of catastrophic failures (1.2%), and precision (4.2%) are higher, but still interestingly small for many science applications. Good photometric redshifts (to 5%) can be obtained for at most 60% of the QSOs of the sample. PCS will create a value-added catalog with classifications and photometric redshifts for eventually many millions of sources.

  3. T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash.

  4. U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

  5. U-011: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco TelePresence Video Communication Server. A remote user can conduct cross-site scripting attacks.

  6. An RFC 1179 Compatible Remote Print Server for Windows 3.1

    Energy Science and Technology Software Center (OSTI)

    1993-11-09

    Internet RFC 1179 describes the protocol to be used for printing files on a remote printer in a TCP/IP network. The protocol is client/server, meaning that the client initiates the print request, and the server receives the request and performs the actual printing locally. This protocol has been in long use on Unix systems derived from the Berkeley Software Distribution, such as DEC''s Ultrix and Sun''s SunOS. LPD Services implements the server portion of thismore » protocol. It handles both the network communication and conformance with the protocol, and printing using the Microsoft Windows device independent printing interface.« less

  7. Report to Congress on Server and Data Center Energy Efficiency: Public Law 109-431: Appendices

    SciTech Connect (OSTI)

    Alliance to Save Energy; ICF Incorporated; ERG Incorporated; U.S. Environmental Protection Agency; Brown, Richard E; Brown, Richard; Masanet, Eric; Nordman, Bruce; Tschudi, Bill; Shehabi, Arman; Stanley, John; Koomey, Jonathan; Sartor, Dale; Chan, Peter; Loper, Joe; Capana, Steve; Hedman, Bruce; Duff, Rebecca; Haines, Evan; Sass, Danielle; Fanara, Andrew

    2007-08-02

    This report is the appendices to a companion report, prepared in response to the request from Congress stated in Public Law 109-431 (H.R. 5646),"An Act to Study and Promote the Use of Energy Efficient Computer Servers in the United States." This report assesses current trends in energy use and energy costs of data centers and servers in the U.S. (especially Federal government facilities) and outlines existing and emerging opportunities for improved energy efficiency. It also makes recommendations for pursuing these energy-efficiency opportunities broadly across the country through the use of information and incentive-based programs.

  8. Optimizing Parallel Access to the BaBar Database System Using CORBA Servers

    Office of Scientific and Technical Information (OSTI)

    (Technical Report) | SciTech Connect Optimizing Parallel Access to the BaBar Database System Using CORBA Servers Citation Details In-Document Search Title: Optimizing Parallel Access to the BaBar Database System Using CORBA Servers The BaBar Experiment collected around 20 TB of data during its first 6 months of running. Now, after 18 months, data size exceeds 300 TB, and according to prognosis, it is a small fraction of the size of data coming in the next few months. In order to keep up with

  9. Optimizing Parallel Access to the BaBar Database System Using CORBA Servers

    Office of Scientific and Technical Information (OSTI)

    (Technical Report) | SciTech Connect Optimizing Parallel Access to the BaBar Database System Using CORBA Servers Citation Details In-Document Search Title: Optimizing Parallel Access to the BaBar Database System Using CORBA Servers × You are accessing a document from the Department of Energy's (DOE) SciTech Connect. This site is a product of DOE's Office of Scientific and Technical Information (OSTI) and is provided as a public service. Visit OSTI to utilize additional information resources

  10. From: Sells_List_Server%DOELNC@DOE.GOV Subject: YELLOW/Caution: Unattended Laboratory Heating Equipment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wed, 08 Jan 2003 14:50:55 -0500 From: Sells_List_Server%DOELNC@DOE.GOV Subject: YELLOW/Caution: Unattended Laboratory Heating Equipment Sender: ListServer@HQLNC.DOE.GOV Title: Yellow Alert- Unattended Laboratory Heating Equipment Date: 1/2/03 Identifier: LL-2002-LLNL-30 Lessons Learned Summary: Two recent events at an LLNL facility illustrate once again that small electrical heating sources should be monitored while in use. Discussion of Activities: In the first LLNL incident, plastic bottles of

  11. Report to Congress on Server and Data Center Energy Efficiency: Public Law 109-431

    SciTech Connect (OSTI)

    Alliance to Save Energy; ICF Incorporated; ERG Incorporated; U.S. Environmental Protection Agency; Brown, Richard E; Brown, Richard; Masanet, Eric; Nordman, Bruce; Tschudi, Bill; Shehabi, Arman; Stanley, John; Koomey, Jonathan; Sartor, Dale; Chan, Peter; Loper, Joe; Capana, Steve; Hedman, Bruce; Duff, Rebecca; Haines, Evan; Sass, Danielle; Fanara, Andrew

    2007-08-02

    This report was prepared in response to the request from Congress stated in Public Law 109-431 (H.R. 5646),"An Act to Study and Promote the Use of Energy Efficient Computer Servers in the United States." This report assesses current trends in energy use and energy costs of data centers and servers in the U.S. (especially Federal government facilities) and outlines existing and emerging opportunities for improved energy efficiency. It also makes recommendations for pursuing these energy-efficiency opportunities broadly across the country through the use of information and incentive-based programs.

  12. Solid waste information and tracking system server conversion project management plan

    SciTech Connect (OSTI)

    MAY, D.L.

    1999-04-12

    The Project Management Plan governing the conversion of Solid Waste Information and Tracking System (SWITS) to a client-server architecture. The Solid Waste Information and Tracking System Project Management Plan (PMP) describes the background, planning and management of the SWITS conversion. Requirements and specification documentation needed for the SWITS conversion will be released as supporting documents.

  13. Index of /datasets/files/41/pub/PUBID8_0332

    Open Energy Info (EERE)

    Apr-2012 11:07 - DIR MaxTech 18-Apr-2012 11:07 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 979859487 Varnish cache...

  14. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions.

  15. Mitigation of cache memory using an embedded hard-core PPC440 processor in a Virtex-5 Field Programmable Gate Array.

    SciTech Connect (OSTI)

    Learn, Mark Walter

    2010-02-01

    Sandia National Laboratories is currently developing new processing and data communication architectures for use in future satellite payloads. These architectures will leverage the flexibility and performance of state-of-the-art static-random-access-memory-based Field Programmable Gate Arrays (FPGAs). One such FPGA is the radiation-hardened version of the Virtex-5 being developed by Xilinx. However, not all features of this FPGA are being radiation-hardened by design and could still be susceptible to on-orbit upsets. One such feature is the embedded hard-core PPC440 processor. Since this processor is implemented in the FPGA as a hard-core, traditional mitigation approaches such as Triple Modular Redundancy (TMR) are not available to improve the processor's on-orbit reliability. The goal of this work is to investigate techniques that can help mitigate the embedded hard-core PPC440 processor within the Virtex-5 FPGA other than TMR. Implementing various mitigation schemes reliably within the PPC440 offers a powerful reconfigurable computing resource to these node-based processing architectures. This document summarizes the work done on the cache mitigation scheme for the embedded hard-core PPC440 processor within the Virtex-5 FPGAs, and describes in detail the design of the cache mitigation scheme and the testing conducted at the radiation effects facility on the Texas A&M campus.

  16. Recovery Act: SeaMicro Volume Server Power Reduction Research Development

    SciTech Connect (OSTI)

    Gary Lauterbach

    2012-03-22

    Cloud data centers are projected to be the fastest growing segment of the server market through 2015, according to IDC. Increasingly people and businesses rely on the Cloud to deliver digital content quickly and efficiently. Recovery Act funding from the Department of Energy has helped SeaMicro's technologies enhance the total cost of operation, performance and energy efficiency in large data center and Cloud environments. SeaMicro's innovative supercomputer fabric connects thousands of processor cores, memory, storage and input/output traffic. The company's fabric supports multiple processor instruction sets. Current systems featuring SeaMicro technology typically use one quarter the power and take one sixth the space of traditional servers with the same compute performance, yet deliver up to 12 times the bandwidth per core. Mozilla and eHarmony are two customers successfully using SeaMicro's technology. Numerous non-public customers have been successfully using the SeaMicro product in test and production facilities. As a result of the Recovery Act funding from the U.S. Department of Energy, more than 50 direct jobs were created at SeaMicro. To date, they primarily have been high-value, engineering jobs. Hardware, software and manufacturing engineering positions have been created, as well as sales and sales engineering. The positions have allowed SeaMicro to significantly accelerate engineering development and accelerate commercialization. As a result, commercialization and delivery to market are months ahead of initial schedule. Additional jobs were indirectly created through the development of the SeaMicro product. Through many years of research and hard work prior to receipt of public funding, SeaMicro was awarded 2 patents for its work. SeaMicro's product led the way for industry leaders to reconsider the market for low power servers and create new product lines. With valuable support of the U.S. Department of Energy and through SeaMicro's product, the market has been reshaped by the company's unique approach and ground breaking technology.

  17. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  18. From: Sells_List_Server%DOELNC@DOE.GOV Subject: YELLOW/Caution: Hazards from Modifying Finished Products

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    07 Jan 2003 15:55:12 -0500 From: Sells_List_Server%DOELNC@DOE.GOV Subject: YELLOW/Caution: Hazards from Modifying Finished Products Sender: ListServer@HQLNC.DOE.GOV Title: Yellow Alert- Hazards from Modifying Finished Products Date: 1/2/2003 Identifier: LL-2002-LLNL-31 Lessons Learned Summary: It is important to identify any hazards involved with the modification of a "finished" commercial product. Discussion of Activities: Finished products do not require a label for material hazards

  19. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1996-08-06

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  20. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1997-12-09

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  1. Solid waste information and tracking system client-server conversion project management plan

    SciTech Connect (OSTI)

    May, D.L.

    1998-04-15

    This Project Management Plan is the lead planning document governing the proposed conversion of the Solid Waste Information and Tracking System (SWITS) to a client-server architecture. This plan presents the content specified by American National Standards Institute (ANSI)/Institute of Electrical and Electronics Engineers (IEEE) standards for software development, with additional information categories deemed to be necessary to describe the conversion fully. This plan is a living document that will be reviewed on a periodic basis and revised when necessary to reflect changes in baseline design concepts and schedules. This PMP describes the background, planning and management of the SWITS conversion. It does not constitute a statement of product requirements. Requirements and specification documentation needed for the SWITS conversion will be released as supporting documents.

  2. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1999-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  3. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1996-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  4. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1997-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  5. Web servers and services for electrostatics calculations with APBS and PDB2PQR

    SciTech Connect (OSTI)

    Unni, Samir; Huang, Yong; Hanson, Robert M.; Tobias, Malcolm; Krishnan, Sriram; Li, Wilfred; Nielsen, Jens E.; Baker, Nathan A.

    2011-04-02

    APBS and PDB2PQR are widely utilized free software packages for biomolecular electrostatics calculations. Using the Opal toolkit, we have developed a web services framework for these software packages that enables the use of APBS and PDB2PQR by users who do not have local access to the necessary amount of computational capabilities. This not only increases accessibility of the software to a wider range of scientists, educators, and students but it also increases the availability of electrostatics calculations on portable computing platforms. Users can access this new functionality in two ways. First, an Opal-enabled version of APBS is provided in current distributions, available freely on the web. Second, we have extended the PDB2PQR web server to provide an interface for the setup, execution, and visualization electrostatics potentials as calculated by APBS. This web interface also uses the Opal framework which ensures the scalability needed to support the large APBS user community. Both of these resources are available from the APBS/PDB2PQR website: http://www.poissonboltzmann.org/.

  6. The FELICIA bulletin board system and the IRBIS anonymous FTP server: Computer security information sources for the DOE community. CIAC-2302

    SciTech Connect (OSTI)

    Orvis, W.J.

    1993-11-03

    The Computer Incident Advisory Capability (CIAC) operates two information servers for the DOE community, FELICIA (formerly FELIX) and IRBIS. FELICIA is a computer Bulletin Board System (BBS) that can be accessed by telephone with a modem. IRBIS is an anonymous ftp server that can be accessed on the Internet. Both of these servers contain all of the publicly available CIAC, CERT, NIST, and DDN bulletins, virus descriptions, the VIRUS-L moderated virus bulletin board, copies of public domain and shareware virus- detection/protection software, and copies of useful public domain and shareware utility programs. This guide describes how to connect these systems and obtain files from them.

  7. T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

  8. Protein Sequence Annotation Tool (PSAT): A centralized web-based meta-server for high-throughput sequence annotations

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Leung, Elo; Huang, Amy; Cadag, Eithon; Montana, Aldrin; Soliman, Jan Lorenz; Zhou, Carol L. Ecale

    2016-01-20

    In this study, we introduce the Protein Sequence Annotation Tool (PSAT), a web-based, sequence annotation meta-server for performing integrated, high-throughput, genome-wide sequence analyses. Our goals in building PSAT were to (1) create an extensible platform for integration of multiple sequence-based bioinformatics tools, (2) enable functional annotations and enzyme predictions over large input protein fasta data sets, and (3) provide a web interface for convenient execution of the tools. In this paper, we demonstrate the utility of PSAT by annotating the predicted peptide gene products of Herbaspirillum sp. strain RV1423, importing the results of PSAT into EC2KEGG, and using the resultingmore » functional comparisons to identify a putative catabolic pathway, thereby distinguishing RV1423 from a well annotated Herbaspirillum species. This analysis demonstrates that high-throughput enzyme predictions, provided by PSAT processing, can be used to identify metabolic potential in an otherwise poorly annotated genome. Lastly, PSAT is a meta server that combines the results from several sequence-based annotation and function prediction codes, and is available at http://psat.llnl.gov/psat/. PSAT stands apart from other sequencebased genome annotation systems in providing a high-throughput platform for rapid de novo enzyme predictions and sequence annotations over large input protein sequence data sets in FASTA. PSAT is most appropriately applied in annotation of large protein FASTA sets that may or may not be associated with a single genome.« less

  9. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server

    Broader source: Energy.gov [DOE]

    BlackBerry advisory describes a security issue that the BlackBerry Attachment Service component of the BlackBerry Enterprise Server is susceptible to. The issue relates to a known vulnerability in the PDF distiller component of the BlackBerry Attachment Service that affects how the BlackBerry Attachment Service processes PDF files.

  10. HPSS Disk Cache Upgrade Caters to Capacity

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2015 Contact: Kathy Kincade, +1 510 495 2124, kkincade@lbl.gov HPSS 09 vert NERSC users today are benefiting from a business decision made three years ago by the center's Storage...

  11. Eager protocol on a cache pipeline dataflow

    DOE Patents [OSTI]

    Ohmacht, Martin; Sugavanam, Krishnan

    2012-11-13

    A master device sends a request to communicate with a slave device to a switch. The master device waits for a period of cycles the switch takes to decide whether the master device can communicate with the slave device, and the master device sends data associated with the request to communicate at least after the period of cycles has passed since the master device sent the request to communicate to the switch without waiting to receive an acknowledgment from the switch that the master device can communicate with the slave device.

  12. Pageflex Server [document: PF4577458_00001]

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protect your vision with VSP. Get the best in eyecare and eyewear with Los Alamos National Labs and VSP ® Vision Care. At VSP, we invest in the things you value most-the best care at the lowest out-of-pocket costs. Because we're the only national not-for-profit vision care company, you can trust that we'll always put your wellness first. You'll like what you see with VSP. * Value and Savings. You'll enjoy more value and the lowest out-of-pocket costs. * High Quality Vision Care. You'll get the

  13. SeaMicro Volume Server Power Reduction

    Broader source: Energy.gov [DOE]

    Fact sheet about saving 75% of computing energy through an inter-connected array of low-power central processing units

  14. Aggregation server for grid-integrated vehicles

    DOE Patents [OSTI]

    Kempton, Willett

    2015-05-26

    Methods, systems, and apparatus for aggregating electric power flow between an electric grid and electric vehicles are disclosed. An apparatus for aggregating power flow may include a memory and a processor coupled to the memory to receive electric vehicle equipment (EVE) attributes from a plurality of EVEs, aggregate EVE attributes, predict total available capacity based on the EVE attributes, and dispatch at least a portion of the total available capacity to the grid. Power flow may be aggregated by receiving EVE operational parameters from each EVE, aggregating the received EVE operational parameters, predicting total available capacity based on the aggregated EVE operational parameters, and dispatching at least a portion of the total available capacity to the grid.

  15. Pageflex Server [document: PF4577458_00001

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    You'll enjoy more value and the lowest out-of-pocket costs. * High Quality Vision Care. You'll get the best care from a VSP provider, including a WellVision Exam -the most...

  16. Pageflex Server [document: PR5018074_00001

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    when you see a VSP doctor. Diabetic EyeCare Annual eye exams can help prevent diabetes-related blindness. If you have type 1 or type 2 diabetes, you can get both your...

  17. Pageflex Server [document: PF1888317_00001

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    when you see a VSP provider. Diabetic EyeCare Annual eye exams can help prevent diabetes related blindness. If you have type 1 or type 2 diabetes, you can get both your...

  18. Data Centers and Servers | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the quick-start guide. Identify opportunities for improvement in your data center by reading about these 12 strategies to save energy in data centers. Learn about the top...

  19. SeaMicro Volume Server Power Reduction

    SciTech Connect (OSTI)

    2011-05-31

    Fact sheet about saving 75% of computing energy through an inter-connected array of low-power central processing units.

  20. Method and structure for cache aware transposition via rectangular...

    Office of Scientific and Technical Information (OSTI)

    OSTI Identifier: 1118260 Report Number(s): 8,645,447 11035,933 DOE Contract Number: B517552 Resource Type: Patent Research Org: International Business Machines Corporation, ...

  1. Method and structure for cache aware transposition via rectangular subsections

    DOE Patents [OSTI]

    Gustavson, Fred Gehrung; Gunnels, John A

    2014-02-04

    A method and structure for transposing a rectangular matrix A in a computer includes subdividing the rectangular matrix A into one or more square submatrices and executing an in-place transposition for each of the square submatrices A.sub.ij.

  2. Constant time worker thread allocation via configuration caching...

    Office of Scientific and Technical Information (OSTI)

    Mechanisms are provided for allocating threads for execution of a parallel region of code. A request for allocation of worker threads to execute the parallel region of code is ...

  3. Checkpointing in speculative versioning caches (Patent) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    first condition has occurred. Authors: Eichenberger, Alexandre E ; Gara, Alan ; Gschwind, Michael K ; Ohmacht, Martin Publication Date: 2013-08-27 OSTI Identifier: 1093267 Report...

  4. Horizontally scaling dChache SRM with the Terracotta platform

    SciTech Connect (OSTI)

    Perelmutov, T.; Crawford, M.; Moibenko, A.; Oleynik, G.; /Fermilab

    2011-01-01

    The dCache disk caching file system has been chosen by a majority of LHC experiments Tier 1 centers for their data storage needs. It is also deployed at many Tier 2 centers. The Storage Resource Manager (SRM) is a standardized grid storage interface and a single point of remote entry into dCache, and hence is a critical component. SRM must scale to increasing transaction rates and remain resilient against changing usage patterns. The initial implementation of the SRM service in dCache suffered from an inability to support clustered deployment, and its performance was limited by the hardware of a single node. Using the Terracotta platform, we added the ability to horizontally scale the dCache SRM service to run on multiple nodes in a cluster configuration, coupled with network load balancing. This gives site administrators the ability to increase the performance and reliability of SRM service to face the ever-increasing requirements of LHC data handling. In this paper we will describe the previous limitations of the architecture SRM server and how the Terracotta platform allowed us to readily convert single node service into a highly scalable clustered application.

  5. Web Application Design Using Server-Side JavaScript

    SciTech Connect (OSTI)

    Hampton, J.; Simons, R.

    1999-02-01

    This document describes the application design philosophy for the Comprehensive Nuclear Test Ban Treaty Research & Development Web Site. This design incorporates object-oriented techniques to produce a flexible and maintainable system of applications that support the web site. These techniques will be discussed at length along with the issues they address. The overall structure of the applications and their relationships with one another will also be described. The current problems and future design changes will be discussed as well.

  6. Design and operation of the high energy physics information server

    SciTech Connect (OSTI)

    Dingbaum, J.J.; Martin, D.E.

    1994-12-31

    HEPIC an information {open_quotes}center of centers{close_quotes} for the HEP community, is a 24 hour online location where a HEP researcher can start her/his search for information. Operated by the HEP Network Research Center, HEPIC is accessible via WWW, gopher, anonymous FTP, DECnet, and AFS. This paper describes HEPIC`s design and future plans, and the HEPNRC`s efforts to collect information and link high energy physics researchers world-wide.

  7. U-139: IBM Tivoli Directory Server Input Validation Flaw

    Broader source: Energy.gov [DOE]

    The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input.

  8. OROSharePoint(MicrosoftSHarePointServer)PIA.pdf

    Energy Savers [EERE]

  9. Metagenomes from Argonne's MG-RAST Metagenomics Analysis Server

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    MG-RAST has a large number of datasets that researchers have deposited for public use. As of July, 2014, the number of metagenomes represented by MG-RAST numbered more than 18,500, and the number of available sequences was more than 75 million! The public can browse the collection several different ways, and researchers can login to deposit new data. Researchers have the choice of keeping a dataset private so that it is viewable only by them when logged in, or they can choose to make a dataset public at any time with a simple click of a link. MG-RAST was launched in 2007 by the Mathematics and Computer Science Division at Argonne National Laboratory (ANL). It is part of the toolkit available to the Terragenomics project, which seeks to do a comprehensive metagenomics study of U.S. soil. The Terragenomics project page is located at http://www.mcs.anl.gov/research/projects/terragenomics/.

  10. Creating Large Scale Database Servers (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Research Org: Stanford Linear Accelerator Center, Menlo Park, CA (US) Sponsoring Org: USDOE Office of Energy Research (ER) (US) Country of Publication: United States Language: ...

  11. FY08 LDRD Final Report LOCAL: Locality-Optimizing Caching Algorithms and Layouts

    SciTech Connect (OSTI)

    Lindstrom, P

    2009-02-27

    This project investigated layout and compression techniques for large, unstructured simulation data to reduce bandwidth requirements and latency in simulation I/O and subsequent post-processing, e.g. data analysis and visualization. The main goal was to eliminate the data-transfer bottleneck - for example, from disk to memory and from central processing unit to graphics processing unit - through coherent data access and by trading underutilized compute power for effective bandwidth and storage. This was accomplished by (1) designing algorithms that both enforce and exploit compactness and locality in unstructured data, and (2) adapting offline computations to a novel stream processing framework that supports pipelining and low-latency sequential access to compressed data. This report summarizes the techniques developed and results achieved, and includes references to publications that elaborate on the technical details of these methods.

  12. Monitoring jobs with qs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Jobs » Monitoring jobs with qs Monitoring jobs with qs qs is an alternative tool to the SGE-provided qstat for querying the queue status developed at NERSC. qs provides an enhanced user interface designed to make it easier to see resource requests, utilization, and job position in the queue. qs provides a centralized web-service that can be queried using either the provided "qs" client, or by HTTP connection to the qs server. qs reports data from a cached copy of the genepool UGE

  13. Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA,...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Occupational Injury & Illness System (01&15) PIA, Idaho National Laboratory Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine ...

  14. Data Transfer Software-SAS MetaData Server & Phoenix Integration Model Center

    Energy Science and Technology Software Center (OSTI)

    2010-04-15

    This software is a plug-in that interfaces between the Phoenix Integration's Model Center and the Base SAS 9.2 applications. The end use of the plug-in is to link input and output data that resides in SAS tables or MS SQL to and from "legacy" software programs without recoding. The potential end users are users who need to run legacy code and want data stored in a SQL database.

  15. U-253: Citrix XenServer Denial of Service and Privilege Escalation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LINKS: Citrix Document ID: CTX134708 Secunia Advisory SA50530 Bugtraq ID: 55432 CVE-2012-3432 CVE-2012-3433 CVE-2012-3494 CVE-2012-3495 CVE-2012-3496 CVE-2012-3498...

  16. T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service

    Broader source: Energy.gov [DOE]

    A local administrative user on a guest operating system can interrupt the normal operation of the target hypervisor.

  17. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  18. Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA,...

    Energy Savers [EERE]

    PIA, Idaho National Laboratory Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory...

  19. U-181: IBM WebSphere Application Server Information Disclosure Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to missing access controls in the Application Snoop Servlet when handling requests and can be exploited to disclose request and client information.

  20. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  1. Version pressure feedback mechanisms for speculative versioning...

    Office of Scientific and Technical Information (OSTI)

    accessing cache lines of the speculative versioning cache. One or more statistical measures of version pressure are generated based on the collected raw version pressure data. A...

  2. CEPH viewer: A client-server database to browse and manipulate CEPH physical mapping and linkage data

    SciTech Connect (OSTI)

    Nadkarni, P.M.; Bray-Ward, P.

    1995-01-01

    With their announcement of the first high-level physical map of the human genome, the Center for Study of Human Polymorphisms (CEPH) made the supporting data on the clones in their mega-YAC library and their linkage markers publicly available through anonymous ftp. Individual researchers as well as genome centers now need to constantly reference this voluminous body of data that, as of May 9, 1994, held information on approximately 4000 STSs, 33,500 YACs, 17,600 STS-YAC associations, 87,400 YAC-YAC associations based on Alu-PCR analysis, and 99,000 YAC-YAC associations based on a combination of fingerprint and Alu-PCR data, in addition to 6 sets of fingerprints for each YAC and a total of 1.5 million fingerprint fragments for all YACs. 2 refs., 1 fig.

  3. T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

  4. A Faster Parallel Algorithm and Efficient Multithreaded Implementations for Evaluating Betweenness Centrality on Massive Datasets

    SciTech Connect (OSTI)

    Madduri, Kamesh; Ediger, David; Jiang, Karl; Bader, David A.; Chavarria-Miranda, Daniel

    2009-02-15

    We present a new lock-free parallel algorithm for computing betweenness centralityof massive small-world networks. With minor changes to the data structures, ouralgorithm also achieves better spatial cache locality compared to previous approaches. Betweenness centrality is a key algorithm kernel in HPCS SSCA#2, a benchmark extensively used to evaluate the performance of emerging high-performance computing architectures for graph-theoretic computations. We design optimized implementations of betweenness centrality and the SSCA#2 benchmark for two hardware multithreaded systems: a Cray XMT system with the Threadstorm processor, and a single-socket Sun multicore server with the UltraSPARC T2 processor. For a small-world network of 134 million vertices and 1.073 billion edges, the 16-processor XMT system and the 8-core Sun Fire T5120 server achieve TEPS scores (an algorithmic performance count for the SSCA#2 benchmark) of 160 million and 90 million respectively, which corresponds to more than a 2X performance improvement over the previous parallel implementations. To better characterize the performance of these multithreaded systems, we correlate the SSCA#2 performance results with data from the memory-intensive STREAM and RandomAccess benchmarks. Finally, we demonstrate the applicability of our implementation to analyze massive real-world datasets by computing approximate betweenness centrality for a large-scale IMDb movie-actor network.

  5. List based prefetch

    DOE Patents [OSTI]

    Boyle, Peter; Christ, Norman; Gara, Alan; Kim, Changhoan; Mawhinney, Robert; Ohmacht, Martin; Sugavanam, Krishnan

    2014-08-12

    A list prefetch engine improves a performance of a parallel computing system. The list prefetch engine receives a current cache miss address. The list prefetch engine evaluates whether the current cache miss address is valid. If the current cache miss address is valid, the list prefetch engine compares the current cache miss address and a list address. A list address represents an address in a list. A list describes an arbitrary sequence of prior cache miss addresses. The prefetch engine prefetches data according to the list, if there is a match between the current cache miss address and the list address.

  6. List based prefetch

    DOE Patents [OSTI]

    Boyle, Peter (Edinburgh, GB); Christ, Norman (Irvington, NY); Gara, Alan (Yorktown Heights, NY); Kim; ,Changhoan (San Jose, CA); Mawhinney, Robert (New York, NY); Ohmacht, Martin (Yorktown Heights, NY); Sugavanam, Krishnan (Yorktown Heights, NY)

    2012-08-28

    A list prefetch engine improves a performance of a parallel computing system. The list prefetch engine receives a current cache miss address. The list prefetch engine evaluates whether the current cache miss address is valid. If the current cache miss address is valid, the list prefetch engine compares the current cache miss address and a list address. A list address represents an address in a list. A list describes an arbitrary sequence of prior cache miss addresses. The prefetch engine prefetches data according to the list, if there is a match between the current cache miss address and the list address.

  7. Comanche County, Oklahoma: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    Oklahoma Cache, Oklahoma Chattanooga, Oklahoma Elgin, Oklahoma Faxon, Oklahoma Fletcher, Oklahoma Geronimo, Oklahoma Indiahoma, Oklahoma Lawton, Oklahoma Medicine Park,...

  8. San

    Office of Environmental Management (EM)

    (ESRI) software * Dedicated server for repository for all raw geospatial data * ArcGIS for server enterprise concurrent license as platform to network servers * ArcGIS...

  9. Energy Conservation Program for Consumer Products and Certain Commercial and Industrial Equipment: Proposed Determination of Computer Servers as a Covered Consumer Product, EERE-2013-BT-DET-0034

    Broader source: Energy.gov [DOE]

    Pursuant to the guidance issued by the Office of General Counsel in its Notice of Guidance on Ex Parte Communications, 74 F.R. 197, this memorandum summarizes a November 22, 2013 meeting between...

  10. T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The BlackBerry Web Desktop Manager not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the BlackBerry Web Desktop Manager software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  11. Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XML-RPC server accepts POST requests only.

  12. Motivation and Design of the Sirocco Storage System Version 1.0.

    SciTech Connect (OSTI)

    Curry, Matthew Leon; Ward, H. Lee; Danielson, Geoffrey Charles

    2015-07-01

    Sirocco is a massively parallel, high performance storage system for the exascale era. It emphasizes client-to-client coordination, low server-side coupling, and free data movement to improve resilience and performance. Its architecture is inspired by peer-to-peer and victim- cache architectures. By leveraging these ideas, Sirocco natively supports several media types, including RAM, flash, disk, and archival storage, with automatic migration between levels. Sirocco also includes storage interfaces and support that are more advanced than typical block storage. Sirocco enables clients to efficiently use key-value storage or block-based storage with the same interface. It also provides several levels of transactional data updates within a single storage command, including full ACID-compliant updates. This transaction support extends to updating several objects within a single transaction. Further support is provided for con- currency control, enabling greater performance for workloads while providing safe concurrent modification. By pioneering these and other technologies and techniques in the storage system, Sirocco is poised to fulfill a need for a massively scalable, write-optimized storage system for exascale systems. This is version 1.0 of a document reflecting the current and planned state of Sirocco. Further versions of this document will be accessible at http://www.cs.sandia.gov/Scalable_IO/ sirocco .

  13. Conditional load and store in a shared memory

    DOE Patents [OSTI]

    Blumrich, Matthias A; Ohmacht, Martin

    2015-02-03

    A method, system and computer program product for implementing load-reserve and store-conditional instructions in a multi-processor computing system. The computing system includes a multitude of processor units and a shared memory cache, and each of the processor units has access to the memory cache. In one embodiment, the method comprises providing the memory cache with a series of reservation registers, and storing in these registers addresses reserved in the memory cache for the processor units as a result of issuing load-reserve requests. In this embodiment, when one of the processor units makes a request to store data in the memory cache using a store-conditional request, the reservation registers are checked to determine if an address in the memory cache is reserved for that processor unit. If an address in the memory cache is reserved for that processor, the data are stored at this address.

  14. Index of /datasets/files/41/pub/PUBID8_3941

    Open Energy Info (EERE)

    Exist 22-May-2012 01:04 - DIR MaxTech 22-May-2012 01:04 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 1006824916 Varnish...

  15. Index of /datasets/files/41/pub/PUBID8_0001/Exist

    Open Energy Info (EERE)

    Size DIR Parent Directory - DIR Sim1 18-Apr-2012 11:06 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 653191375 Varnish...

  16. Index of /datasets/files/41/pub/PUBID8_1506

    Open Energy Info (EERE)

    Exist 21-May-2012 23:49 - DIR MaxTech 21-May-2012 23:49 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 1006824909 Varnish...

  17. Index of /datasets/files/41/pub/PUBID8_0001/MaxTech

    Open Energy Info (EERE)

    Size DIR Parent Directory - DIR Sim1 18-Apr-2012 11:06 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 653191376 Varnish...

  18. Index of /datasets/files/41/pub/PUBID8_5935

    Open Energy Info (EERE)

    is a file-level view of datasets. Go back to Datasets Listing 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 1863489907 Varnish...

  19. Store-operate-coherence-on-value

    DOE Patents [OSTI]

    Chen, Dong; Heidelberger, Philip; Kumar, Sameer; Ohmacht, Martin; Steinmacher-Burow, Burkhard

    2014-11-18

    A system, method and computer program product for performing various store-operate instructions in a parallel computing environment that includes a plurality of processors and at least one cache memory device. A queue in the system receives, from a processor, a store-operate instruction that specifies under which condition a cache coherence operation is to be invoked. A hardware unit in the system runs the received store-operate instruction. The hardware unit evaluates whether a result of the running the received store-operate instruction satisfies the condition. The hardware unit invokes a cache coherence operation on a cache memory address associated with the received store-operate instruction if the result satisfies the condition. Otherwise, the hardware unit does not invoke the cache coherence operation on the cache memory device.

  20. PowerPoint Presentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... CLEARWATER RESERVOIR MISSOURI ARKANSAS Lock and Dam No 1 10 CACHE RIVER LEGEND EXISTING ... Little Rock District, Southwestern Division Pine Mountain Dam * Authorized in 1965 and ...

  1. Microsoft PowerPoint - SWL HPConf2015.pptx [Read-Only

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CLEARWATER RESERVOIR MISSOURI ARKANSAS Lock and Dam No 1 10 CACHE RIVER LEGEND EXISTING ... M&I Water Supply Reallocation Studies Beaver Lake * Completed Studies * Beaver Dam Trout ...

  2. ORISE: CHEMPACK Mapping Application | How ORISE is Making a Difference

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Centers for Disease Control and Prevention's (CDC) CHEMPACK program in keeping track of nerve antidote cache sites and containers. CHEMPACK, a component of the federal Strategic...

  3. PDF Document (5127k)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Whatcom Spokane Marion Clackamas Clatsop Garfield Snohomish King Malheur Cache Rich Weber Box Elder Yellowstone Beaverhead Garfield Fergus Liberty Chouteau Stillwater Hill...

  4. IOR

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    underlying disk subsystem. Procedures for adjusting IOR benchmark script parameters to reduce memory-caching effects will be provided later in the document. Required Runs IOR...

  5. S13: HPC Archive Solutions Made Simple

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on the following topics: tape libraries, tape drives, disk cache, HSM, data movers, migration, data recall, storage policies, tape pools, tape compaction, tape striping, archive...

  6. Bulk Data Mover

    Energy Science and Technology Software Center (OSTI)

    2011-01-03

    Bulk Data Mover (BDM) is a high-level data transfer management tool. BDM handles the issue of large variance in file sizes and a big portion of small files by managing the file transfers with optimized transfer queue and concurrency management algorithms. For example, climate simulation data sets are characterized by large volume of files with extreme variance in file sizes. The BDN achieves high performance using a variety of techniques, including multi-thraded concurrent transfer connections,more » data channel caching, load balancing over multiple transfer servers, and storage i/o pre-fetching. Logging information from the BDM is collected and analyzed to study the effectiveness of the transfer management algorithms. The BDM can accept a request composed of multiple files or an entire directory. The request also contains the target site and directory where the replicated files will reside. If a directory is provided at the source, then the BDM will replicate the structure of the source directory at the target site. The BDM is capable of transferring multiple files concurrently as well as using parallel TCP streams. The optimal level of concurrency or parallel streams depends on the bandwidth capacity of the storage systems at both ends of the transfer as well as achievable bandwidth of the wide-area network. Hardware req.-PC, MAC, Multi-platform & Workstation; Software req.: Compile/version-Java 1.50_x or ablove; Type of files: source code, executable modules, installation instructions other, user guide; URL: http://sdm.lbl.gov/bdm/« less

  7. Scalla: Structured Cluster Architecture for Low Latency Access

    SciTech Connect (OSTI)

    Hanushevsky, Andrew; Wang, Daniel L.; /SLAC

    2012-03-20

    Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.

  8. gridFTP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    GSI enabled pftp server. Data transfers are multi-threaded but are handled with a single FTP server. Improvements are planned for the future. The pftp server handling GridFTP...

  9. Nercenergy Web Application Development

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Three Elements to Remember When Establishing Your Microsoft Exchange Server http:www.nercenergy.comthree-elements-to-remember-when-establishing-your-microsoft-exchange-server...

  10. U-011: Cisco Security Response: Cisco TelePresence Video Communication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability U-011: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site ...

  11. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  12. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  13. ARM - Facility News Article

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Share Recently, several new Sun servers joined the production system at the ARM Data Management Facility (DMF). These servers provide much needed cpu-the Central Processing...

  14. T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash.

  15. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server. PLATFORM: * BlackBerry Enterprise Server Express version...

  16. Ordering of guarded and unguarded stores for no-sync I/O

    DOE Patents [OSTI]

    Gara, Alan; Ohmacht, Martin

    2013-06-25

    A parallel computing system processes at least one store instruction. A first processor core issues a store instruction. A first queue, associated with the first processor core, stores the store instruction. A second queue, associated with a first local cache memory device of the first processor core, stores the store instruction. The first processor core updates first data in the first local cache memory device according to the store instruction. The third queue, associated with at least one shared cache memory device, stores the store instruction. The first processor core invalidates second data, associated with the store instruction, in the at least one shared cache memory. The first processor core invalidates third data, associated with the store instruction, in other local cache memory devices of other processor cores. The first processor core flushing only the first queue.

  17. Mapping virtual addresses to different physical addresses for value disambiguation for thread memory access requests

    DOE Patents [OSTI]

    Gala, Alan; Ohmacht, Martin

    2014-09-02

    A multiprocessor system includes nodes. Each node includes a data path that includes a core, a TLB, and a first level cache implementing disambiguation. The system also includes at least one second level cache and a main memory. For thread memory access requests, the core uses an address associated with an instruction format of the core. The first level cache uses an address format related to the size of the main memory plus an offset corresponding to hardware thread meta data. The second level cache uses a physical main memory address plus software thread meta data to store the memory access request. The second level cache accesses the main memory using the physical address with neither the offset nor the thread meta data after resolving speculation. In short, this system includes mapping of a virtual address to a different physical addresses for value disambiguation for different threads.

  18. Choreographer

    Energy Science and Technology Software Center (OSTI)

    2013-06-01

    Most organizations face on-going and damaging attacks on their public-facing servers. These servers are critical to the organization, yet provide an avenue of attack. The cost of an average data breach is estimated at $5.5 million. Our approach changes the public addresses of servers to make reconnaisance useless and to protect our servers from automated attacks.

  19. Optimization and Performance Modeling of Stencil Computations on Modern Microprocessors

    SciTech Connect (OSTI)

    Datta, Kaushik; Kamil, Shoaib; Williams, Samuel; Oliker, Leonid; Shalf, John; Yelick, Katherine

    2007-06-01

    Stencil-based kernels constitute the core of many important scientific applications on blockstructured grids. Unfortunately, these codes achieve a low fraction of peak performance, due primarily to the disparity between processor and main memory speeds. In this paper, we explore the impact of trends in memory subsystems on a variety of stencil optimization techniques and develop performance models to analytically guide our optimizations. Our work targets cache reuse methodologies across single and multiple stencil sweeps, examining cache-aware algorithms as well as cache-oblivious techniques on the Intel Itanium2, AMD Opteron, and IBM Power5. Additionally, we consider stencil computations on the heterogeneous multicore design of the Cell processor, a machine with an explicitly managed memory hierarchy. Overall our work represents one of the most extensive analyses of stencil optimizations and performance modeling to date. Results demonstrate that recent trends in memory system organization have reduced the efficacy of traditional cache-blocking optimizations. We also show that a cache-aware implementation is significantly faster than a cache-oblivious approach, while the explicitly managed memory on Cell enables the highest overall efficiency: Cell attains 88% of algorithmic peak while the best competing cache-based processor achieves only 54% of algorithmic peak performance.

  20. Compiler-Directed File Layout Optimization for Hierarchical Storage Systems

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Ding, Wei; Zhang, Yuanrui; Kandemir, Mahmut; Son, Seung Woo

    2013-01-01

    File layout of array data is a critical factor that effects the behavior of storage caches, and has so far taken not much attention in the context of hierarchical storage systems. The main contribution of this paper is a compiler-driven file layout optimization scheme for hierarchical storage caches. This approach, fully automated within an optimizing compiler, analyzes a multi-threaded application code and determines a file layout for each disk-resident array referenced by the code, such that the performance of the target storage cache hierarchy is maximized. We tested our approach using 16 I/O intensive application programs and compared its performancemore » against two previously proposed approaches under different cache space management schemes. Our experimental results show that the proposed approach improves the execution time of these parallel applications by 23.7% on average.« less

  1. A prototype functional language implementation for hierarchical-memory architectures

    SciTech Connect (OSTI)

    Wolski, R.; Feo, J.; Cann, D.

    1991-06-05

    The first implementation of Sisal was designed for general shared-memory architectures. Since then, we have optimized the system for vector and coherent-cache multiprocessors. Coherent-cache systems can be thought of as simple, two-level hierarchical memory systems, where the memory hierarchy is managed by the hardware. The compiler and run-time system for such an architecture needs to maintain data locality so that the processor caches are used as much as possible. In this paper, we extend the coherent-cache implementation to include explicit compiler and run-time control for medium-grain and coarse-grain hierarchical-memory architectures. We implemented the extended system on the BBN Butterfly using interleaved shared memory exclusively for the purposes of data sharing and exploiting the per-processor local memories. We give preliminary performance results for this extended system. 10 refs., 7 figs.

  2. LA-UR-14-26016 LA-UR-14-26016 Unclassified Heidi Sandoval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    6016 LA-UR-14-26016 Unclassified Heidi Sandoval California State University Matthew Dwyer Lynchburg College Anthony Pearson St. Cloud State University The Effects of SSD Caching on...

  3. APEX Workflows LANL, NERSC, SNL SAND2015-10342 O LA-UR-15-29113

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    be configured in a scratch mode, where files are explicitly moved between tiers using a command line or C API, or a cache mode, where file pages move transparently between tiers...

  4. Node and GPU Configuration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Node and GPU Configuration Compute Nodes and GPU Cards Dirac is a 50 GPU node cluster connected with QDR IB. Each GPU node also contains 2 Intel 5530 2.4 GHz, 8MB cache,...

  5. Fermilab | Science at Fermilab | Computing | Mass Storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    at Fermilab store large amounts of data; the US CMS Tier 1 disk caching system can store 3 petabytes, and its capacity will be increased as the Large Hadron Collider comes online

  6. Recovery Act Workers Add Time Capsule Before Sealing Reactor for Hundreds of Years

    Broader source: Energy.gov [DOE]

    American Recovery and Reinvestment Act workers at the Savannah River Site (SRS) placed a time capsule with a cache of timely news items inside a former nuclear reactor this week before sealing the...

  7. NERSC Nick Balthaser NERSC Storage Systems Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction to HPSS at NERSC Nick Balthaser NERSC Storage Systems Group nabalthaser@lbl.gov Joint Genome Institute, Walnut Creek, CA Feb 10, 2011 * NERSC Archive Technologies Overview * Use Cases for the Archive * Hands-on: - Authentication - Client Usage and Examples * Client Installation Agenda 2 * Current data volume: 12PB in 100M files written to 26k tapes (user system) * Permanent storage is magnetic tape, disk cache is transient - All data written to HPSS goes through the disk cache -

  8. Measuring and Understanding Memory Bandwidth

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Measuring and Understanding Memory Bandwidth Measuring and Understanding Memory Bandwidth Measuring Bandwidth Usage Measuring memory bandwidth is a good way of understanding how well your application uses cache memory. Today's processors are constructed under the assumption that a small amount of (expensive) fast memory - called "cache" - is used more often than a larger amount of slower memory (DRAM). The extent to which this assumption applies to your code is referred to as memory

  9. Laboratory Directed Research & Development Page National Energy Research Scientific Computing Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Directed Research & Development Page National Energy Research Scientific Computing Center T3E Individual Node Optimization Michael Stewart, SGI/Cray, 4/9/98 * Introduction * T3E Processor * T3E Local Memory * Cache Structure * Optimizing Codes for Cache Usage * Loop Unrolling * Other Useful Optimization Options * References 1 Laboratory Directed Research & Development Page National Energy Research Scientific Computing Center Introduction * Primary topic will be single processor

  10. Microsoft PowerPoint - SWL HPConf2015.pptx [Read-Only]

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SOUTHWESTERN FEDERAL HYDROPOWER MEETING Chad Dulaney District Water Resources Manager Little Rock, Arkansas 18 June 2015 BUILDING STRONG ® WHITE RIVER BASIN COMPREHENSIVE STUDY BUILDING STRONG ® WHITE RIVER BASIN, AR & MO HARRISON NEWPORT JONESBORO PARAGOULD POPLAR BLUFF PIEDMONT LITTLE ROCK FORREST CITY SPRINGFIELD NORFORK CLEARWATER RESERVOIR MISSOURI ARKANSAS Lock and Dam No 1 10 CACHE RIVER LEGEND EXISTING RESERVOIR OR LAKE WHITE RIVER NATIONAL WILDLIFE REFUGE CACHE RIVER WILDLIFE

  11. Image matrix processor for fast multi-dimensional computations

    DOE Patents [OSTI]

    Roberson, G.P.; Skeate, M.F.

    1996-10-15

    An apparatus for multi-dimensional computation is disclosed which comprises a computation engine, including a plurality of processing modules. The processing modules are configured in parallel and compute respective contributions to a computed multi-dimensional image of respective two dimensional data sets. A high-speed, parallel access storage system is provided which stores the multi-dimensional data sets, and a switching circuit routes the data among the processing modules in the computation engine and the storage system. A data acquisition port receives the two dimensional data sets representing projections through an image, for reconstruction algorithms such as encountered in computerized tomography. The processing modules include a programmable local host, by which they may be configured to execute a plurality of different types of multi-dimensional algorithms. The processing modules thus include an image manipulation processor, which includes a source cache, a target cache, a coefficient table, and control software for executing image transformation routines using data in the source cache and the coefficient table and loading resulting data in the target cache. The local host processor operates to load the source cache with a two dimensional data set, loads the coefficient table, and transfers resulting data out of the target cache to the storage system, or to another destination. 10 figs.

  12. Image matrix processor for fast multi-dimensional computations

    DOE Patents [OSTI]

    Roberson, George P. (Tracy, CA); Skeate, Michael F. (Livermore, CA)

    1996-01-01

    An apparatus for multi-dimensional computation which comprises a computation engine, including a plurality of processing modules. The processing modules are configured in parallel and compute respective contributions to a computed multi-dimensional image of respective two dimensional data sets. A high-speed, parallel access storage system is provided which stores the multi-dimensional data sets, and a switching circuit routes the data among the processing modules in the computation engine and the storage system. A data acquisition port receives the two dimensional data sets representing projections through an image, for reconstruction algorithms such as encountered in computerized tomography. The processing modules include a programmable local host, by which they may be configured to execute a plurality of different types of multi-dimensional algorithms. The processing modules thus include an image manipulation processor, which includes a source cache, a target cache, a coefficient table, and control software for executing image transformation routines using data in the source cache and the coefficient table and loading resulting data in the target cache. The local host processor operates to load the source cache with a two dimensional data set, loads the coefficient table, and transfers resulting data out of the target cache to the storage system, or to another destination.

  13. Vampir | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    follow the steps above to start the GUI and use the server and port printed when the Vampir server was started. Tuning and Analysis Utilities (TAU) up gprof Profiling Tools...

  14. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server via a MitM (Man-in-the-Middle) ...

  15. 503 Service Temporarily Unavailable

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Service Temporarily Unavailable The server is temporarily unable to service your request due to maintenance downtime or capacity problems. Please try again later. Web Server at cen-efrc.org

  16. PDSF Selected Announcements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    will be set to zero 12 hours before the downtime begins. Read the full post New NERSC NX server May 25, 2011 by Eric Hjort Many of you have used the PDSF NX server to accelerate...

  17. Twin-tailed fail-over for fileservers maintaining full performance in the presence of a failure

    DOE Patents [OSTI]

    Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY)

    2008-02-12

    A method for maintaining full performance of a file system in the presence of a failure is provided. The file system having N storage devices, where N is an integer greater than zero and N primary file servers where each file server is operatively connected to a corresponding storage device for accessing files therein. The file system further having a secondary file server operatively connected to at least one of the N storage devices. The method including: switching the connection of one of the N storage devices to the secondary file server upon a failure of one of the N primary file servers; and switching the connections of one or more of the remaining storage devices to a primary file server other than the failed file server as necessary so as to prevent a loss in performance and to provide each storage device with an operating file server.

  18. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  19. T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code

    Broader source: Energy.gov [DOE]

    Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

  20. U-164: Microsoft Security Bulletin Advance Notification for May 2012 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 4: Microsoft Security Bulletin Advance Notification for May 2012 U-164: Microsoft Security Bulletin Advance Notification for May 2012 May 8, 2012 - 7:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for May 2012. PLATFORM: Windows XP Service Pack 3, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1, Microsoft SharePoint Server,

  1. Soft-core processor study for node-based architectures.

    SciTech Connect (OSTI)

    Van Houten, Jonathan Roger; Jarosz, Jason P.; Welch, Benjamin James; Gallegos, Daniel E.; Learn, Mark Walter

    2008-09-01

    Node-based architecture (NBA) designs for future satellite projects hold the promise of decreasing system development time and costs, size, weight, and power and positioning the laboratory to address other emerging mission opportunities quickly. Reconfigurable Field Programmable Gate Array (FPGA) based modules will comprise the core of several of the NBA nodes. Microprocessing capabilities will be necessary with varying degrees of mission-specific performance requirements on these nodes. To enable the flexibility of these reconfigurable nodes, it is advantageous to incorporate the microprocessor into the FPGA itself, either as a hardcore processor built into the FPGA or as a soft-core processor built out of FPGA elements. This document describes the evaluation of three reconfigurable FPGA based processors for use in future NBA systems--two soft cores (MicroBlaze and non-fault-tolerant LEON) and one hard core (PowerPC 405). Two standard performance benchmark applications were developed for each processor. The first, Dhrystone, is a fixed-point operation metric. The second, Whetstone, is a floating-point operation metric. Several trials were run at varying code locations, loop counts, processor speeds, and cache configurations. FPGA resource utilization was recorded for each configuration. Cache configurations impacted the results greatly; for optimal processor efficiency it is necessary to enable caches on the processors. Processor caches carry a penalty; cache error mitigation is necessary when operating in a radiation environment.

  2. Managing coherence via put/get windows

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Yorktown Heights, NY)

    2011-01-11

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

  3. Managing coherence via put/get windows

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Yorktown Heights, NY)

    2012-02-21

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

  4. Programmable partitioning for high-performance coherence domains in a multiprocessor system

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Salapura, Valentina (Chappaqua, NY)

    2011-01-25

    A multiprocessor computing system and a method of logically partitioning a multiprocessor computing system are disclosed. The multiprocessor computing system comprises a multitude of processing units, and a multitude of snoop units. Each of the processing units includes a local cache, and the snoop units are provided for supporting cache coherency in the multiprocessor system. Each of the snoop units is connected to a respective one of the processing units and to all of the other snoop units. The multiprocessor computing system further includes a partitioning system for using the snoop units to partition the multitude of processing units into a plurality of independent, memory-consistent, adjustable-size processing groups. Preferably, when the processor units are partitioned into these processing groups, the partitioning system also configures the snoop units to maintain cache coherency within each of said groups.

  5. Scaling up logic-based truth maintenance systems via fact garbage collection

    SciTech Connect (OSTI)

    Everett, J.O.; Forbus, K.D.

    1996-12-31

    Truth maintenance systems provide caches of beliefs and inferences that support explanations and search. Traditionally, the cost of using a TMS is monotonic growth in the size of this cache. In some applications this cost is too high; for example, intelligent learning environments may require students to explore many alternatives, which leads to unacceptable performance. This paper describes an algorithm for fact garbage collection that retains the explanation-generating capabilities of a TMS while eliminating the increased storage overhead. We describe the application context that motivated this work and the properties of applications that benefit from this technique. We present the algorithm, showing how to balance the tradeoff between maintaining a useful cache and reclaiming storage, and analyze its complexity. We demonstrate that this algorithm can eliminate monotonic storage growth, thus making it more practical to field large-scale TMS-based systems.

  6. Compute Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compute Nodes Compute Nodes Quad CoreAMDOpteronprocessor Compute Node Configuration 9,572 nodes 1 quad-core AMD 'Budapest' 2.3 GHz processor per node 4 cores per node (38,288 total cores) 8 GB DDR3 800 MHz memory per node Peak Gflop rate 9.2 Gflops/core 36.8 Gflops/node 352 Tflops for the entire machine Each core has their own L1 and L2 caches, with 64 KB and 512KB respectively 2 MB L3 cache shared among the 4 cores Compute Node Software By default the compute nodes run a restricted low-overhead

  7. Wireless Sensor Networks for Data Centers | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Products & Technologies » Technology Deployment » Wireless Sensor Networks for Data Centers Wireless Sensor Networks for Data Centers Hot Aisle Containment System Hot Aisle Containment System Hot aisle containment system in the data center at the National Renewable Energy Laboratory's Research Support Facility. Server Rack Configuration Server Rack Configuration Server rack configuration in the data center at the National Renewable Energy Laboratory's Research Support Facility. Data

  8. U-078: Microsoft Security Bulletin Advance Notification for January 2012 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 078: Microsoft Security Bulletin Advance Notification for January 2012 U-078: Microsoft Security Bulletin Advance Notification for January 2012 January 10, 2012 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for January 2012. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for January 2012. Microsoft has posted 1 Critical

  9. Coding Archives - Nercenergy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Coding What Certificates Should My Microsoft Exchange Server Have? Much like any other network application, in order to secure the functionality and safety of Microsoft Exchange Servers, it's essential to adopt specific certificates. Due to the literally thousands, if not millions, of security threats bombarding your Exchange Server every day, these certificates ensure users have a safe messaging experience while simultaneously safeguarding your data and sensitive information from being

  10. U-057: Microsoft Security Bulletin Advance Notification for December 2011 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: Microsoft Security Bulletin Advance Notification for December 2011 U-057: Microsoft Security Bulletin Advance Notification for December 2011 December 9, 2011 - 12:00pm Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2011. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for December 2011. Microsoft has posted 3

  11. U-103: Microsoft Security Bulletin Advance Notification for February 2012 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 3: Microsoft Security Bulletin Advance Notification for February 2012 U-103: Microsoft Security Bulletin Advance Notification for February 2012 February 15, 2012 - 7:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for February 2012. PLATFORM: Windows XP Service Pack 3, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1, Microsoft

  12. Slide 1

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Corps' Drought Plan to provide a more sustainable solution to needs in the basin. ... 2015. GDACS Phase 1 - Design Migration Server Instrumentation started on 1 ...

  13. T-556: BMC PATROL Agent Service Daemon stack-based buffer overflow

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote attackers to execute arbitrary code via a crafted length value in a BGS_MULTIPLE_READS command to TCP port 6768.

  14. INNOVATION MARKETPLACE A QUARTERLY UPDATE OF AVAILABLE TECHNOLOGIES...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    birth dates and credit card numbers. Hackers have access to millions of identities by hacking into one server. By creating a physically unclonable digital id, Sandian innovators...

  15. gridFTP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    gridFTP gridFTP Currently only the archive.nersc.gov system is capable of handling GridFTP transfers to HPSS. It accomplishes this by using a special GSI enabled pftp server. Data transfers are multi-threaded but are handled with a single FTP server. Improvements are planned for the future. The pftp server handling GridFTP transfers is garchive.nersc.gov. GridFTP clients must authenticate/transfer to this server to send data to archive.nersc.gov. There are numerous GridFTP clients available that

  16. V-215: NetworkMiner Directory Traversal and Insecure Library...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis Related Articles U-198: IBM Lotus Expeditor Multiple Vulnerabilities U-146: Adobe ReaderAcrobat Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple...

  17. Overview | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Overview Goals Work with collaborators in National Labs and with commercial partners to develop enabling science and technology to server the Nuclear Nonproliferation mission of...

  18. PROHIBITED PURCHASES for the Ames Laboratory Purchase Card

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    have been determined to be prohibited: Equipment Computing Devices (e.g. desktop, laptop, tablets, thin clients, mini-PCs) Servers Copiers Monitors Printers...

  19. Metadata staging tools

    Energy Science and Technology Software Center (OSTI)

    2013-08-01

    Django application providing a user-interface for building a file and metadata management system. Operates in conjunction with https://github.com/usgin/metadata-server.

  20. CAB Investment Review Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    IT Virtualization and Consolidation This project will replace and upgrade certain data center servers and associated infrastructure, as well as the install software tools to...

  1. Excessing of Computers Used for Unclassified Controlled Information...

    Broader source: Energy.gov (indexed) [DOE]

    of approxiinately 800 infomations ystems, including up to 11 5,000 personal computers, many powerful supercomputers, numerous servers, and a broad array of related...

  2. Annual Energy Outlook 2014 - Energy Information Administration

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    of miscellaneous electric loads in the commercial sector, as well as personal computers and data center servers, based on the Navigant report, reflecting recent and...

  3. Office Buildings - End-Use Equipment

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    Information Administration, 2003 Commercial Buildings Energy Consumption Survey. More computers, dedicated servers, printers, and photocopiers were used in office buildings than in...

  4. watch office

    National Nuclear Security Administration (NNSA)

    servers and other critical Operations Center equipment

  5. Independent air supply system filtered to protect against biological and radiological agents (99.7%).
  6. <...

  7. noc

    National Nuclear Security Administration (NNSA)

    servers and other critical Operations Center equipment

  8. Independent air supply system filtered to protect against biological and radiological agents (99.7%).
  9. <...

  10. operations center

    National Nuclear Security Administration (NNSA)

    servers and other critical Operations Center equipment

  11. Independent air supply system filtered to protect against biological and radiological agents (99.7%).
  12. <...

  13. Amendment 6

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... The goal is a demand-side goal to be achieved through energy efficiency strategies. ... more efficient, including better UPS systems, server management software, etc. ...

  14. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Spoof the Server | Department of Energy 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS:

  15. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code Apple QuickTime Multiple Vulnerabilities May 24, 2013 V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass The...

  16. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code Apple QuickTime Multiple Vulnerabilities May 24, 2013 V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass The...

  17. Stefan Lasiewski

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    projects. Current projects include Improving IPv6 services for many publicly available web services, virtualization, DevOps and migrating server infrastructure to the new...

  18. Innovative Energy Solutions Inc | Open Energy Information

    Open Energy Info (EERE)

    Innovative Energy Solutions Inc Place: Las Vegas, Nevada Zip: 89101 Sector: Hydro, Hydrogen Product: Holds serveral patents related to waste heat recovery, heat generating...

  19. PowerPoint Presentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    increasingly harder to extract knowledge * 20% of the world's servers go into huge data centers by the "Big 5" - Google, Microsoft, Yahoo, Amazon, eBay Collecting Data *...

  20. QBR Follow Ups

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    servers, InfoSphere(tm) software, cyber security, architect of interoperable transactive signal system - Netezza: highly parallel data storage appliance located in demonstration's...

  21. Presentations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    server. The area of remote visualization is an ongoing research topic in the field of visualization. Typical remote visualization techniques have been of the brute force...

  22. U.S. Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... The fresh air supply is divided into four separate streams. The air drawn down the ... The functional units are LPUs, operator, server PCs, printers and uninterruptible power ...

  23. Microsoft Word - Final Report - FORMATTED

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... NNSA and the Office of Science (Science) provide guidance and require contractors and field sites to monitor server ... operations areas as required by its Prevention Program. ...

  24. Library Tools | OSTI, US Dept of Energy, Office of Scientific...

    Office of Scientific and Technical Information (OSTI)

    Open Archives Initiative (OAI) Server allows harvesting of XML format metadata for DOE's full-text research reports. XML Data Services are available to search several of OSTI's ...

  25. Library Tools, Office of Scientific and Technical Information...

    Office of Scientific and Technical Information (OSTI)

    Open Archives Initiative (OAI) Server allows harvesting of XML format metadata for DOE's full-text research reports. XML Data Services are available to search several of OSTI's ...

  26. Staff Info - People - Center for Plasma in the Laboratory and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Foundation Notice: Undefined index: id in LibraryWebServerSitesplasma.physics.wisc.edupeoplestaff.php on line 37 Staff member whose information you requested could not...

  1. Microsoft PowerPoint - 2006-04-lustre-future-40mins.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    network IO guarantees fast client & server side IO Routing enables multi-cluster, multi-network namespace Supports Multiple Network Protocols Lustre's failover...

  2. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Apache HTTP Server July 29, 2013 V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities The weakness and the...

  3. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Apache HTTP Server July 29, 2013 V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities The weakness and the...

  4. V-177: VMware vCenter Chargeback Manager File Upload Handling...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

  5. SU2009_NUG-Brent-R2.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Servers GL * David Paul, Computational Systems * Lynn Rippe, Procurement * David Turner, User Services 4 Carver Cluster * NERSC NCS-C production cluster - BassiJacquard...

  6. Programming and Web Application Development Tutorials

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... the Exchange server. The Four Pillars of Web Application Monitoring The services offered ... Some services available to monitoring web applications offer more available memory, while ...

  7. Ultra Energy Efficient Data Center Saves NREL $200,000 | Department...

    Broader source: Energy.gov (indexed) [DOE]

    | Video courtesy of NREL. National Renewable Energy Laboratory (NREL) Technician Mic Stremel works with a blade server in the green data center at the Research Support Facility. | ...

  8. Deputy Secretary Poneman Attends U.S.-India Strategic Dialogue...

    Broader source: Energy.gov (indexed) [DOE]

    ... at Honeywell, including TCC Cloud, a gas electricity monitoring system; DRAS, a Demand Response Automation Server; Next Gen Air Traffic System, a project focused on fuel ...

  9. WIPP RH-TRU Waste Study - Notice To Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of the United States of America. Use of NTP WWW server is intended only for the retrieval of information available through NTP WWW documents. Only authorized WIPP...

  10. Award Spotlight Could Return to EM-Developed Technology for Tracking...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... The sensors work in conjunction with the local receiver, secured computer network servers, and satellite- or cellular-based communication channels. The EM RFID technology was ...

  11. Workflow Tools

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the server manages the workflows and... Read More Tigres Tigres provides a C and Python programming library to compose and execute large-scale data-intensive scientific...

  12. Working Remotely | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    instant messages with Jabber Access your voice mail Collaboration Host a meeting with Blue Jeans Access your files on Box Argonne SharePoint Server (login required) Cyber...

  13. The KSR1: Experimentation and modeling of poststore

    SciTech Connect (OSTI)

    Rosti, E.; Smirni, E.; Wagner, T.D.; Apon, A.W.; Dowdy, L.W.

    1993-02-01

    Kendall Square Research introduced the KSR1 system in 1991. The architecture is based on a ring of rings of 64-bit microprocessors. It is a distributed, shared memory system and is scalable. The memory structure is unique and is the key to understanding the system. Different levels of caching eliminates physical memory addressing and leads to the ALLCACHE{trademark} scheme. Since requested data may be found in any of several caches, the initial access time is variable. Once pulled into the local (sub)cache, subsequent access times are fixed and minimal. Thus, the KSR1 is a Cache-Only Memory Architecture (COMA) system.This paper describes experimentation and an analytic model of the KSR1. The focus is on the poststore programmer option. With the poststore option, the programmer can elect to broadcast the updated value of a variable to all processors that might have a copy. This may save time for threads on other processors, but delays the broadcasting thread and places additional traffic on the ring. The specific issue addressed is to determine under what conditions poststore is beneficial. The analytic model and the experimental observations are in good agreement. They indicate that the decision to use poststore depends both on the application and the current system load.

  14. The KSR1: Experimentation and modeling of poststore

    SciTech Connect (OSTI)

    Rosti, E. . Dipt. di Scienze dell'Informazione); Smirni, E.; Wagner, T.D.; Apon, A.W.; Dowdy, L.W. . Dept. of Computer Science)

    1993-02-01

    Kendall Square Research introduced the KSR1 system in 1991. The architecture is based on a ring of rings of 64-bit microprocessors. It is a distributed, shared memory system and is scalable. The memory structure is unique and is the key to understanding the system. Different levels of caching eliminates physical memory addressing and leads to the ALLCACHE[trademark] scheme. Since requested data may be found in any of several caches, the initial access time is variable. Once pulled into the local (sub)cache, subsequent access times are fixed and minimal. Thus, the KSR1 is a Cache-Only Memory Architecture (COMA) system.This paper describes experimentation and an analytic model of the KSR1. The focus is on the poststore programmer option. With the poststore option, the programmer can elect to broadcast the updated value of a variable to all processors that might have a copy. This may save time for threads on other processors, but delays the broadcasting thread and places additional traffic on the ring. The specific issue addressed is to determine under what conditions poststore is beneficial. The analytic model and the experimental observations are in good agreement. They indicate that the decision to use poststore depends both on the application and the current system load.

  15. U-179: IBM Java 7 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  16. T-611: Cisco IOS OCSP Revoked Certificate Security Issue

    Broader source: Energy.gov [DOE]

    The PKI functionality in Cisco IOS 15.0 and 15.1 does not prevent permanent caching of certain public keys, which allows remote attackers to bypass authentication and have unspecified other impact by leveraging an IKE peer relationship in which a key was previously valid but later revoked, aka Bug ID CSCth82164, a different vulnerability than CVE-2010-4685.

  17. T-679: VMware Security Advisory- VMSA-2011-0010

    Broader source: Energy.gov [DOE]

    The DHCP client daemon, dhclient, does not properly sanatize certain options in DHCP server replies. An attacker could send a specially crafted DHCP server reply, that is saved on the client system and evaluated by a process that assumes the option is trusted. This could lead to arbitrary code execution with the privileges of the evaluating process

  18. A Network Client Using the Gopher Information Discovery Protocol

    Energy Science and Technology Software Center (OSTI)

    1993-10-05

    WSGOPHER uses the protocol known as Gopher, which is described in Internet RFC 1436. Specifically Gopher is a client/server protocol. Gopher servers provide information across the network to Gopher clients. WSGOPHER is an implementation of a Gopher client for Microsoft Windows 3.1 and Windows Sockets version 1.1.

  19. Propenyl ether monomers for photopolymerization

    DOE Patents [OSTI]

    Crivello, James V.

    1996-01-01

    Propenyl ether monomers of formula V A(OCH.dbd.CHCH.sub.3).sub.n wherein n is an integer from one to six and A is selected from cyclic ethers, polyether and alkanes are disclosed. The monomers are readily polymerized in the presence of cationic photoinitiators, when exposed to actinic radiation, to form poly(propenyl ethers) that are useful for coatings, sealants, varnishes and adhesives. Compositions for preparing polymeric coatings comprising the compounds of formula V together with particular cationic photoinitiators are also disclosed, as are processes for making the monomers from allyl halides and readily available alcohols. The process involves rearranging the resulting allyl ethers to propenyl ethers.

  20. Process for making propenyl ethers and photopolymerizable compositions containing them

    DOE Patents [OSTI]

    Crivello, James V.

    1996-01-01

    Propenyl ether monomers of formula V A(OCH.dbd.CHCH.sub.3).sub.n wherein n is an integer from one to six and A is selected from cyclic ethers, polyether and alkanes are disclosed. The monomers are readily polymerized in the presence of cationic photoinitiators, when exposed to actinic radiation, to form poly(propenyl ethers) that are useful for coatings, sealants, varnishes and adhesives. Compositions for preparing polymeric coatings comprising the compounds of formula V together with particular cationic photoinitiators are also disclosed, as are processes for making the monomers from allyl halides and readily available alcohols. The process involves rearranging the resulting allyl ethers to propenyl ethers.

  1. Propenyl ether monomers for photopolymerization

    DOE Patents [OSTI]

    Crivello, J.V.

    1996-10-22

    Propenyl ether monomers of formula A(OCH{double_bond}CHCH{sub 3}){sub n} wherein n is an integer from one to six and A is selected from cyclic ethers, polyether and alkanes are disclosed. The monomers are readily polymerized in the presence of cationic photoinitiators, when exposed to actinic radiation, to form poly(propenyl ethers) that are useful for coatings, sealants, varnishes and adhesives. Compositions for preparing polymeric coatings comprising the compounds of the above formula together with particular cationic photoinitiators are also disclosed, as are processes for making the monomers from allyl halides and readily available alcohols. The process involves rearranging the resulting allyl ethers to propenyl ethers.

  2. Process for making propenyl ethers and photopolymerizable compositions containing them

    DOE Patents [OSTI]

    Crivello, J.V.

    1996-01-23

    Propenyl ether monomers of formula A(OCH{double_bond}CHCH{sub 3}){sub n} (V) wherein n is an integer from one to six and A is selected from cyclic ethers, polyether, and alkanes are disclosed. The monomers are readily polymerized in the presence of cationic photoinitiators, when exposed to actinic radiation, to form poly(propenyl ethers) that are useful for coatings, sealants, varnishes and adhesives. Compositions for preparing polymeric coatings comprising the compounds of formula V together with particular cationic photoinitiators are also disclosed, as are processes for making the monomers from allyl halides and readily available alcohols. The process involves rearranging the resulting allyl ethers to propenyl ethers.

  3. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui; Beaver, Justin M; Treadwell, Jim N

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  4. Distributed Object Oriented Geographic Information System

    Energy Science and Technology Software Center (OSTI)

    1997-02-01

    This interactive, object-oriented, distributed Geographic Information System (GIS) uses the World Wibe Web (WWW) as application medium and distribution mechanism. The software provides distributed access to multiple geo-spatial databases and presents them as if they came from a single coherent database. DOOGIS distributed access comes not only in the form of multiple geo-spatial servers but can break down a single logical server into the constituent physical servers actually storing the data. The program provides formore » dynamic protocol resolution and content handling allowing unknown objects from a particular server to download their handling code. Security and access privileges are negotiated dynamically with each server contacted and each access attempt.« less

  5. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  6. Distributed road assessment system

    DOE Patents [OSTI]

    Beer, N. Reginald; Paglieroni, David W

    2014-03-25

    A system that detects damage on or below the surface of a paved structure or pavement is provided. A distributed road assessment system includes road assessment pods and a road assessment server. Each road assessment pod includes a ground-penetrating radar antenna array and a detection system that detects road damage from the return signals as the vehicle on which the pod is mounted travels down a road. Each road assessment pod transmits to the road assessment server occurrence information describing each occurrence of road damage that is newly detected on a current scan of a road. The road assessment server maintains a road damage database of occurrence information describing the previously detected occurrences of road damage. After the road assessment server receives occurrence information for newly detected occurrences of road damage for a portion of a road, the road assessment server determines which newly detected occurrences correspond to which previously detected occurrences of road damage.

  7. xDSL connection monitor

    DOE Patents [OSTI]

    Horton, John J.

    2006-04-11

    A system and method of maintaining communication between a computer and a server, the server being in communication with the computer via xDSL service or dial-up modem service, with xDSL service being the default mode of communication, the method including sending a request to the server via xDSL service to which the server should respond and determining if a response has been received. If no response has been received, displaying on the computer a message (i) indicating that xDSL service has failed and (ii) offering to establish communication between the computer and the server via the dial-up modem, and thereafter changing the default mode of communication between the computer and the server to dial-up modem service. In a preferred embodiment, an xDSL service provider monitors dial-up modem communications and determines if the computer dialing in normally establishes communication with the server via xDSL service. The xDSL service provider can thus quickly and easily detect xDSL failures.

  8. DESTINY

    SciTech Connect (OSTI)

    2015-03-10

    DESTINY is a comprehensive tool for modeling 3D and 2D cache designs using SRAM,embedded DRAM (eDRAM), spin transfer torque RAM (STT-RAM), resistive RAM (ReRAM), and phase change RAM (PCN). In its purpose, it is similar to CACTI, CACTI-3DD or NVSim. DESTINY is very useful for performing design-space exploration across several dimensions, such as optimizing for a target (e.g. latency, area or energy-delay product) for agiven memory technology, choosing the suitable memory technology or fabrication method (i.e. 2D v/s 3D) for a given optimization target, etc. DESTINY has been validated against several cache prototypes. DESTINY is expected to boost studies of next-generation memory architectures used in systems ranging from mobile devices to extreme-scale supercomputers.

  9. DESTINY

    Energy Science and Technology Software Center (OSTI)

    2015-03-10

    DESTINY is a comprehensive tool for modeling 3D and 2D cache designs using SRAM,embedded DRAM (eDRAM), spin transfer torque RAM (STT-RAM), resistive RAM (ReRAM), and phase change RAM (PCN). In its purpose, it is similar to CACTI, CACTI-3DD or NVSim. DESTINY is very useful for performing design-space exploration across several dimensions, such as optimizing for a target (e.g. latency, area or energy-delay product) for agiven memory technology, choosing the suitable memory technology or fabrication methodmore » (i.e. 2D v/s 3D) for a given optimization target, etc. DESTINY has been validated against several cache prototypes. DESTINY is expected to boost studies of next-generation memory architectures used in systems ranging from mobile devices to extreme-scale supercomputers.« less

  10. Heap/stack guard pages using a wakeup unit

    DOE Patents [OSTI]

    Gooding, Thomas M; Satterfield, David L; Steinmacher-Burow, Burkhard

    2014-04-29

    A method and system for providing a memory access check on a processor including the steps of detecting accesses to a memory device including level-1 cache using a wakeup unit. The method includes invalidating level-1 cache ranges corresponding to a guard page, and configuring a plurality of wakeup address compare (WAC) registers to allow access to selected WAC registers. The method selects one of the plurality of WAC registers, and sets up a WAC register related to the guard page. The method configures the wakeup unit to interrupt on access of the selected WAC register. The method detects access of the memory device using the wakeup unit when a guard page is violated. The method generates an interrupt to the core using the wakeup unit, and determines the source of the interrupt. The method detects the activated WAC registers assigned to the violated guard page, and initiates a response.

  11. Distributed performance counters

    DOE Patents [OSTI]

    Davis, Kristan D; Evans, Kahn C; Gara, Alan; Satterfield, David L

    2013-11-26

    A plurality of first performance counter modules is coupled to a plurality of processing cores. The plurality of first performance counter modules is operable to collect performance data associated with the plurality of processing cores respectively. A plurality of second performance counter modules are coupled to a plurality of L2 cache units, and the plurality of second performance counter modules are operable to collect performance data associated with the plurality of L2 cache units respectively. A central performance counter module may be operable to coordinate counter data from the plurality of first performance counter modules and the plurality of second performance modules, the a central performance counter module, the plurality of first performance counter modules, and the plurality of second performance counter modules connected by a daisy chain connection.

  12. Hybrid Optimization Parallel Search PACKage

    Energy Science and Technology Software Center (OSTI)

    2009-11-10

    HOPSPACK is open source software for solving optimization problems without derivatives. Application problems may have a fully nonlinear objective function, bound constraints, and linear and nonlinear constraints. Problem variables may be continuous, integer-valued, or a mixture of both. The software provides a framework that supports any derivative-free type of solver algorithm. Through the framework, solvers request parallel function evaluation, which may use MPI (multiple machines) or multithreading (multiple processors/cores on one machine). The framework providesmore » a Cache and Pending Cache of saved evaluations that reduces execution time and facilitates restarts. Solvers can dynamically create other algorithms to solve subproblems, a useful technique for handling multiple start points and integer-valued variables. HOPSPACK ships with the Generating Set Search (GSS) algorithm, developed at Sandia as part of the APPSPACK open source software project.« less

  13. The status of the Fermilab data storage system

    SciTech Connect (OSTI)

    Bakken, J.; Berman, E.; Huang, Chi-Hao; Moibenko, A.; Petravick, D.; Zalokar, M.; /Fermilab

    2004-12-01

    This document describes the Fermilab Data Storage System Enstore, its design concepts, structure, and current status. Enstore provides storage of the data in robotic tape libraries according to requirements of the experiments. High fault tolerance and availability, as well as multilevel priority based request processing allows experiments to effectively store and access data in the Enstore. Amount of data stored in the system currently approaches 2 PBytes. The Enstore system includes 5 robotic tape libraries, more than 100 PC nodes, and 90 tape drives. The distributed structure and modularity of Enstore allows scaling of the system and adding of more storage equipment as the requirements and needs grow. Users access data in Enstore directly using a special command. They can also use ftp, GridFtp, and SRM interfaces to the dCache caching and buffering system [1], which uses Enstore as its lower layer storage.

  14. Programmable stream prefetch with resource optimization

    DOE Patents [OSTI]

    Boyle, Peter; Christ, Norman; Gara, Alan; Mawhinney, Robert; Ohmacht, Martin; Sugavanam, Krishnan

    2013-01-08

    A stream prefetch engine performs data retrieval in a parallel computing system. The engine receives a load request from at least one processor. The engine evaluates whether a first memory address requested in the load request is present and valid in a table. The engine checks whether there exists valid data corresponding to the first memory address in an array if the first memory address is present and valid in the table. The engine increments a prefetching depth of a first stream that the first memory address belongs to and fetching a cache line associated with the first memory address from the at least one cache memory device if there is not yet valid data corresponding to the first memory address in the array. The engine determines whether prefetching of additional data is needed for the first stream within its prefetching depth. The engine prefetches the additional data if the prefetching is needed.

  15. Network topology mapper

    DOE Patents [OSTI]

    Quist, Daniel A. (Los Alamos, NM); Gavrilov, Eugene M. (Los Alamos, NM); Fisk, Michael E. (Jemez, NM)

    2008-01-15

    A method enables the topology of an acyclic fully propagated network to be discovered. A list of switches that comprise the network is formed and the MAC address cache for each one of the switches is determined. For each pair of switches, from the MAC address caches the remaining switches that see the pair of switches are located. For each pair of switches the remaining switches are determined that see one of the pair of switches on a first port and the second one of the pair of switches on a second port. A list of insiders is formed for every pair of switches. It is determined whether the insider for each pair of switches is a graph edge and adjacent ones of the graph edges are determined. A symmetric adjacency matrix is formed from the graph edges to represent the topology of the data link network.

  16. Slide 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    @ AMD: Ensuring a Solid HPC Foundation and Data Confidence from Core to Cache and Beyond . . . Seth Prejean April 26, 2007 Salishan Hi Speed Conference 2007 2 April 26, 2007 Presentation Overview *Validation and Verification *Data Protection *Design Verification *Product Validation *Looking Forward *Summary Salishan Hi Speed Conference 2007 3 April 26, 2007 V & V @ AMD Verification (Pre-Silicon)  Ensure logical functionality of the design  Simulation environment - RTL - Process

  17. Presentations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Advanced code optimization cache blocking, prefetching, and OpenMP September 20, 2007 | Author(s): John Levesque | Download File: Levesque-cacheblockingandprefetch.ppt | ppt | 115 KB PGI compiler - How to use the compiler; flags for porting, debugging and optimization September 18, 2007 | Author(s): John Levesque | Download File: Levesque-Compiler.ppt | ppt | 256 KB XT4 socket optimization, with examples September 18, 2007 | Author(s): John Levesque | Download File:

  18. The Preston Geothermal Resources; Renewed Interest in a Known Geothermal Resource Area

    SciTech Connect (OSTI)

    Wood, Thomas R.; Worthing, Wade; Cannon, Cody; Palmer, Carl; Neupane, Ghanashyam; McLing, Travis L; Mattson, Earl; Dobson, Patric; Conrad, Mark

    2015-01-01

    The Preston Geothermal prospect is located in northern Cache Valley approximately 8 kilometers north of the city of Preston, in southeast Idaho. The Cache Valley is a structural graben of the northern portion of the Basin and Range Province, just south of the border with the Eastern Snake River Plain (ESRP). This is a known geothermal resource area (KGRA) that was evaluated in the 1970's by the State of Idaho Department of Water Resources (IDWR) and by exploratory wells drilled by Sunedco Energy Development. The resource is poorly defined but current interpretations suggest that it is associated with the Cache Valley structural graben. Thermal waters moving upward along steeply dipping northwest trending basin and range faults emanate in numerous hot springs in the area. Springs reach temperatures as hot as 84 C. Traditional geothermometry models estimated reservoir temperatures of approximately 125 C in the 1970s study. In January of 2014, interest was renewed in the areas when a water well drilled to 79 m (260 ft) yielded a bottom hole temperature of 104 C (217 F). The well was sampled in June of 2014 to investigate the chemical composition of the water for modeling geothermometry reservoir temperature. Traditional magnesium corrected Na-K-Ca geothermometry estimates this new well to be tapping water from a thermal reservoir of 227 C (440 F). Even without the application of improved predictive methods, the results indicate much higher temperatures present at much shallower depths than previously thought. This new data provides strong support for further investigation and sampling of wells and springs in the Northern Cache Valley, proposed for the summer of 2015. The results of the water will be analyzed utilizing a new multicomponent equilibrium geothermometry (MEG) tool called Reservoir Temperature Estimate (RTEst) to obtain an improved estimate of the reservoir temperature. The new data suggest that other KGRAs and overlooked areas may need to be investigated using improved geothermal exploration methods.

  19. Microsoft PowerPoint - torrellas2004session4

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Speed Computing Conference, Salishan, April 2004 New Architectural Technologies for Shared-Memory Systems Josep Torrellas University of Illinois http://iacoma.cs.uiuc.edu < 2 #> Josep Torrellas: New Technologies for Shared-Memory Systems. April 2004 Major emphasis on: - Programmability & ease of use - Cost-effective fault tolerance Sea of caching What to Expect 10 Years from Now Multiple cores/chip, multithreaded Very high frequency: 15 GHz Simple engines in memory subsystem Far away

  20. Real-time, interactive animation of deformable two- and three-dimensional objects

    DOE Patents [OSTI]

    Desbrun, Mathieu; Schroeder, Peter; Meyer, Mark; Barr, Alan H.

    2003-06-03

    A method of updating in real-time the locations and velocities of mass points of a two- or three-dimensional object represented by a mass-spring system. A modified implicit Euler integration scheme is employed to determine the updated locations and velocities. In an optional post-integration step, the updated locations are corrected to preserve angular momentum. A processor readable medium and a network server each tangibly embodying the method are also provided. A system comprising a processor in combination with the medium, and a system comprising the server in combination with a client for accessing the server over a computer network, are also provided.

  1. Web100-based Network Diagnostic Tool

    Energy Science and Technology Software Center (OSTI)

    2003-03-20

    NDT is a client/server based network diagnostic tool developed to aid in finding network performance and configuration problems. The tool measures data transfer rates between two internet hosts (client and server). It also gathers detailed TCP statistical variable counters supplied by the Web100 modified server and uses these TCP variables to compute the theoretical performance rate between the two internet hosts. It then compares these analytical results with the measured results to determine if performancemore »or configuration problems exist and translates these results into plain text messages to aid users and network operators in resolving reported problems.« less

  2. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    SciTech Connect (OSTI)

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on an analysis of relevant patents in the area.

  3. Multiple channel data acquisition system

    DOE Patents [OSTI]

    Crawley, H. Bert (Ames, IA); Rosenberg, Eli I. (Ames, IA); Meyer, W. Thomas (Ames, IA); Gorbics, Mark S. (Ames, IA); Thomas, William D. (Boone, IA); McKay, Roy L. (Ames, IA); Homer, Jr., John F. (Ames, IA)

    1990-05-22

    A multiple channel data acquisition system for the transfer of large amounts of data from a multiplicity of data channels has a plurality of modules which operate in parallel to convert analog signals to digital data and transfer that data to a communications host via a FASTBUS. Each module has a plurality of submodules which include a front end buffer (FEB) connected to input circuitry having an analog to digital converter with cache memory for each of a plurality of channels. The submodules are interfaced with the FASTBUS via a FASTBUS coupler which controls a module bus and a module memory. The system is triggered to effect rapid parallel data samplings which are stored to the cache memories. The cache memories are uploaded to the FEBs during which zero suppression occurs. The data in the FEBs is reformatted and compressed by a local processor during transfer to the module memory. The FASTBUS coupler is used by the communications host to upload the compressed and formatted data from the module memory. The local processor executes programs which are downloaded to the module memory through the FASTBUS coupler.

  4. Scalable Equation of State Capability

    SciTech Connect (OSTI)

    Epperly, T W; Fritsch, F N; Norquist, P D; Sanford, L A

    2007-12-03

    The purpose of this techbase project was to investigate the use of parallel array data types to reduce the memory footprint of the Livermore Equation Of State (LEOS) library. Addressing the memory scalability of LEOS is necessary to run large scientific simulations on IBM BG/L and future architectures with low memory per processing core. We considered using normal MPI, one-sided MPI, and Global Arrays to manage the distributed array and ended up choosing Global Arrays because it was the only communication library that provided the level of asynchronous access required. To reduce the runtime overhead using a parallel array data structure, a least recently used (LRU) caching algorithm was used to provide a local cache of commonly used parts of the parallel array. The approach was initially implemented in a isolated copy of LEOS and was later integrated into the main trunk of the LEOS Subversion repository. The approach was tested using a simple test. Testing indicated that the approach was feasible, and the simple LRU caching had a 86% hit rate.

  5. Multiple channel data acquisition system

    DOE Patents [OSTI]

    Crawley, H.B.; Rosenberg, E.I.; Meyer, W.T.; Gorbics, M.S.; Thomas, W.D.; McKay, R.L.; Homer, J.F. Jr.

    1990-05-22

    A multiple channel data acquisition system for the transfer of large amounts of data from a multiplicity of data channels has a plurality of modules which operate in parallel to convert analog signals to digital data and transfer that data to a communications host via a FASTBUS. Each module has a plurality of submodules which include a front end buffer (FEB) connected to input circuitry having an analog to digital converter with cache memory for each of a plurality of channels. The submodules are interfaced with the FASTBUS via a FASTBUS coupler which controls a module bus and a module memory. The system is triggered to effect rapid parallel data samplings which are stored to the cache memories. The cache memories are uploaded to the FEBs during which zero suppression occurs. The data in the FEBs is reformatted and compressed by a local processor during transfer to the module memory. The FASTBUS coupler is used by the communications host to upload the compressed and formatted data from the module memory. The local processor executes programs which are downloaded to the module memory through the FASTBUS coupler. 25 figs.

  6. Robotic Intelligence Kernel: Communications

    Energy Science and Technology Software Center (OSTI)

    2009-09-16

    The INL Robotic Intelligence Kernel-Comms is the communication server that transmits information between one or more robots using the RIK and one or more user interfaces. It supports event handling and multiple hardware communication protocols.

  7. Microsoft Word - Segment and Value Propositions Draft Task 6...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... The data in-take interface needs to be smart and task ... this capital-investment-heavy industry minimize costs. ... and IT assets such as servers, cables, and power grids. ...

  8. Title (46 pt. HP Simplified bold)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    itself in servers and in the enterprise. We offer a path forward that applies these lower-end technologies and several emerging technologies together. This leads to a picture...

  9. T-533: Microsoft January 2011 Security Bulletin Release

    Broader source: Energy.gov [DOE]

    Microsoft released 2 bulletins to address 3 vulnerabilities involving Microsoft Windows and components in Windows OS, and Windows Server Releases. Only 1 of these bulletins get our maximum severity rating of Critical.

  10. Multi Admin/System Tracking-Environment Resource

    Energy Science and Technology Software Center (OSTI)

    2011-02-01

    Master stores information about each node in a computer cluster, similar to an asset tracking program. Records changes and events happening on the system. Master is a networked client/server with a database backend.

  11. Presentation title

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Uses server license Submit to job queues or run interactively on any system Today's Challenge Q: What is the impact of current trends in HPC on your application? Q: How can you ...

  12. getnim - NIM's Command Line Interface

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of ClientServer errors by setting the exit value to zero for these type errors. Error messages still go to stderr though. Usage errors and insufficient allocation still...

  13. ParaView on Tukey | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to a running pvserver, you need to know the host (and port) where the server is listening. This will be the head node of the job. There are several ways to do this, but...

  14. Paraview on Cooley | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to a running pvserver, you need to know the host (and port) where the server is listening. This will be the head node of the job. There are several ways to do this, but...

  15. Secure Policy-Based Configuration Framework (PBCONF)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... The PBCONF node comprises a web interface and a service container. The service container is made up of subcomponents: the SSH connection broker, an HTTPS server that hosts a ...

  16. Web service performance script

    Energy Science and Technology Software Center (OSTI)

    2009-08-01

    This python script, available from ESRI and modified here, checks a server at specified intervals to ensure that web services remain up and running. If any are found to be off, they are automatically turned back on.

  17. ARM - Publications: Science Team Meeting Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    purpose programs is also pre-installed. * Adobe Acrobat Viewer * Cygnus GNU C and Fortran compilers * ftp client and server * GhostView postscript utilties * HyperSnapDX...

  18. Sweden Building 05K0043 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 13.6557435484 Fans 17.832016129 Lighting 45.1762705544 PCs 12.0989247312 Large computers servers 10.8793548387 Printers 0.940860215054 Copiers 1.90860215054 Air...

  19. Sweden Building 05K0089 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 6.62753182771 Fans 12.8296318308 Lighting 9.34771184585 PCs 5.55471478463 Large computers servers 20.4132712456 Printers 1.26600698487 Copiers 0.34924330617 Air compressors...

  20. Sweden Building 05K0083 | Open Energy Information

    Open Energy Info (EERE)

    2.03280729738 Fans 8.95852856146 Lighting 22.4662526169 PCs 0.753035589672 Large computers servers 6.10607117934 Printers 0.0 Copiers 1.74459176553 Air compressors 0.0 Small...

  1. Sweden Building 05K0063 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 10.6001655172 Fans 56.94 Lighting 29.3124045268 PCs 7.40516473731 Large computers servers 0.0 Printers 1.44701691897 Copiers 2.64915405165 Air compressors 0.0 Small...

  2. Sweden Building 05K0032 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.44288442623 Fans 21.075117096 Lighting 23.0819672131 PCs 18.4077868852 Large computers servers 0.545081967213 Printers 3.60655737705 Copiers 0.0 Air compressors...

  3. Sweden Building 05K0081 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 5.61059253247 Fans 15.3000347866 Lighting 21.1669461078 PCs 16.5389552239 Large computers servers 1.01791044776 Printers 2.4776119403 Copiers 0.0 Air compressors...

  4. Sweden Building 05K0037 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.07852838566 Fans 19.6114811291 Lighting 32.768 PCs 13.8454097784 Large computers servers 42.2089342244 Printers 2.46218782976 Copiers 4.48469926134 Air compressors...

  5. Sweden Building 05K0088 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 8.15750798512 Fans 10.4171224386 Lighting 25.3628869565 PCs 16.1602318841 Large computers servers 0.0 Printers 3.01620869565 Copiers 1.2347826087 Air compressors 0.0 Small...

  6. Sweden Building 05K0099 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.03839788534 Fans 10.3091635338 Lighting 15.8542631579 PCs 5.40263157895 Large computers servers 21.7368421053 Printers 1.03684210526 Copiers 1.57894736842 Air compressors...

  7. Sweden Building 05K0012 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.32673206926 Fans 8.60719192175 Lighting 12.985779547 PCs 2.19353608542 Large computers servers 0.774049003718 Printers 1.11545428544 Copiers 0.0 Air compressors...

  8. Sweden Building 05K0090 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 33.0079891149 Fans 19.384931277 Lighting 34.9136291095 PCs 829.756338007 Large computers servers 1.30450015281 Printers 1.21132157047 Copiers 0.0 Air compressors...

  9. Sweden Building 05K0066 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.84271836287 Fans 20.8528500862 Lighting 6.58573234487 PCs 2.44099890231 Large computers servers 0.0 Printers 0.439077936334 Copiers 2.52469813392 Air compressors 0.0...

  10. Sweden Building 05K0013 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.63132906976 Fans 16.7539365907 Lighting 21.6361810339 PCs 8.43270214944 Large computers servers 0.0 Printers 0.549891248721 Copiers 1.24104401228 Air compressors 0.0...

  11. Sweden Building 05K0003 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.38991548528 Fans 20.3514016294 Lighting 25.3519773429 PCs 4.12075688073 Large computers servers 0.0 Printers 0.412844036697 Copiers 0.447247706422 Air compressors 0.0...

  12. Sweden Building 05K0108 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.23191852203 Fans 10.078297354 Lighting 13.4490004737 PCs 7.14116532449 Large computers servers 0.0 Printers 2.13699668404 Copiers 1.49218379915 Air compressors 0.0 Small...

  13. Sweden Building 05K0051 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.96531566894 Fans 17.9698161112 Lighting 13.8988970588 PCs 1.75469981807 Large computers servers 6.06428138266 Printers 1.08399029715 Copiers 5.65494238933 Air compressors...

  14. Sweden Building 05K0028 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 5.01662584416 Fans 12.3265714286 Lighting 18.6392727273 PCs 5.58 Large computers servers 18.1818181818 Printers 0.409090909091 Copiers 1.04545454545 Air...

  15. Sweden Building 05K0030 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.62274306839 Fans 38.8613678373 Lighting 19.3737155556 PCs 3.4101458205 Large computers servers 3.52630930376 Printers 0.796056685151 Copiers 1.97165742452 Air...

  16. Sweden Building 05K0061 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 11.655988024 Fans 30.1702630453 Lighting 14.1947125749 PCs 3.16167664671 Large computers servers 0.0 Printers 0.112275449102 Copiers 1.38473053892 Air compressors 0.0...

  17. Sweden Building 05K0064 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.90728584264 Fans 7.13977666538 Lighting 12.6468261456 PCs 5.58580413297 Large computers servers 5.03144654088 Printers 0.296495956873 Copiers 1.57232704403 Air...

  18. Sweden Building 05K0015 | Open Energy Information

    Open Energy Info (EERE)

    0.904258064516 Fans 5.67987096774 Lighting 31.4462462687 PCs 3.17935483871 Large computers servers 0.0 Printers 0.0967741935484 Copiers 0.41935483871 Air compressors 0.0...

  19. Sweden Building 05K0111 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.18765247156 Fans 9.16913319239 Lighting 13.9715574348 PCs 4.28414376321 Large computers servers 2.46652572234 Printers 1.5503875969 Copiers 3.38266384778 Air compressors...

  20. Sweden Building 05K0025 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 4.00124358974 Fans 16.8461538462 Lighting 43.0891025641 PCs 5.49633635729 Large computers servers 4.50104675506 Printers 0.33147243545 Copiers 1.55268667132 Air compressors...

  1. Sweden Building 05K0080 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 5.20530200645 Fans 17.4788885093 Lighting 28.8864184072 PCs 7.38107211455 Large computers servers 0.257726558408 Printers 0.907979745067 Copiers 0.0 Air compressors...

  2. Sweden Building 05K0071 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.71343087626 Fans 14.2937494714 Lighting 17.730017762 PCs 2.51790830946 Large computers servers 20.7020057307 Printers 0.716332378223 Copiers 3.04441260745 Air...

  3. Sweden Building 05K0040 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.45556346525 Fans 19.0811993243 Lighting 18.139570644 PCs 12.8363047002 Large computers servers 3.56564019449 Printers 4.70016207455 Copiers 2.45813074014 Air compressors...

  4. Sweden Building 05K0070 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.64826425856 Fans 15.5015956002 Lighting 22.6711026616 PCs 5.55941064639 Large computers servers 1.23574144487 Printers 0.190114068441 Copiers 0.617870722433 Air...

  5. Sweden Building 05K0091 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 6.81253202765 Fans 8.97586021505 Lighting 37.699333405 PCs 13.23853125 Large computers servers 0.0 Printers 1.90575 Copiers 2.50625 Air compressors 0.0 Small kitchens ...

  6. Sweden Building 05K0115 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.18185032045 Fans 9.89733305768 Lighting 16.3132786627 PCs 5.41515918958 Large computers servers 37.988422576 Printers 0.480463096961 Copiers 0.575253256151 Air...

  7. Sweden Building 05K0039 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.74982817869 Fans 8.00097201767 Lighting 12.5792387543 PCs 2.37164948454 Large computers servers 35.7388316151 Printers 0.432817869416 Copiers 2.45704467354 Air...

  8. Sweden Building 05K0060 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.03997267137 Fans 27.9269471647 Lighting 22.9778517422 PCs 6.09805301431 Large computers servers 0.0 Printers 0.436312456017 Copiers 0.932441942294 Air compressors 0.0...

  9. Sweden Building 05K0098 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.22920729694 Fans 9.0858325996 Lighting 13.6683458294 PCs 2.28415300546 Large computers servers 10.9289617486 Printers 0.0398451730419 Copiers 0.739981785064 Air...

  10. Sweden Building 05K0069 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 4.41176254521 Fans 9.5911505425 Lighting 38.6550632911 PCs 5.67840189873 Large computers servers 0.395569620253 Printers 1.58227848101 Copiers 3.40189873418 Air...

  11. Sweden Building 05K0077 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.40013311148 Fans 13.1688043737 Lighting 15.2308652246 PCs 3.29894620078 Large computers servers 2.21852468109 Printers 0.406877426511 Copiers 1.80255130338 Air...

  12. Sweden Building 05K0054 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.48402198172 Fans 18.8416546417 Lighting 20.5491262626 PCs 9.23905723906 Large computers servers 56.3973063973 Printers 0.653198653199 Copiers 2.23063973064 Air...

  13. Sweden Building 05K0050 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 6.93523068574 Fans 16.4926207327 Lighting 24.6051980198 PCs 10.8290816327 Large computers servers 19.8412698413 Printers 2.55102040816 Copiers 2.55102040816 Air compressors...

  14. Sweden Building 05K0002 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 6.03888185355 Fans 18.5995610535 Lighting 51.2740526316 PCs 22.2888135593 Large computers servers 0.0 Printers 1.42372881356 Copiers 0.85593220339 Air compressors 0.0 Small...

  15. Sweden Building 05K0011 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.47492819795 Fans 6.90408963585 Lighting 12.9336787565 PCs 2.70028409091 Large computers servers 0.471022727273 Printers 0.774147727273 Copiers 0.0 Air compressors...

  16. Sweden Building 05K0034 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 4.56351293996 Fans 18.3803571429 Lighting 27.7675677908 PCs 11.3985507246 Large computers servers 27.7717391304 Printers 1.06884057971 Copiers 1.3768115942 Air compressors...

  17. Sweden Building 05K0110 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.69458748867 Fans 19.2149721539 Lighting 19.4485561972 PCs 10.8710335449 Large computers servers 0.0 Printers 1.73708068903 Copiers 4.19310970082 Air compressors 0.0 Small...

  18. Sweden Building 05K0026 | Open Energy Information

    Open Energy Info (EERE)

    0.00307922272048 Fans 0.785650224215 Lighting 15.3000510733 PCs 6.62649476831 Large computers servers 12.5919282511 Printers 0.610612855007 Copiers 2.27952167414 Air...

  19. Sweden Building 05K0017 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 4.15013278976 Fans 14.2549696765 Lighting 17.1625971143 PCs 24.4079778393 Large computers servers 0.397396121884 Printers 0.673130193906 Copiers 0.0 Air compressors...

  20. Sweden Building 05K0106 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.74720935961 Fans 16.4639573071 Lighting 28.0321384425 PCs 3.75 Large computers servers 0.463535228677 Printers 0.939431396786 Copiers 0.865265760198 Air...

  1. Sweden Building 05K0004 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 4.33303636174 Fans 8.08671679198 Lighting 14.5539566929 PCs 22.9175048733 Large computers servers 3.90838206628 Printers 0.980506822612 Copiers 0.0 Air compressors...

  2. Sweden Building 05K0033 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 4.58929158641 Fans 20.6016582891 Lighting 43.0102707006 PCs 8.39197632358 Large computers servers 16.9957250904 Printers 1.40414337389 Copiers 2.64715554094 Air compressors...

  3. Sweden Building 05K0109 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 15.465507885 Fans 17.0920222635 Lighting 25.9249096338 PCs 6.74029126214 Large computers servers 83.9805825243 Printers 1.30582524272 Copiers 1.6140776699 Air compressors...

  4. Sweden Building 05K0103 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.39820853677 Fans 18.0824682326 Lighting 17.4953807391 PCs 4.79116022099 Large computers servers 12.5436464088 Printers 0.939226519337 Copiers 1.00552486188 Air...

  5. Sweden Building 05K0100 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 4.93723752273 Fans 12.6897353001 Lighting 16.3956718529 PCs 4.98373408769 Large computers servers 24.7807637907 Printers 1.23790664781 Copiers 1.6973125884 Air compressors...

  6. Sweden Building 05K0020 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 8.4307193046 Fans 43.1495834842 Lighting 17.1876638899 PCs 6.32492581602 Large computers servers 1.18694362018 Printers 0.944467994913 Copiers 1.92878338279 Air...

  7. Sweden Building 05K0079 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.49553835327 Fans 47.6734693878 Lighting 18.2296504809 PCs 7.55148956134 Large computers servers 12.9017124091 Printers 0.489795918367 Copiers 2.43959652827 Air...

  8. Sweden Building 05K0116 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.77644647831 Fans 6.21066454437 Lighting 17.2527027027 PCs 1.99512534819 Large computers servers 5.8495821727 Printers 0.69426183844 Copiers 0.877437325905 Air compressors...

  9. Sweden Building 05K0009 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.08636405861 Fans 12.8398873749 Lighting 19.44639866 PCs 8.50154616404 Large computers servers 0.556088941246 Printers 0.765719334413 Copiers 0.0 Air compressors...

  10. Sweden Building 05K0074 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 18.2046738442 Fans 11.4192526916 Lighting 7.88998957247 PCs 3.76187460418 Large computers servers 9.68967701077 Printers 0.126662444585 Copiers 1.23495883471 Air...

  11. Sweden Building 05K0078 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 0.0 Fans 9.77060382916 Lighting 20.64832 PCs 3.8215257732 Large computers servers 12.6432989691 Printers 0.221690721649 Copiers 0.0 Air compressors 0.0...

  12. Sweden Building 05K0102 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.66752151789 Fans 6.11865966546 Lighting 13.8817120623 PCs 3.85904044409 Large computers servers 0.0 Printers 0.591593973037 Copiers 0.753370340999 Air compressors 0.0...

  13. Sweden Building 05K0073 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 22.5943090538 Fans 15.6432947583 Lighting 12.917101147 PCs 6.6814159292 Large computers servers 0.0 Printers 1.03301565691 Copiers 2.68890401634 Air compressors 0.0 Small...

  14. Sweden Building 05K0035 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 5.74638957468 Fans 24.2121626361 Lighting 20.1286013564 PCs 5.72811396566 Large computers servers 21.4294411299 Printers 1.40021916474 Copiers 1.82637282357 Air compressors...

  15. Sweden Building 05K0031 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.41702182053 Fans 17.9903385632 Lighting 22.3347276342 PCs 7.25536463695 Large computers servers 17.4202232956 Printers 1.49576371843 Copiers 1.12043708924 Air compressors...

  16. Sweden Building 05K0087 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.10421539539 Fans 35.1439221294 Lighting 40.6627305825 PCs 16.3874545139 Large computers servers 0.0 Printers 1.78149367527 Copiers 1.05700918385 Air compressors 0.0 Small...

  17. Sweden Building 05K0056 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.26955758093 Fans 19.7547229418 Lighting 22.5300668799 PCs 5.81158779301 Large computers servers 0.0 Printers 0.207872622733 Copiers 0.94353530886 Air compressors 0.0...

  18. Sweden Building 05K0119 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 5.76333646055 Fans 35.779306592 Lighting 27.4242959918 PCs 3.22217039801 Large computers servers 0.0 Printers 1.30858208955 Copiers 2.76741293532 Air compressors 0.0 Small...

  19. Sweden Building 05K0008 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.32543498168 Fans 9.28527472527 Lighting 15.7053876478 PCs 4.66333333333 Large computers servers 0.0 Printers 0.0 Copiers 0.9 Air compressors 0.0 Small kitchens coffee...

  20. Sweden Building 05K0121 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.58728571429 Fans 9.8574829932 Lighting 20.7800475059 PCs 6.04166666667 Large computers servers 21.4285714286 Printers 2.80342857143 Copiers 4.04761904762 Air compressors...

  1. Sweden Building 05K0095 | Open Energy Information

    Open Energy Info (EERE)

    0.0 Pumps 6.36363636364 Fans 13.8257575758 Lighting 33.7833333333 PCs 9.6 Large computers servers 0.0 Printers 1.69090909091 Copiers 2.95454545455 Air compressors 0.0 Small...

  2. Sweden Building 05K0093 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.72005400564 Fans 11.1246557671 Lighting 13.4706806283 PCs 8.67063435899 Large computers servers 14.4365499476 Printers 0.527358677499 Copiers 0.404789537747 Air...

  3. Sweden Building 05K0024 | Open Energy Information

    Open Energy Info (EERE)

    0.0 Pumps 7.65624 Fans 15.177047619 Lighting 17.0866666667 PCs 19.8373333333 Large computers servers 3.33333333333 Printers 2.16666666667 Copiers 0.0 Air compressors...

  4. Sweden Building 05K0097 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 20.4080645161 Fans 14.3525345622 Lighting 29.7766129032 PCs 5.32258064516 Large computers servers 41.3709677419 Printers 0.607096774194 Copiers 2.17741935484 Air...

  5. Sweden Building 05K0036 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 0.25266214908 Fans 14.2724035403 Lighting 33.9042253521 PCs 2.70435624395 Large computers servers 0.580832526621 Printers 0.952100677638 Copiers 5.13068731849 Air...

  6. Sweden Building 05K0044 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 3.03758154663 Fans 29.2053648476 Lighting 30.8744894997 PCs 4.62831813576 Large computers servers 0.0 Printers 0.497467071935 Copiers 1.87436676798 Air compressors 0.0...

  7. Sweden Building 05K0062 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 8.17980140288 Fans 33.7522228809 Lighting 28.8652780488 PCs 8.39024390244 Large computers servers 28.487804878 Printers 1.65853658537 Copiers 2.9756097561 Air compressors...

  8. Sweden Building 05K0112 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.71160411287 Fans 15.0235284818 Lighting 27.2275862069 PCs 5.91119513095 Large computers servers 0.0 Printers 0.715971966064 Copiers 1.48469199557 Air compressors 0.0...

  9. Sweden Building 05K0052 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 8.42950780312 Fans 45.9566986795 Lighting 31.1885714286 PCs 20.5353535354 Large computers servers 0.0 Printers 6.57575757576 Copiers 7.77777777778 Air compressors...

  10. Sweden Building 05K0006 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 7.77750996655 Fans 10.358795651 Lighting 11.7758321884 PCs 15.790619252 Large computers servers 1.18332311465 Printers 1.27988963826 Copiers 0.0 Air compressors...

  11. Sweden Building 05K0065 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 10.0849476092 Fans 24.2333456316 Lighting 28.4191834304 PCs 6.41071428571 Large computers servers 18.7714285714 Printers 0.824142857143 Copiers 0.960714285714 Air...

  12. Sweden Building 05K0123 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.72333301399 Fans 21.7952946651 Lighting 57.1930369803 PCs 5.81490621915 Large computers servers 9.72852912142 Printers 0.602171767029 Copiers 0.888450148075 Air...

  13. ARM - Facility News Article

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    file storage needs of the ARM Data Management Facility (DMF) and ARM Engineering computers, a Network Appliance (NetApp) file server with 2.68 terabytes, or 2.95 trillion...

  14. Sweden Building 05K0045 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.5098099577 Fans 8.55190367719 Lighting 20.5245512528 PCs 2.58314350797 Large computers servers 1.39681093394 Printers 0.915170842825 Copiers 0.592255125285 Air...

  15. Sweden Building 05K0029 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.6977862717 Fans 13.9245261984 Lighting 14.9321389794 PCs 2.53065774805 Large computers servers 0.306577480491 Printers 0.869565217391 Copiers 0.0 Air compressors...

  16. Sweden Building 05K0022 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.28006123739 Fans 20.5123823529 Lighting 25.1803894588 PCs 4.07026470588 Large computers servers 4.63764705882 Printers 0.304458823529 Copiers 1.46764705882 Air...

  17. Sweden Building 05K0072 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 5.25384464286 Fans 22.9341666667 Lighting 35.104673408 PCs 7.58458595245 Large computers servers 13.1489477999 Printers 0.785733807051 Copiers 2.37769882482 Air...

  18. Sweden Building 05K0076 | Open Energy Information

    Open Energy Info (EERE)

    0.415166666667 Fans 26.9508108108 Lighting 23.0094594595 PCs 8.66306306306 Large computers servers 3.37837837838 Printers 0.857657657658 Copiers 1.12612612613 Air...

  19. Sweden Building 05K0007 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.66724551261 Fans 8.3953561818 Lighting 16.0796522459 PCs 5.8172794947 Large computers servers 11.4098804421 Printers 1.12158808933 Copiers 0.897811865554 Air...

  20. Sweden Building 05K0027 | Open Energy Information

    Open Energy Info (EERE)

    0.985448560167 Fans 11.0317374517 Lighting 53.2763256887 PCs 10.5045045045 Large computers servers 17.7567567568 Printers 6.53153153153 Copiers 2.97297297297 Air compressors...

  1. Sweden Building 05K0021 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.01549229692 Fans 25.5345938375 Lighting 26.5036109804 PCs 8.6421686747 Large computers servers 30.7338795181 Printers 1.88674698795 Copiers 3.32530120482 Air compressors...

  2. Sweden Building 05K0058 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 14.1813322476 Fans 39.9029071661 Lighting 41.1727792494 PCs 3.13488372093 Large computers servers 44.9815813953 Printers 0.748837209302 Copiers 1.07906976744 Air...

  3. Sweden Building 05K0001 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 6.37190900733 Fans 5.21311928139 Lighting 13.6004313481 PCs 26.0998626444 Large computers servers 2.88701226026 Printers 0.928422444931 Copiers 0.0 Air compressors...

  4. Sweden Building 05K0041 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 1.15208272877 Fans 13.3674808591 Lighting 12.4771102471 PCs 3.51637808532 Large computers servers 9.96766147604 Printers 0.2812326654 Copiers 1.15079113658 Air compressors...

  5. Sweden Building 05K0038 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 2.14823529412 Fans 29.9618889809 Lighting 32.7220779221 PCs 3.53514938489 Large computers servers 1.8453427065 Printers 2.2144112478 Copiers 0.0 Air compressors...

  6. Sweden Building 05K0055 | Open Energy Information

    Open Energy Info (EERE)

    Pumps 4.90151717184 Fans 20.3374503749 Lighting 15.5107629884 PCs 5.95191883547 Large computers servers 29.642699603 Printers 0.494044993383 Copiers 1.13365681517 Air compressors...

  7. Hopper compilers and DDT short outage next Wed, May 16

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    compilers and DDT short outage next Wed, May 16 Hopper compilers and DDT short outage next Wed, May 16 May 10, 2012 Due to a scheduled maintenance for the License Servers, most of...

  8. Outage Log

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10:00 - 16:50. No user impact was expected. These switches provide connectivity for the meta-data servers for homes, common, project, syscomm, dna and projectb. 111115 9:00...

  9. Fermilab Science Education Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Off or Not Supported in Your Browser. You can still access all of the content on the Education Server about Science Education, but turn on JavaScript to enable all this site's...

  10. CX-005023: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Energy Efficiency and Conservation Block Grant - Server Virtualization ProjectCX(s) Applied: B5.1Date: 01/13/2011Location(s): Loudon County, VirginiaOffice(s): Energy Efficiency and Renewable Energy, Golden Field Office

  11. Docker File System Isolation By Darrin Schmitz David Huff Destiny...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Docker File System Isolation By Darrin Schmitz David Huff Destiny Velasquez 1 LA-UR-15-25911 Specifications * HP ProLiant DL380p Gen8 servers * Head node has 32 cores and 32 GB RAM...

  12. Safeguards and Security appointments made | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a student and then working in areas of IT including desktop support, server support, and cyber security program as a P&S staff member. He is also pursuing a Ph.D. degree in...

  13. SeaMicro | Open Energy Information

    Open Energy Info (EERE)

    SeaMicro Jump to: navigation, search Name: SeaMicro Place: Santa Clara, California Zip: 95054 Product: SeaMicro develops energy efficient server systems and is backed by Khosla...

  14. Presentation title

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HPC means being able to work productively on remote machines Linux OSX Windows Multiple hop SSH RSA + Cryptocard Uses server license Submit to job queues or run interactively on...

  15. Oracle Management Tool Suite

    Energy Science and Technology Software Center (OSTI)

    2007-06-01

    The Oracle Management Tool Suite is used to automatically manage Oracle based systems. This includes startup and shutdown of databases and application servers as well as backup, space management, workload management and log file management.

  16. Software Talk [Compatibility Mode

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    First installation on BL 2-1 CSS spec Direct connection (SCSI) 3rd party user code Current layout on spec diffraction beamlines TCP Ethernet spec InfoServer GUI spec client...

  17. HPSS Outage Tue Mar 19 - Fri Mar 22

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of the HPSS client software tools hsi and htar. Note that if you use a "regular" ftp client, your current client will work with the new version of the HPSS server software....

  18. CX-001007: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Recovery Act: SeaMicro Volume Server Power ReductionCX(s) Applied: A9, B3.6Date: 03/02/2010Location(s): CaliforniaOffice(s): Energy Efficiency and Renewable Energy, Golden Field Office

  19. OSTI, US Dept of Energy, Office of Scientific and Technical Informatio...

    Office of Scientific and Technical Information (OSTI)

    ... technology will be there for them when they are ready.Server Hardware is becoming cheaper and faster, in line with Moore's Law (http:en.wikipedia.orgwikiMoore%27slaw). ...

  20. Bytes and BTUs: Holistic Approaches to Data Center Energy Efficiency

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    centers are highly energy-intensive facilities * 10-100x more energy intensive than an office. * Server racks well in excess of 30kW. * Surging demand for data storage. * EPA...

  1. Microsoft Word - EPM strategy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Tool Access The CASL EPM tool will be installed and accessible on the casl-dev server (John Turner: system owner) and shall require utilization of LDAP and existing UCAMS ID login...

  2. BPA-2013-00361-FOIA Correspondence

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4, 2013, was received in this office on Wednesday, January 9, 2013, due to a server migration that caused a delay in syncing with the FOIA Office's electronic mailbox. We...

  3. Comment and Response Management System

    Energy Science and Technology Software Center (OSTI)

    1998-06-09

    CRMS is a Web-based client/server application that helps manage, track, and report on institutional responses to public comments on published documents such as environmental impact statements.

  4. FAQs for Survey Forms EIA-826

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    Make sure that you're using Google Chrome or Internet Explorer as your web browser; ... User gets blank web page (IE) "Your connection to the server was interrupted" before the ...

  5. March 15

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    too many jobs, too long jobs; we don't want to auto-kill as it is more difficult with NX being used a lot Grid issues: ATLAS needs permissions changed; server doesn't seem to be...

  6. NERSC Users Group Teleconference May 12

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    next NUG teleconference is Thursday May 12, at 11:00 AM Pacific time. On the agenda: new NX server wait times table for nodes requested versus hours requested: Jobs Summary...

  7. Transportation Routing Analysis Geographic Information System (TRAGIS) User's Manual

    SciTech Connect (OSTI)

    Johnson, PE

    2003-09-18

    The Transportation Routing Analysis Geographic Information System (TRAGIS) model is used to calculate highway, rail, or waterway routes within the United States. TRAGIS is a client-server application with the user interface and map data files residing on the user's personal computer and the routing engine and network data files on a network server. The user's manual provides documentation on installation and the use of the many features of the model.

  8. Akenti Authorization System

    Energy Science and Technology Software Center (OSTI)

    2000-06-01

    Akenti is an authorization service for distributed resources. The authorization policy is kept in distributed certificates signed by one or more stakeholders for the resources. The package consists of the following components: Java GUI tools to create and sign the policy certificates C++ libraries to do make acess decisions based on the policy certificates A standalone authorization server that make access decisions C interfaces to the libraries and server

  9. OSTI, US Dept of Energy, Office of Scientific and Technical Information |

    Office of Scientific and Technical Information (OSTI)

    Speeding access to science information from DOE and Beyond establishment of an Open Archives Initiative (OAI) server, which immediately opened more than 108,000 DOE scientific and technical reports for harvesting by the National Science Digital Library (NSDL) and other OAI users. Establishment of an OAI server achieves broader exposure of searchable science through OSTI's suite of R&D databases. By becoming a data provider adopting the OAI technical framework, OSTI took another step

  10. Data Management at SSRL | Stanford Synchrotron Radiation Lightsource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management at SSRL SSRL Users are responsible for meeting the Data Management obligations of their home institutions and granting agencies. In general, SSRL provides data acquisition systems (computers/software) and short term data storage on all of its beam lines. The beam line computers are connected to central servers via a high speed network, and data are transferred to these servers for backup and short-term storage. SSRL does not provide long term storage or archiving of data; users must

  11. Disclaimers | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disclaimers NOTICE: Information from this server resides on a computer system funded by the U. S. Department of Energy. Anyone using this system consents to monitoring of this use by system or security personnel. DISCLAIMER OF LIABILITY: With respect to documents available from this server, neither the United States Government nor Iowa State University nor any of their employees, makes any warranty, express or implied, including warranties of merchantability and fitness for a particular purpose,

  12. Disclaimers | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disclaimers NOTICE: Information from this server resides on a computer system funded by the U. S. Department of Energy. Anyone using this system consents to monitoring of this use by system or security personnel. DISCLAIMER OF LIABILITY: With respect to documents available from this server, neither the United States Government nor Iowa State University nor any of their employees, makes any warranty, express or implied, including warranties of merchantability and fitness for a particular purpose,

  13. WIPP Privacy Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    WIPP Privacy Policy and Disclaimers NOTICE: The Waste Isolation Pilot Plant (WIPP) Internet Server is provided as a service of the Department of Energy (DOE) for distribution of publicly available information and is maintained by the WIPP for the National Transuranic Waste Program. The WIPP is an agency of the Federal Government of the United States of America. Use of the WIPP Internet Server is intended only for the retrieval of information available through WIPP Internet documents. Only

  14. U-039: ISC Update: BIND 9 Resolver crashes after logging an error in query.c

    Broader source: Energy.gov [DOE]

    A remote server can cause the target connected client to crash. Organizations across the Internet are reporting crashes interrupting service on BIND 9 nameservers performing recursive queries. Affected servers crash after logging an error in query.c with the following message: "INSIST(! dns_rdataset_isassociated(sigrdataset))" Multiple versions are reported as being affected, including all currently supported release versions of ISC BIND 9. ISC is actively investigating the root cause and working to produce patches which avoid the crash.

  15. U-038: BIND 9 Resolver crashes after logging an error in query.c

    Broader source: Energy.gov [DOE]

    A remote server can cause the target connected client to crash. Organizations across the Internet are reporting crashes interrupting service on BIND 9 nameservers performing recursive queries. Affected servers crash after logging an error in query.c with the following message: "INSIST(! dns_rdataset_isassociated(sigrdataset))" Multiple versions are reported as being affected, including all currently supported release versions of ISC BIND 9. ISC is actively investigating the root cause and working to produce patches which avoid the crash.

  16. CONFIGURATION CHANGE PROPOSAL (CCP)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Change Request | Domain Name Server (DNS) Change | | This change request form is to share information on domain name server changes, new requirements, modifications, or enhancements within the DOE Headquarters programmatic and office management areas. This change request should be forwarded to the Domain Management Team (DL-Domain.Management@hq.doe.gov) for validation, review and discussion. Detailed instructions are available at https://powerpedia.energy.gov/wiki/Domain_change_process. |

  17. CONFIGURATION CHANGE PROPOSAL FORM | Department of Energy

    Energy Savers [EERE]

    CONFIGURATION CHANGE PROPOSAL FORM CONFIGURATION CHANGE PROPOSAL FORM This form is used for sharing information on Domain Name Server (DNS) changes, new requirements, modifications or enhancements within the DOE Headquarters Programmatic and Office Management Areas. Microsoft Office document icon This form is used for sharing information on Domain Name Server (DNS) changes, new requirements, modifications or enhancements within the DOE Headquarters Programmatic and Office Management Areas. More

  18. None

    Energy Science and Technology Software Center (OSTI)

    2002-10-01

    This application consists of both client-side and server-side code that can be used to identify unauthorized relocation and use of portable computer equipment. In the client side, the program is called from the system registry and sends the computer identification and current IP address to a corporate server when the client is used to connect to the Intenet. This code can also be used on desktop workstations, and works both off-site and on-site. The client-sidemore » code is installed in a common Windows directory. When the machine is started up, the program is called from the system registry and attempts to connect to a corporate-managed web servedr every two minutes until successful. This process is transparent to the user. The server communicates with a database that contains all the last known (authorized) locations of equipment. If the client has been moved or has an unauthorized (off0site) address, the server will request current location information from the client. The client obtains information from the hardware configuration including network information, previous Ethernet connections, and any dial-in (per session) information. Once this information has been submitted to the server, the client-side program shuts down and unloads itself from memory. If the server identifies that the client has been moved to an unauthorized location, an email is sent immediately to a predetermined person. Each night, the server archives the database of equipment locations and sends and email to a predetermined person.« less

  19. Federal Emergency Management Information System (FEMIS) system administration guide, version 1.4.5

    SciTech Connect (OSTI)

    Arp, J.A.; Burnett, R.A.; Carter, R.J.

    1998-06-26

    The Federal Emergency Management Information Systems (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the US Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are connected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication, data distribution, and notification functionality necessary to operate FEMIS in a networked, client/server environment. The UNIX server provides an Oracle relational database management system (RDBMS) services, ARC/INFO GIS (optional) capabilities, and basic file management services. PNNL developed utilities that reside on the server include the Notification Service, the Command Service that executes the evacuation model, and AutoRecovery. To operate FEMIS, the Application Software must have access to a site specific FEMIS emergency management database. Data that pertains to an individual EOC`s jurisdiction is stored on the EOC`s local server. Information that needs to be accessible to all EOCs is automatically distributed by the FEMIS database to the other EOCs at the site.

  20. Serial and Westmere Queues on Carver

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Westmere Queues on Carver Serial and Westmere Queues on Carver September 20, 2011 by Francesca Verdier NERSC has replaced 80 8-core Intel Nehalem nodes on Carver with 80 12-core Intel Westmere nodes. The new processors run at the same frequency as those they replace, but have slightly larger caches. Also, the Westmere nodes are populated with 48GB of memory; the memory runs at 1333MHz. This new hardware serves two purposes. First, it provides access to more memory (48GB) than is available on

  1. Power5_NUG_final.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Bassi/Power5 Architecture John Shalf NERSC Users Group Meeting Princeton Plasma Physics Laboratory June 2005 Office of Science U.S. Department of Energy POWER5 IH Overview . POWER5 IH System  2U rack chassis Rack: 24" X 43 " Deep, Full Drawer POWER5 IH Node Architecture 4W or 8W POWER5 Processors L3 Cache 144MB / 288MB (total) Memory 2GB - 128/256GB Packaging 2U ( 24" rack ) 16 Nodes / Rack DASD / Bays 2 DASD ( Hot Plug) I/O Expansion 6 slots ( Blindswap) Integrated SCSI

  2. Local rollback for fault-tolerance in parallel computing systems

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Yorktown Heights, NY); Chen, Dong (Yorktown Heights, NY); Gara, Alan (Yorktown Heights, NY); Giampapa, Mark E. (Yorktown Heights, NY); Heidelberger, Philip (Yorktown Heights, NY); Ohmacht, Martin (Yorktown Heights, NY); Steinmacher-Burow, Burkhard (Boeblingen, DE); Sugavanam, Krishnan (Yorktown Heights, NY)

    2012-01-24

    A control logic device performs a local rollback in a parallel super computing system. The super computing system includes at least one cache memory device. The control logic device determines a local rollback interval. The control logic device runs at least one instruction in the local rollback interval. The control logic device evaluates whether an unrecoverable condition occurs while running the at least one instruction during the local rollback interval. The control logic device checks whether an error occurs during the local rollback. The control logic device restarts the local rollback interval if the error occurs and the unrecoverable condition does not occur during the local rollback interval.

  3. Featured Announcements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    September 2011 Serial and Westmere Queues on Carver September 20, 2011 by Francesca Verdier NERSC has replaced 80 8-core Intel Nehalem nodes on Carver with 80 12-core Intel Westmere nodes. The new processors run at the same frequency as those they replace, but have slightly larger caches. Also, the Westmere nodes are populated with 48GB of memory; the memory runs at 1333MHz. This new hardware serves two purposes. First, it provides access to more memory (48GB) than is available on other Carver

  4. HSI Tape Ordering

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Tape Ordering HSI Tape Ordering General Procedure If you are retrieving multiple files from HPSS, it is best to order your retrieval requests in a way that makes sense for the HPSS system. In HPSS, files initially go onto a disk cache and migrate to tape as time passes. This means that files that were put into HPSS at the same time could end up spread across multiple tapes. Since each tape must by loaded into the reader, it will be fastest if you order your requests so that you are pulling all

  5. NERSC.COE.key.actions-4.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NERSC8 CoE Key Actions when optimizing for KNL Nathan Wichmann wichmann@cray.com Outline 2/24/2014 Cray Private 2 Characterization and Multi-node Considerations ● Target Science ● Profiles and Hotspots ● Scaling and Communication Single node optimizations ● Memory and cache footprint analysis ● Memory bandwidth requirements ● Vectorization ● Creating a kernel to aid in further analysis and testing Example: BerkeleyGW - FF kernel What Science do you want to run on Cori 3 Identify 1

  6. Multiprocessor system with multiple concurrent modes of execution

    DOE Patents [OSTI]

    Ahn, Daniel; Ceze, Luis H; Chen, Dong; Gara, Alan; Heidelberger, Philip; Ohmacht, Martin

    2013-12-31

    A multiprocessor system supports multiple concurrent modes of speculative execution. Speculation identification numbers (IDs) are allocated to speculative threads from a pool of available numbers. The pool is divided into domains, with each domain being assigned to a mode of speculation. Modes of speculation include TM, TLS, and rollback. Allocation of the IDs is carried out with respect to a central state table and using hardware pointers. The IDs are used for writing different versions of speculative results in different ways of a set in a cache memory.

  7. Locality-Aware Parallel Process Mapping for Multi-Core HPC Systems

    SciTech Connect (OSTI)

    Hursey, Joshua J; Squyres, Jeffrey M.; Dontje, Terry

    2011-01-01

    High Performance Computing (HPC) systems are composed of servers containing an ever-increasing number of cores. With such high processor core counts, non-uniform memory access (NUMA) architectures are almost universally used to reduce inter-processor and memory communication bottlenecks by distributing processors and memory throughout a server-internal networking topology. Application studies have shown that the tuning of processes placement in a server s NUMA networking topology to the application can have a dramatic impact on performance. The performance implications are magnified when running a parallel job across multiple server nodes, especially with large scale HPC applications. This paper presents the Locality-Aware Mapping Algorithm (LAMA) for distributing the individual processes of a parallel application across processing resources in an HPC system, paying particular attention to the internal server NUMA topologies. The algorithm is able to support both homogeneous and heterogeneous hardware systems, and dynamically adapts to the available hardware and user-specified process layout at run-time. As implemented in Open MPI, the LAMA provides 362,880 mapping permutations and is able to naturally scale out to additional hardware resources as they become available in future architectures.

  8. Integrated Management Tracking System

    Energy Science and Technology Software Center (OSTI)

    2000-03-30

    The Integrated Management Tracking System (IMTS) is a "Web Enabled" Client/Server Business application that provides for the Identification and Resolution of commitments, situations, events and problems. The IMTS engine is written with Microsoft Active Server Pages (ASP) for IIS4. The system provides for reporting, entering, editing, closing and administration over a Intranet, Extranet or Internet. This Application facilitates: Electronic assignment, acceptance and tracking to completion. Email notifications of assigned action. Establishment of Due Dates. Electronicmore » search and retrieval based on keywords in combination with user specified database parameters (Document Type, Date Ranges, etc.). Coded for Trending and Reporting. User selected reports. Various levels of access for reports and administration. The "Server" side of this application consists of a Microsoft Access database running on a NT Server with Internet Information Server (IIS). As the "Client" side of the application runs on any Web browser, this solution is a cost effective, user friendly application that lends itself to organizations not physically colocated in one location providing information immediately available to everyone at once.« less

  9. Energy Performance Testing of Asetek's RackCDU System at NREL's High Performance Computing Data Center

    SciTech Connect (OSTI)

    Sickinger, D.; Van Geet, O.; Ravenscroft, C.

    2014-11-01

    In this study, we report on the first tests of Asetek's RackCDU direct-to-chip liquid cooling system for servers at NREL's ESIF data center. The system was simple to install on the existing servers and integrated directly into the data center's existing hydronics system. The focus of this study was to explore the total cooling energy savings and potential for waste-heat recovery of this warm-water liquid cooling system. RackCDU captured up to 64% of server heat into the liquid stream at an outlet temperature of 89 degrees F, and 48% at outlet temperatures approaching 100 degrees F. This system was designed to capture heat from the CPUs only, indicating a potential for increased heat capture if memory cooling was included. Reduced temperatures inside the servers caused all fans to reduce power to the lowest possible BIOS setting, indicating further energy savings potential if additional fan control is included. Preliminary studies manually reducing fan speed (and even removing fans) validated this potential savings but could not be optimized for these working servers. The Asetek direct-to-chip liquid cooling system has been in operation with users for 16 months with no necessary maintenance and no leaks.

  10. Los Alamos National Laboratory 4D Database

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-02

    4D is an integrated development platform - a single product comprised of the components you need to create and distribute professional applications. You get a graphical design environment, SQL database, a programming language, integrated PHP execution, HTTP server, application server, executable generator, and much more. 4D offers multi-platform development and deployment, meaning whatever you create on a Mac can be used on Windows, and vice-versa. Beyond productive development, 4D is renowned for its great flexibility in maintenance and modification of existing applications, and its extreme ease of implementation in its numerous deployment options. Your professional application can be put into production more quickly, at a lower cost, and will always be instantly scalable. 4D makes it easy, whether you're looking to create a classic desktop application, a client-server system, a distributed solution for Web or mobile clients - or all of the above!

  11. Request queues for interactive clients in a shared file system of a parallel computing system

    DOE Patents [OSTI]

    Bent, John M.; Faibish, Sorin

    2015-08-18

    Interactive requests are processed from users of log-in nodes. A metadata server node is provided for use in a file system shared by one or more interactive nodes and one or more batch nodes. The interactive nodes comprise interactive clients to execute interactive tasks and the batch nodes execute batch jobs for one or more batch clients. The metadata server node comprises a virtual machine monitor; an interactive client proxy to store metadata requests from the interactive clients in an interactive client queue; a batch client proxy to store metadata requests from the batch clients in a batch client queue; and a metadata server to store the metadata requests from the interactive client queue and the batch client queue in a metadata queue based on an allocation of resources by the virtual machine monitor. The metadata requests can be prioritized, for example, based on one or more of a predefined policy and predefined rules.

  12. CMLOG: A common message logging system

    SciTech Connect (OSTI)

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-12-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems.

  13. PDSF Selected Announcements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    May 2011 PDSF downtime 6/1/11 May 25, 2011 by Eric Hjort In conjunction with the previously announced NERSC downtime for network maintenance on Wednesday, June 1, PDSF will be down from 8am-3pm. The main purpose of this downtime will be to migrate the home filesystem to new hardware. All io resources will be set to zero 12 hours before the downtime begins. Read the full post New NERSC NX server May 25, 2011 by Eric Hjort Many of you have used the PDSF NX server to accelerate your remote

  14. Personalized professional content recommendation

    DOE Patents [OSTI]

    Xu, Songhua

    2015-10-27

    A personalized content recommendation system includes a client interface configured to automatically monitor a user's information data stream transmitted on the Internet. A hybrid contextual behavioral and collaborative personal interest inference engine resident to a non-transient media generates automatic predictions about the interests of individual users of the system. A database server retains the user's personal interest profile based on a plurality of monitored information. The system also includes a server programmed to filter items in an incoming information stream with the personal interest profile and is further programmed to identify only those items of the incoming information stream that substantially match the personal interest profile.

  15. Personalized professional content recommendation

    DOE Patents [OSTI]

    Xu, Songhua

    2015-11-05

    A personalized content recommendation system includes a client interface configured to automatically monitor a user's information data stream transmitted on the Internet. A hybrid contextual behavioral and collaborative personal interest inference engine resident to a non-transient media generates automatic predictions about the interests of individual users of the system. A database server retains the user's personal interest profile based on a plurality of monitored information. The system also includes a server programmed to filter items in an incoming information stream with the personal interest profile and is further programmed to identify only those items of the incoming information stream that substantially match the personal interest profile.

  16. Computerized procedures system

    DOE Patents [OSTI]

    Lipner, Melvin H. (Monroeville, PA); Mundy, Roger A. (North Huntingdon, PA); Franusich, Michael D. (Upper St. Clair, PA)

    2010-10-12

    An online data driven computerized procedures system that guides an operator through a complex process facility's operating procedures. The system monitors plant data, processes the data and then, based upon this processing, presents the status of the current procedure step and/or substep to the operator. The system supports multiple users and a single procedure definition supports several interface formats that can be tailored to the individual user. Layered security controls access privileges and revisions are version controlled. The procedures run on a server that is platform independent of the user workstations that the server interfaces with and the user interface supports diverse procedural views.

  17. OSTI, US Dept of Energy, Office of Scientific and Technical Information |

    Office of Scientific and Technical Information (OSTI)

    Speeding access to science information from DOE and Beyond Submitter Responsibilities AN 241.1 Users AN 241.3 Users DO NOT encrypt or password-protect STI products. * * Do inform OSTI when permanently removing STI from your site's publicly accessible server. * Do inform OSTI when your site's publicly accessible server, hosting STI products, changes. * Do update E-Link metadata when access limitations change for STI products. * Do replace full-text STI via E-Link upload or URL for STI

  18. Recovery Act: Data Center Transfer from “Always On” to “Always Available” to Reduce Power

    SciTech Connect (OSTI)

    Pfeiffer, Clemens; Kulali, Emre

    2012-12-31

    The project encompasses the solution to the problem of underutilized IT resources in and across data centers, which is to develop an “On Demand” operational model. Within this context, by keeping the optimum number of servers online at any time to meet actual customer demand, data center operators are able to generate significant cost and energy savings. Servers that are not needed to meet demand are taken offline automatically. They are brought online dynamically as demand increases, thus matching customer demand with the computing supply needed to guarantee expected service levels. The swings between peak and non-peak usage become a cost reduction opportunity.

  19. Middleware Automated Deployment Utilities - MRW Suite

    Energy Science and Technology Software Center (OSTI)

    2014-09-18

    The Middleware Automated Deployment Utilities consists the these three components: MAD: Utility designed to automate the deployment of java applications to multiple java application servers. The product contains a front end web utility and backend deployment scripts. MAR: Web front end to maintain and update the components inside database. MWR-Encrypt: Web utility to convert a text string to an encrypted string that is used by the Oracle Weblogic application server. The encryption is done usingmore » the built in functions if the Oracle Weblogic product and is mainly used to create an encrypted version of a database password.« less

  20. Hopper:Improving I/O performance to GSCRATCH and PROJECT

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    GSCRATCH/PROJECT Performance Tuning on Hopper Hopper:Improving I/O performance to GSCRATCH and PROJECT What are GSCRATCH/PROJECT? GSCRATCH and PROJECT are two file systems at NERSC that one can access on most computational systems. They are both based on the IBM GPFS file system and have multiple racks of dedicated servers and disk arrays. How are GSCRATCH/PROJECT connected to Hopper? As shown in the figure below, GSCRATCH and PROJECT are each connected to several Private NSD Servers (PNSD; for

  1. W-026 acceptance test plan plant control system hardware (submittal {number_sign} 216)

    SciTech Connect (OSTI)

    Watson, T.L., Fluor Daniel Hanford

    1997-02-14

    Acceptance Testing of the WRAP 1 Plant Control System Hardware will be conducted throughout the construction of WRAP I with the final testing on the Process Area hardware being completed in November 1996. The hardware tests will be broken out by the following functional areas; Local Control Units, Operator Control Stations in the WRAP Control Room, DMS Server, PCS Server, Operator Interface Units, printers, DNS terminals, WRAP Local Area Network/Communications, and bar code equipment. This document will contain completed copies of each of the hardware tests along with the applicable test logs and completed test exception reports.

  2. T.Rex Visual Analytics for Transactional Exploration

    ScienceCinema (OSTI)

    None

    2014-07-16

    T.Rex is PNNL's visual analytics tool that specializes in tabular structured data, like you might open with Excel. It's a client-server application, allowing the server to do a lot of the heavy lifting and the client to open spreadsheets with millions of rows. With datasets of that size, especially if you're unfamiliar with the contents, it's very hard to get a good grasp of what's in it using traditional tools. With T.Rex, the multiple views allow you to see categorical, temporal, numerical, relational, and summary data. The interactivity lets you look across your data and see how things relate to each other.

  3. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Energy Savers [EERE]

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  4. Microsoft Word - config item

    Office of Environmental Management (EM)

    CITSS Configurable Item List COTS Software CITSS Configurable Items Page 1 January 1998 CI # CITSS Function Vendor/Version Install Date Location Description/Notes SW-001 Data Base Server Operating System DEC Unix 4.0a 12/05/97 G'tn CA-001 SW-002 Application Server Operating System Novell 3.12 (250 User License) 10/01/97 G'tn C-065A SW-003 Relational Data Base System Oracle 7.3.3 for Unix 4.0a 12/05/97 G'tn CA-001 SW-004 Report Generation Tool Crystal Reports Professional 5.0 10/01/97 QO 370

  5. Proceedings: Sisal `93

    SciTech Connect (OSTI)

    Feo, J.T.

    1993-10-01

    This report contain papers on: Programmability and performance issues; The case of an iterative partial differential equation solver; Implementing the kernal of the Australian Region Weather Prediction Model in Sisal; Even and quarter-even prime length symmetric FFTs and their Sisal Implementations; Top-down thread generation for Sisal; Overlapping communications and computations on NUMA architechtures; Compiling technique based on dataflow analysis for funtional programming language Valid; Copy elimination for true multidimensional arrays in Sisal 2.0; Increasing parallelism for an optimization that reduces copying in IF2 graphs; Caching in on Sisal; Cache performance of Sisal Vs. FORTRAN; FFT algorithms on a shared-memory multiprocessor; A parallel implementation of nonnumeric search problems in Sisal; Computer vision algorithms in Sisal; Compilation of Sisal for a high-performance data driven vector processor; Sisal on distributed memory machines; A virtual shared addressing system for distributed memory Sisal; Developing a high-performance FFT algorithm in Sisal for a vector supercomputer; Implementation issues for IF2 on a static data-flow architechture; and Systematic control of parallelism in array-based data-flow computation. Selected papers have been indexed separately for inclusion in the Energy Science and Technology Database.

  6. Efficient Aho-Corasick String Matching on Emerging Multicore Architectures

    SciTech Connect (OSTI)

    Tumeo, Antonino; Villa, Oreste; Secchi, Simone; Chavarra-Miranda, Daniel

    2013-12-12

    String matching algorithms are critical to several scientific fields. Beside text processing and databases, emerging applications such as DNA protein sequence analysis, data mining, information security software, antivirus, ma- chine learning, all exploit string matching algorithms [3]. All these applica- tions usually process large quantity of textual data, require high performance and/or predictable execution times. Among all the string matching algorithms, one of the most studied, especially for text processing and security applica- tions, is the Aho-Corasick algorithm. 1 2 Book title goes here Aho-Corasick is an exact, multi-pattern string matching algorithm which performs the search in a time linearly proportional to the length of the input text independently from pattern set size. However, depending on the imple- mentation, when the number of patterns increase, the memory occupation may raise drastically. In turn, this can lead to significant variability in the performance, due to the memory access times and the caching effects. This is a significant concern for many mission critical applications and modern high performance architectures. For example, security applications such as Network Intrusion Detection Systems (NIDS), must be able to scan network traffic against very large dictionaries in real time. Modern Ethernet links reach up to 10 Gbps, and malicious threats are already well over 1 million, and expo- nentially growing [28]. When performing the search, a NIDS should not slow down the network, or let network packets pass unchecked. Nevertheless, on the current state-of-the-art cache based processors, there may be a large per- formance variability when dealing with big dictionaries and inputs that have different frequencies of matching patterns. In particular, when few patterns are matched and they are all in the cache, the procedure is fast. Instead, when they are not in the cache, often because many patterns are matched and the caches are continuously thrashed, they should be retrieved from the system memory and the procedure is slowed down by the increased latency. Efficient implementations of string matching algorithms have been the fo- cus of several works, targeting Field Programmable Gate Arrays [4, 25, 15, 5], highly multi-threaded solutions like the Cray XMT [34], multicore proces- sors [19] or heterogeneous processors like the Cell Broadband Engine [35, 22]. Recently, several researchers have also started to investigate the use Graphic Processing Units (GPUs) for string matching algorithms in security applica- tions [20, 10, 32, 33]. Most of these approaches mainly focus on reaching high peak performance, or try to optimize the memory occupation, rather than looking at performance stability. However, hardware solutions supports only small dictionary sizes due to lack of memory and are difficult to customize, while platforms such as the Cell/B.E. are very complex to program.

  7. NX Configuration File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Configuration File NX Configuration File This is the NX configuration file that you will need to connect to NERSC NX Server: NX5Confgure.nxs.zip To use this file, please follow the Online Tutorial. Last edited: 2016-02-01 08:11:29

  8. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  9. Saving Energy at Data Centers

    SciTech Connect (OSTI)

    2007-10-12

    Data centers provide mission-critical computing functions essential to the daily operation of top U.S. economic, scientific, and technological organizations. These data centers consume large amounts of energy to run and maintain their computer systems, servers, and associated high-performance components.

  10. CMI Guidance Documents | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CMI Guidance Documents This page has links to pdf versions of CMI Guidance Documents for CMI staff: Publication process flow chart Acknowledgement text Foreign travel Press releases IP protection The Microsoft Word versions of these, and additional guidance documents, are available in the data storage server. Tags: guidance document

  11. GLobal Ocean Data Analysis Project (GLODAP): Data and Analyses

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Sabine, C. L.; Key, R. M.; Feely, R. A.; Bullister, J. L.; Millero, F. J.; Wanninkhof, R.; Peng, T. H.; Kozyr, A.

    GLODAP information available through CDIAC includes gridded and bottle data, a live server, an interactive atlas that provides access to data plots, and other tools for viewing and interacting with the data. [from http://cdiac.esd.ornl.gov/oceans/glodap/Glopintrod.htm](Specialized Interface)

  12. LBNL SecureMessaging

    Energy Science and Technology Software Center (OSTI)

    2003-03-17

    The LBNLSecureMessaging application enables collaboration among colocated or geograhically dispersed users by supporting secure synchronous and asynchronous communication. This application is the graphical user interface client that is meant to be used in conjunction with servers (LBNL's PCCEServer and a customized IRC server) to allow group and one-to-one conversations via text-based instant messaging. Conversations may be private (by invitation only) or public (open to any member of a collaboratory group_ and they may be permanentmore » and on-going or temporary and ad hoc. Users may leave notes for other people who are online or offline. By providing presence and awareness information, collaborators can easily locate each other and rendezvous. Written in Java/Swing, this application is cross-platform. To gain access to functionality, users have to be registered with an authorization server (PCCEServer) that maintains an access control list. Thus a collaboration group is comprised of a set of PCCE-registered users. Registered users can log in via either X.509 certificate or a username and password combination. PKI and SSL are used to authenticate servers and clients and to encrypt messages sent over the network. The LBNLSecureMessaging application offers instant messaging capabilities in a secure environment that provides data integrity, privacyk authorization, and authentication.« less

  13. Metadata management staging system

    Energy Science and Technology Software Center (OSTI)

    2013-08-01

    Django application providing a user-interface for building a file and metadata management system. An evolution of our Node.js and CouchDb metadata management system. This one focuses on server functionality and uses a well-documented, rational and REST-ful API for data access.

  14. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  15. Reference set of regulons in Desulfovibrionales inferred by comparative genomics approach

    SciTech Connect (OSTI)

    Kazakov, A.E.; Rodionov, D.A.; Price, M.N.; Arkin, A.P.; Dubchak, I.; Novichkov, P.S.

    2010-11-15

    in this study, we carried out large-scale comparative genomics analysis of regulatory interactions in Desulfovibrio vulgaris and 12 related genomes from Desulfovibrionales order using our recently developed web server RegPredict (http://regpredict.lbl.gov). An overall reference collection of 26 Desulfovibrionales regulogs can be accessed through RegPrecise database (http://regpredict.lbl.gov).

  16. Sweden Building 05K0059 | Open Energy Information

    Open Energy Info (EERE)

    used for cooling 0.0 Pumps 0.0 Fans 18.98 Lighting 18.421875 PCs 7.78501872659 Large computers servers 0.0 Printers 1.93137078652 Copiers 5.61797752809 Air compressors 0.0 Small...

  17. Raptor: An Enterprise Knowledge Discovery Engine Version 2.0

    Energy Science and Technology Software Center (OSTI)

    2011-08-31

    The Raptor Version 2.0 computer code uses a set of documents as seed documents to recommend documents of interest from a large, target set of documents. The computer code provides results that show the recommended documents with the highest similarity to the seed documents. Version 2.0 was specifically developed to work with SharePoint 2007 and MS SQL server.

  18. OMERO

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Omero OMERO Description and Overview OMERO is a client-server software for visualization, management and analysis of biological microscope images. To use OMERO as a science gateways request a PostgreSQL using this form. For detailed information about OMERO please visit the official Open Microscopy Environment - OME documentation. Last edited: 2015-06-17 17:27:11

  19. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  20. Logs Perl Module

    Energy Science and Technology Software Center (OSTI)

    2007-04-04

    A perl module designed to read and parse the voluminous set of event or accounting log files produced by a Portable Batch System (PBS) server. This module can filter on date-time and/or record type. The data can be returned in a variety of formats.

  1. Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.4.6

    SciTech Connect (OSTI)

    Arp, J.A.; Bower, J.C.; Burnett, R.A.; Carter, R.J.; Downing, T.R.; Fangman, P.M.; Gerhardstein, L.H.; Homer, B.J.; Johnson, D.M.; Johnson, R.L.; Johnson, S.M.; Loveall, R.M.; Martin, T.J.; Millard, W.D.; Schulze, S.A.; Stoops, L.R.; Tzemos, S.; Wood, B.M.

    1999-06-29

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are corrected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication data distribution and notification functionality necessary to operate FEMIS in a networked, client/server environment.

  2. File Transfer Protocol Guard Version 1.5

    Energy Science and Technology Software Center (OSTI)

    1999-01-13

    The FTP Guard provides a means for securely transferring files from an unclassified network to a classified network. Files are moved using the FTP protocol. To a user, the FTP Guard appears to be an FTP proxy server. The FTP Guard does not move files from the classified network to the unclassified network.

  3. Universities & Libraries | OSTI, US Dept of Energy, Office of Scientific

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Technical Information Universities & Libraries Communications Home | OSTI News | Publications | Speeches and Presentations | Flyers | Posters | Videos | Mobile Gallery OSTI connects with university research departments and libraries across the nation to increase awareness of DOE's valuable scientific and technical information. Library Tools DOE MARC Records System Open Archives Initiative (OAI) Server XML Data Services Last updated on Tuesday 19 May 2015

  4. LDAP Browser/Editor

    Energy Science and Technology Software Center (OSTI)

    2000-07-18

    The LDAP Browser/Editor provides a user-friendly Java-based interface to LDAP databases with tightly integrated browsing and editing capabilities. Entirely written in Java with help of the JFC (Swingset) and JNDI class libraries. It connects to any X.500, LDAP v2 and v3 servers and supports editing of multiple-value attributes.

  5. A=5-7, 2002 evaluation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in the pdf documents, and are also available elsewhere on this server (see below). PDF HTML Figures A 5 5n, 5H, 5He, 5Li, 5Be A 5 A 6 6n, 6H, 6He, 6Li, 6Be, 6B, 6C A 6 A...

  6. Yahoo! Compute Coop Next Generation Passive Cooling Design for Data Centers

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Yahoo! Compute Coop Next Generation Passive Cooling Design for Data Centers Yahoo! Compute Coop Next Generation Passive Cooling Design for Data Centers PDF icon yahoo_passive_cooling.pdf More Documents & Publications Award Selections for Industrial Technologies Program Recovery Act Funding ITP_Data_Centers.xls SeaMicro Volume Server Power Reduction

  7. Demonstration and Field Test of airjacket technology

    SciTech Connect (OSTI)

    Faulkner, D.; Fisk, W.J.; Gadgil, A.J.; Sullivan, D.P.

    1998-06-01

    There are approximately 600,000 paint spray workers in the United States applying paints and coatings with some type of sprayer. Approximately 5% of these spray workers are in the South Coast Air Quality Management District (SCAQMD). These spray workers apply paints or other coatings to products such as bridges, houses, automobiles, wood and metal furniture, and other consumer and industrial products. The materials being sprayed include exterior and interior paints, lacquers, primers, shellacs, stains and varnishes. Our experimental findings indicate that the Airjacket does not significantly reduce the exposure of spray workers to paint fumes during HVLP spraying. The difference between ideal and actual spray paint procedures influence the mechanisms driving spray workers exposures to paint fumes and influence the viability of the Airjacket technology. In the ideal procedure, for which the Airjacket was conceived, the spray worker's exposure to paint fumes is due largely to the formation of a recirculating eddy between the spray worker and the object painted. The Airjacket ejects air to diminish and ventilate this eddy. In actual practice, exposures may result largely from directing paint upstream and from the bounce-back of the air/paint jet of the object being painted. The Airjacket, would not be expected to dramatically reduce exposures to paint fumes when the paint is not directed downstream or when the bounce-back of paint on the object creates a cloud of paint aerosols around the spray worker.

  8. Compatibility of refrigerants and lubricants with motor materials under retrofit conditions

    SciTech Connect (OSTI)

    Doerr, R.; Waite, T.

    1995-01-12

    Motor materials were exposed to original refrigerants R-11, R-12, R-22 and R-502 in the presence of mineral oil for 500 hours. These same materials were then exposed to alternative refrigerants R-123, R-134a, R-407C (R-32/R-125/R-134a) and R-404A (R-125/R-143a/R-134a), respectively, in the presence of the appropriate lubricant for 500 hours. As a control, some samples were exposed to the original refrigerant/mineral oil for a total of 1,000 hours. These tests were conducted to determine whether exposure to the original refrigerant/mineral oil would affect compatibility of the motor materials with the alternative refrigerant/lubricant after retrofit. Motor materials exposed to the alternative refrigerant and lubricant (after an initial exposure to the original refrigerant and mineral oil) appeared to be compatible with the alternative refrigerant and lubricant. The only concerns were embrittlement of the polyethylene terephthalate (PET) sheet and sleeving insulations, and delamination and blistering of the Nomex sheet insulation in the R-22, R-502, and R-12. Embrittlement of the PET materials was attributed to moisture present during the exposure. Separation of the 475 varnish from metal surfaces in the R-123 was also a concern. The sheet and sleeving insulations were affected by the original refrigerant/mineral oil to a greater extent than by the alternative refrigerant and lubricant.

  9. Current issues in natural gas lubrication

    SciTech Connect (OSTI)

    Reber, J.

    1997-10-01

    Because of the ability of natural gas to burn completely relatively easily, supplying excess oxygen to promote complete reactions is a viable alternative to catalysts. Hence, lean burn technology has a natural fit for this industry. Lube oil is not adversely affected by lean burn operation. There is a slight tendency to cause more oil nitration than oxidation, but the real difference is not significant. Operators may notice somewhat more varnish (caramel color) and less sludge (black) as a result. Because the fuel is burned more completely, there is less problem with fuel-derived oil contamination. Also because of the excess air in the combustion chamber, overall cylinder temperature is lower, causing less stress on the oil. Oil life is generally lengthened. One common misconception that lean burn engines require different lubricants may stem from a change at Waukesha Engine Division--Dresser Industries. Waukesha has changed its lube oil requirements for VHP 3521, 5115, 7042, 9390 GL turbocharged and lean burn model engines. The lube oil specification for these engines is 1% to 1.7% ash with the same 0.10% zinc maximum. This change is not because of the lean burn nature of these engines, rather it is because of drastically decreased lube oil consumption. With less oil consumption, less ash is carried to the critical exhaust valve seat area to prevent valve recession.

  10. Preliminary evaluation of resinite recovery from Illinois coal. Technical report, March 1--May 31, 1995

    SciTech Connect (OSTI)

    Crelling, J.C.

    1995-12-31

    Resinite is a naturally occurring substance found in coal and derived from original plant resins. It has been commercially exploited in the western USA for use in adhesives, varnishes and thermal setting inks. The overall objective of this project is to compare the properties of the resinite contained in Illinois Basin coals to resinite being commercially exploited in the western US, and to recover the resinite from Illinois coals by microbubble column floatation techniques. The significance of this study is that it has the potential to show the way to recover a valuable chemical, resinite, from coal using only physical processing techniques. The value of the resinite at $1.00/kg or $0.50/lb makes it about fifty times more valuable than steam coal. The removal of resinite from coal does not decrease the value of the remaining coal in any way. During this quarter pure concentrates of resinite from Herrin No. 6 Seam were produced by the density gradient centrifugation technique. This material is also now being characterized by petrographic and chemical methods. Another accomplishment this quarter was the completion of a series of microbubble column flotation tests under eight different conditions. The tests were successful in producing concentrates that are now being evaluated. The significance of the work done during this quarter is the confirmation that the resinite in an Illinois coal can be successfully separated in quantities useful for testing and analysis.

  11. Using the Schur Complement to Reduce Runtime in KULL's Magnetic Diffusion Package

    SciTech Connect (OSTI)

    Brunner, T A; Kolev, T V

    2010-12-15

    Recently a Resistive Magnetohydrodynamics (MHD) package has been added to the KULL code. In order to be compatible with the underlying hydrodynamics algorithm, a new sub-zonal magnetics discretization was developed that supports arbitrary polygonal and polyhedral zones. This flexibility comes at the cost of many more unknowns per zone - approximately ten times more for a hexahedral mesh. We can eliminate some (or all, depending on the dimensionality) of the extra unknowns from the global matrix during assembly by using a Schur complement approach. This trades expensive global work for cache-friendly local work, while still allowing solution for the full system. Significant improvements in the solution time are observed for several test problems.

  12. RTDB: A memory resident real-time object database

    SciTech Connect (OSTI)

    Jerzy M. Nogiec; Eugene Desavouret

    2003-06-04

    RTDB is a fast, memory-resident object database with built-in support for distribution. It constitutes an attractive alternative for architecting real-time solutions with multiple, possibly distributed, processes or agents sharing data. RTDB offers both direct and navigational access to stored objects, with local and remote random access by object identifiers, and immediate direct access via object indices. The database supports transparent access to objects stored in multiple collaborating dispersed databases and includes a built-in cache mechanism that allows for keeping local copies of remote objects, with specifiable invalidation deadlines. Additional features of RTDB include a trigger mechanism on objects that allows for issuing events or activating handlers when objects are accessed or modified and a very fast, attribute based search/query mechanism. The overall architecture and application of RTDB in a control and monitoring system is presented.

  13. Communication-avoiding symmetric-indefinite factorization

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Ballard, Grey Malone; Becker, Dulcenia; Demmel, James; Dongarra, Jack; Druinsky, Alex; Peled, Inon; Schwartz, Oded; Toledo, Sivan; Yamazaki, Ichitaro

    2014-11-13

    We describe and analyze a novel symmetric triangular factorization algorithm. The algorithm is essentially a block version of Aasen's triangular tridiagonalization. It factors a dense symmetric matrix A as the product A=PLTLTPT where P is a permutation matrix, L is lower triangular, and T is block tridiagonal and banded. The algorithm is the first symmetric-indefinite communication-avoiding factorization: it performs an asymptotically optimal amount of communication in a two-level memory hierarchy for almost any cache-line size. Adaptations of the algorithm to parallel computers are likely to be communication efficient as well; one such adaptation has been recently published. As a result,more » the current paper describes the algorithm, proves that it is numerically stable, and proves that it is communication optimal.« less

  14. A BLAS-3 version of the QR factorization with column pivoting

    SciTech Connect (OSTI)

    Quintana-Orti, G.; Sun, X.; Bischof, C.H.

    1998-09-01

    The QR factorization with column pivoting (QRP), originally suggested by Golub is a popular approach to computing rank-revealing factorizations. Using Level 1 BLAS, it was implemented in LINPACK, and, using Level 2 BLAS, in LAPACK. While the Level 2 BLAS version delivers superior performance in general, it may result in worse performance for large matrix sizes due to cache effects. The authors introduce a modification of the QRP algorithm which allows the use of Level 3 BLAs kernels while maintaining the numerical behavior of the LINPACK and LAPACK implementations. Experimental comparisons of this approach with the LINPACK and LAPACK implementations on IBM RS/6000, SGI R8000, and DEC AXP platforms show considerable performance improvements.

  15. An Optimizing Compiler for Petascale I/O on Leadership Class Architectures

    SciTech Connect (OSTI)

    Choudhary, Alok; Kandemir, Mahmut

    2015-03-18

    In high-performance computing systems, parallel I/O architectures usually have very complex hierarchies with multiple layers that collectively constitute an I/O stack, including high-level I/O libraries such as PnetCDF and HDF5, I/O middleware such as MPI-IO, and parallel file systems such as PVFS and Lustre. Our project explored automated instrumentation and compiler support for I/O intensive applications. Our project made significant progress towards understanding the complex I/O hierarchies of high-performance storage systems (including storage caches, HDDs, and SSDs), and designing and implementing state-of-the-art compiler/runtime system technology that targets I/O intensive HPC applications that target leadership class machine. This final report summarizes the major achievements of the project and also points out promising future directions.

  16. Methodology for fast detection of false sharing in threaded scientific codes

    DOE Patents [OSTI]

    Chung, I-Hsin; Cong, Guojing; Murata, Hiroki; Negishi, Yasushi; Wen, Hui-Fang

    2014-11-25

    A profiling tool identifies a code region with a false sharing potential. A static analysis tool classifies variables and arrays in the identified code region. A mapping detection library correlates memory access instructions in the identified code region with variables and arrays in the identified code region while a processor is running the identified code region. The mapping detection library identifies one or more instructions at risk, in the identified code region, which are subject to an analysis by a false sharing detection library. A false sharing detection library performs a run-time analysis of the one or more instructions at risk while the processor is re-running the identified code region. The false sharing detection library determines, based on the performed run-time analysis, whether two different portions of the cache memory line are accessed by the generated binary code.

  17. The Scalable Checkpoint/Restart Library

    Energy Science and Technology Software Center (OSTI)

    2009-02-23

    The Scalable Checkpoint/Restart (SCR) library provides an interface that codes may use to worite our and read in application-level checkpoints in a scalable fashion. In the current implementation, checkpoint files are cached in local storage (hard disk or RAM disk) on the compute nodes. This technique provides scalable aggregate bandwidth and uses storage resources that are fully dedicated to the job. This approach addresses the two common drawbacks of checkpointing a large-scale application to amore » shared parallel file system, namely, limited bandwidth and file system contention. In fact, on current platforms, SCR scales linearly with the number of compute nodes. It has been benchmarked as high as 720GB/s on 1094 nodes of Atlas, which is nearly two orders of magnitude faster thanthe parallel file system.« less

  18. System, apparatus and methods to implement high-speed network analyzers

    DOE Patents [OSTI]

    Ezick, James; Lethin, Richard; Ros-Giralt, Jordi; Szilagyi, Peter; Wohlford, David E

    2015-11-10

    Systems, apparatus and methods for the implementation of high-speed network analyzers are provided. A set of high-level specifications is used to define the behavior of the network analyzer emitted by a compiler. An optimized inline workflow to process regular expressions is presented without sacrificing the semantic capabilities of the processing engine. An optimized packet dispatcher implements a subset of the functions implemented by the network analyzer, providing a fast and slow path workflow used to accelerate specific processing units. Such dispatcher facility can also be used as a cache of policies, wherein if a policy is found, then packet manipulations associated with the policy can be quickly performed. An optimized method of generating DFA specifications for network signatures is also presented. The method accepts several optimization criteria, such as min-max allocations or optimal allocations based on the probability of occurrence of each signature input bit.

  19. Collective Memory Transfers for Multi-Core Chips

    SciTech Connect (OSTI)

    Michelogiannakis, George; Williams, Alexander; Shalf, John

    2013-11-13

    Future performance improvements for microprocessors have shifted from clock frequency scaling towards increases in on-chip parallelism. Performance improvements for a wide variety of parallel applications require domain-decomposition of data arrays from a contiguous arrangement in memory to a tiled layout for on-chip L1 data caches and scratchpads. How- ever, DRAM performance suffers under the non-streaming access patterns generated by many independent cores. We propose collective memory scheduling (CMS) that actively takes control of collective memory transfers such that requests arrive in a sequential and predictable fashion to the memory controller. CMS uses the hierarchically tiled arrays formal- ism to compactly express collective operations, which greatly improves programmability over conventional prefetch or list- DMA approaches. CMS reduces application execution time by up to 32% and DRAM read power by 2.2, compared to a baseline DMA architecture such as STI Cell.

  20. Compute Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compute Nodes Compute Nodes MC-proc.png Compute Node Configuration 6,384 nodes 2 twelve-core AMD 'MagnyCours' 2.1-GHz processors per node (see die image to the right and schematic below) 24 cores per node (153,216 total cores) 32 GB DDR3 1333-MHz memory per node (6,000 nodes) 64 GB DDR3 1333-MHz memory per node (384 nodes) Peak Gflop/s rate: 8.4 Gflops/core 201.6 Gflops/node 1.28 Peta-flops for the entire machine Each core has its own L1 and L2 caches, with 64 KB and 512KB respectively One 6-MB

  1. Tunnel and Subsurface Void Detection and Range to Target Measurement

    SciTech Connect (OSTI)

    Phillip B. West

    2009-06-01

    Engineers and technicians at the Idaho National Laboratory invented, designed, built and tested a device capable of detecting and measuring the distance to, an underground void, or tunnel. Preliminary tests demonstrated positive detection of, and range to, a void thru as much as 30 meters of top-soil earth. Device uses acoustic driving point impedance principles pioneered by the Laboratory for well-bore physical properties logging. Data receipts recorded by the device indicates constructive-destructive interference patterns characteristic of acoustic wave reflection from a downward step-change in impedance mismatch. Prototype tests demonstrated that interference patterns in receipt waves could depict the patterns indicative of specific distances. A tool with this capability can quickly (in seconds) indicate the presence and depth/distance of a void or tunnel. Using such a device, border security and military personnel can identify threats of intrusion or weapons caches in most all soil conditions including moist and rocky.

  2. Communication-avoiding symmetric-indefinite factorization

    SciTech Connect (OSTI)

    Ballard, Grey Malone; Becker, Dulcenia; Demmel, James; Dongarra, Jack; Druinsky, Alex; Peled, Inon; Schwartz, Oded; Toledo, Sivan; Yamazaki, Ichitaro

    2014-11-13

    We describe and analyze a novel symmetric triangular factorization algorithm. The algorithm is essentially a block version of Aasen's triangular tridiagonalization. It factors a dense symmetric matrix A as the product A=PLTLTPT where P is a permutation matrix, L is lower triangular, and T is block tridiagonal and banded. The algorithm is the first symmetric-indefinite communication-avoiding factorization: it performs an asymptotically optimal amount of communication in a two-level memory hierarchy for almost any cache-line size. Adaptations of the algorithm to parallel computers are likely to be communication efficient as well; one such adaptation has been recently published. As a result, the current paper describes the algorithm, proves that it is numerically stable, and proves that it is communication optimal.

  3. Library API for Z-Order Memory Layout

    Energy Science and Technology Software Center (OSTI)

    2015-02-01

    This library provides a simple-to-use API for implementing an altnerative to traditional row-major order in-memory layout, one based on a Morton- order space filling curve (SFC) , specifically, a Z-order variant of the Morton order curve. The library enables programmers to, after a simple initialization step, to convert a multidimensional array from row-major to Z- order layouts, then use a single, generic API call to access data from any arbitrary (i,j,k) location from within themore » array, whether it it be stored in row- major or z-order format. The motivation for using a SFC in-memory layout is for improved spatial locality, which results in increased use of local high speed cache memory. The basic idea is that with row-major order layouts, a data access to some location that is nearby in index space is likely far away in physical memory, resulting in poor spatial locality and slow runtime. On the other hand, with a SFC-based layout, accesses that are nearby in index space are much more likely to also be nearby in physical memory, resulting in much better spatial locality, and better runtime performance. Numerous studies over the years have shown significant runtime performance gains are realized by using a SFC-based memory layout compared to a row-major layout, sometimes by as much as 50%, which result from the better use of the memory and cache hierarchy that are attendant with a SFC-based layout (see, for example, [Beth2012]). This library implementation is intended for use with codes that work with structured, array-based data in 2 or 3 dimensions. It is not appropriate for use with unstructured or point-based data.« less

  4. A Temporal Locality-Aware Page-Mapped Flash Translation Layer

    SciTech Connect (OSTI)

    Kim, Youngjae; Gupta, Aayush; Urgaonkar, Bhuvan

    2013-01-01

    The poor performance of random writes has been a cause of major concern which needs to be addressed to better utilize the potential of flash in enterprise-scale environments. We examine one of the important causes of this poor performance: the design of the flash translation layer (FTL) which performs the virtual-to-physical address translations and hides the erase-before-write characteristics of flash. We propose a complete paradigm shift in the design of the core FTL engine from the existing techniques with our Demand-Based Flash Translation Layer (DFTL) which selectively caches page- level address mappings. Our experimental evaluation using FlashSim with realistic enterprise-scale workloads endorses the utility of DFTL in enterprise-scale storage systems by demonstrating: 1) improved performance, 2) reduced garbage collection overhead and 3) better overload behavior compared with hybrid FTL schemes which are the most popular implementation methods. For example, a predominantly random-write dominant I/O trace from an OLTP application running at a large financial institution shows a 78% improvement in average response time (due to a 3-fold reduction in operations of the garbage collector), compared with the hybrid FTL scheme. Even for the well-known read-dominant TPC-H benchmark, for which DFTL introduces additional overheads, we improve system response time by 56%. Moreover, interestingly, when write-back cache on DFTL-based SSD is enabled, DFTL even outperforms the page-based FTL scheme, improving their response time by 72% in Financial trace.

  5. The machine protection system for the R&D energy recovery LINAC

    SciTech Connect (OSTI)

    Altinbas, Z.; Kayran, D.; Jamilkowski, J.; Lee, R.C.; Oerter, B.

    2011-03-28

    The Machine Protection System (MPS) is a device-safety system that is designed to prevent damage to hardware by generating interlocks, based upon the state of input signals generated by selected sub-systems. It protects all the key machinery in the R&D Project called the Energy Recovery LINAC (ERL) against the high beam current. The MPS is capable of responding to a fault with an interlock signal within several microseconds. The ERL MPS is based on a National Instruments CompactRIO platform, and is programmed by utilizing National Instruments' development environment for a visual programming language. The system also transfers data (interlock status, time of fault, etc.) to the main server. Transferred data is integrated into the pre-existing software architecture which is accessible by the operators. This paper will provide an overview of the hardware used, its configuration and operation, as well as the software written both on the device and the server side.

  6. Energy optimization system

    DOE Patents [OSTI]

    Zhou, Zhi; de Bedout, Juan Manuel; Kern, John Michael; Biyik, Emrah; Chandra, Ramu Sharat

    2013-01-22

    A system for optimizing customer utility usage in a utility network of customer sites, each having one or more utility devices, where customer site is communicated between each of the customer sites and an optimization server having software for optimizing customer utility usage over one or more networks, including private and public networks. A customer site model for each of the customer sites is generated based upon the customer site information, and the customer utility usage is optimized based upon the customer site information and the customer site model. The optimization server can be hosted by an external source or within the customer site. In addition, the optimization processing can be partitioned between the customer site and an external source.

  7. Recommending personally interested contents by text mining, filtering, and interfaces

    DOE Patents [OSTI]

    xu, Songhua

    2015-11-05

    A personalized content recommendation system includes a client interface device configured to monitor a user's information data stream. A collaborative filter remote from the client interface device generates automated predictions about the interests of the user. A database server stores personal behavioral profiles and user's preferences based on a plurality of monitored past behaviors and an output of the collaborative user personal interest inference engine. A programmed personal content recommendation server filters items in an incoming information stream with the personal behavioral profile and identifies only those items of the incoming information stream that substantially matches the personal behavioral profile. The identified personally relevant content is then recommended to the user following some priority that may consider the similarity between the personal interest matches, the context of the user information consumption behaviors that may be shown by the user's content consumption mode.

  8. Recommending personally interested contents by text mining, filtering, and interfaces

    DOE Patents [OSTI]

    Xu, Songhua

    2015-10-27

    A personalized content recommendation system includes a client interface device configured to monitor a user's information data stream. A collaborative filter remote from the client interface device generates automated predictions about the interests of the user. A database server stores personal behavioral profiles and user's preferences based on a plurality of monitored past behaviors and an output of the collaborative user personal interest inference engine. A programmed personal content recommendation server filters items in an incoming information stream with the personal behavioral profile and identifies only those items of the incoming information stream that substantially matches the personal behavioral profile. The identified personally relevant content is then recommended to the user following some priority that may consider the similarity between the personal interest matches, the context of the user information consumption behaviors that may be shown by the user's content consumption mode.

  9. System and method for identifying, reporting, and evaluating presence of substance

    DOE Patents [OSTI]

    Smith, Maurice; Lusby, Michael; Van Hook, Arthur; Cook, Charles J.; Wenski, Edward G.; Solyom, David

    2006-10-24

    A system and method for identifying, reporting, and evaluating a presence of a solid, liquid, gas, or other substance of interest, particularly a dangerous, hazardous, or otherwise threatening chemical, biological, or radioactive substance. The system comprises one or more substantially automated, location self-aware remote sensing units; a control unit; and one or more data processing and storage servers. Data is collected by the remote sensing units and transmitted to the control unit; the control unit generates and uploads a report incorporating the data to the servers; and thereafter the report is available for review by a hierarchy of responsive and evaluative authorities via a wide area network. The evaluative authorities include a group of relevant experts who may be widely or even globally distributed.

  10. System And Method For Identifying, Reporting, And Evaluating Presence Of Substance

    DOE Patents [OSTI]

    Smith, Maurice; Lusby, Michael; Hook, Arthur Van; Cook, Charles J.; Wenski, Edward G.; Solyom, David

    2005-09-20

    A system and method for identifying, reporting, and evaluating a presence of a solid, liquid, gas, or other substance of interest, particularly a dangerous, hazardous, or otherwise threatening chemical, biological, or radioactive substance. The system comprises one or more substantially automated, location self-aware remote sensing units; a control unit; and one or more data processing and storage servers. Data is collected by the remote sensing units and transmitted to the control unit; the control unit generates and uploads a report incorporating the data to the servers; and thereafter the report is available for review by a hierarchy of responsive and evaluative authorities via a wide area network. The evaluative authorities include a group of relevant experts who may be widely or even globally distributed.

  11. System and method for identifying, reporting, and evaluating presence of substance

    DOE Patents [OSTI]

    Smith, Maurice; Lusby, Michael; Van Hook, Arthur; Cook, Charles J.; Wenski, Edward G.; Solyom, David

    2012-02-14

    A system and method for identifying, reporting, and evaluating a presence of a solid, liquid, gas, or other substance of interest, particularly a dangerous, hazardous, or otherwise threatening chemical, biological, or radioactive substance. The system comprises one or more substantially automated, location self-aware remote sensing units; a control unit; and one or more data processing and storage servers. Data is collected by the remote sensing units and transmitted to the control unit; the control unit generates and uploads a report incorporating the data to the servers; and thereafter the report is available for review by a hierarchy of responsive and evaluative authorities via a wide area network. The evaluative authorities include a group of relevant experts who may be widely or even globally distributed.

  12. Method of recommending items to a user based on user interest

    DOE Patents [OSTI]

    Bollen, John; Van De Sompel, Herbert

    2013-11-05

    Although recording of usage data is common in scholarly information services, its exploitation for the creation of value-added services remains limited due to concerns regarding, among others, user privacy, data validity, and the lack of accepted standards for the representation, sharing and aggregation of usage data. A technical, standards-based architecture for sharing usage information is presented. In this architecture, OpenURL-compliant linking servers aggregate usage information of a specific user community as it navigates the distributed information environment that it has access to. This usage information is made OAI-PMH harvestable so that usage information exposed by many linking servers can be aggregated to facilitate the creation of value-added services with a reach beyond that of a single community or a single information service.

  13. Usage based indicators to assess the impact of scholarly works: architecture and method

    DOE Patents [OSTI]

    Bollen, Johan (Santa Fe, NM); Van De Sompel, Herbert (Santa Fe, NM)

    2012-03-13

    Although recording of usage data is common in scholarly information services, its exploitation for the creation of value-added services remains limited due to concerns regarding, among others, user privacy, data validity, and the lack of accepted standards for the representation, sharing and aggregation of usage data. A technical, standards-based architecture for sharing usage information is presented. In this architecture, OpenURL-compliant linking servers aggregate usage information of a specific user community as it navigates the distributed information environment that it has access to. This usage information is made OAI-PMH harvestable so that usage information exposed by many linking servers can be aggregated to facilitate the creation of value-added services with a reach beyond that of a single community or a single information service.

  14. Thematic World Wide Web Visualization System

    Energy Science and Technology Software Center (OSTI)

    1996-10-10

    WebTheme is a system designed to facilitate world wide web information access and retrieval through visualization. It consists of two principal pieces, a WebTheme Server which allows users to enter in a query and automatocally harvest and process information of interest, and a WebTheme browser, which allows users to work with both Galaxies and Themescape visualizations of their data within a JAVA capable world wide web browser. WebTheme is an Internet solution, meaning that accessmore » to the server and the resulting visualizations can all be performed through the use of a WWW browser. This allows users to access and interact with SPIRE (Spatial Paradigm for Information Retrieval and Exploration) based visualizations through a web browser regardless of what computer platforms they are running on. WebTheme is specifically designed to create databases by harvesting and processing WWW home pages available on the Internet.« less

  15. Chapter 20: Data Center IT Efficiency Measures

    SciTech Connect (OSTI)

    Huang, R.; Masanet, E.

    2015-01-01

    Data centers use about 2% of the electricity in the United States; a typical data center has 100 to 200 times the energy use intensity of a commercial building. Data centers present tremendous opportunities--energy use can be reduced as much as 80% between inefficient and efficient data centers. Data center efficiency measures generally fall into the following categories: power infrastructure (e.g., more efficient uninterruptible power supplies, power distribution units); cooling (e.g., free cooling, variable-speed drives, temperature and humidity set points); airflow management (e.g., hot aisle/cold aisle, containment, grommets); and information technology efficiency (e.g., server virtualization, efficient servers, efficient data storage).

  16. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. A remote attacker would need to be able to send a specially crafted packet directly to a server running a vulnerable version of BIND. There is also the potential for an indirect attack via malware that is inadvertently installed and run, where infected machines have direct access to an organization's nameservers.

  17. MORE operating system: a message oriented resource environment

    SciTech Connect (OSTI)

    Cabral, B.; Poggio, M.

    1986-07-15

    The operating system, MORE (Message Oriented Resource Environment), is designed for a software engineering environment built on the VAXstation II micro-computer. The MORE operating system is based on the message passing model. The hardware configuration of the VAXstation II is described, including a thorough discussion of the hardware operating system support features of the VAX architecture. The software engineering environment that MORE will provide for the user is discussed. The operating system as the application programmer will see it is presented in the form of a system services manual for MORE. The concept of a server in MORE and the objects or resources manipulated by the servers are included. The high level implementation and organization of MORE, the device managers and drivers, and the kernel of MORE are detailed. 17 refs., 17 figs.

  18. T-592: Cisco Security Advisory: Cisco Secure Access Control System

    Broader source: Energy.gov (indexed) [DOE]

    Unauthorized Password Change Vulnerability | Department of Energy PROBLEM: A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a centralized RADIUS and TACACS+ server, combining user authentication, user and administrator device access control, and policy control into a centralized identity

  19. Specific Group Hardware

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Specific Group Hardware Specific Group Hardware ALICE palicevo1 The Virtual Organization (VO) server. Serves as gatekeeper for ALICE jobs. It's duties include getting assignments from ALICE file catalog (at CERN), submitting jobs to pdsfgrid (via condor) which submits jobs to the compute nodes, monitoring the cluster work load, and uploading job information to ALICE file catalog. It is monitored with MonALISA (the monitoring page is here). It's made up of 2 Intel Xeon E5520 processors each with

  20. Fukushima Daiichi Accident Study Information Portal Quality Assurance Review: Pre-Public Release

    SciTech Connect (OSTI)

    Kurt G. Vedros

    2012-01-01

    This design review compared the current product with the original intent set forth in the initial internet portal design found in the document: Fukushima Daiichi Database Design, Revision 5. The current revision of the Fukushima Daiichi Accident Study Information Portal (FDASIP) is 1.0.21. This revision is one that restricts access for each user based on roles granted by the project administrator. The public access revision is currently on the test server and will be considered in this review as well.