National Library of Energy BETA

Sample records for varnish cache server

  1. Cache Energy Optimization Techniques For Modern Processors

    SciTech Connect (OSTI)

    Mittal, Sparsh ORNL

    2013-01-01

    Modern multicore processors are employing large last-level caches, for example Intel's E7-8800 processor uses 24MB L3 cache. Further, with each CMOS technology generation, leakage energy has been dramatically increasing and hence, leakage energy is expected to become a major source of energy dissipation, especially in last-level caches (LLCs). The conventional schemes of cache energy saving either aim at saving dynamic energy or are based on properties specific to first-level caches, and thus these schemes have limited utility for last-level caches. Further, several other techniques require offline profiling or per-application tuning and hence are not suitable for product systems. In this book, we present novel cache leakage energy saving schemes for single-core and multicore systems; desktop, QoS, real-time and server systems. Also, we present cache energy saving techniques for caches designed with both conventional SRAM devices and emerging non-volatile devices such as STT-RAM (spin-torque transfer RAM). We present software-controlled, hardware-assisted techniques which use dynamic cache reconfiguration to configure the cache to the most energy efficient configuration while keeping the performance loss bounded. To profile and test a large number of potential configurations, we utilize low-overhead, micro-architecture components, which can be easily integrated into modern processor chips. We adopt a system-wide approach to save energy to ensure that cache reconfiguration does not increase energy consumption of other components of the processor. We have compared our techniques with state-of-the-art techniques and have found that our techniques outperform them in terms of energy efficiency and other relevant metrics. The techniques presented in this book have important applications in improving energy-efficiency of higher-end embedded, desktop, QoS, real-time, server processors and multitasking systems. This book is intended to be a valuable guide for both newcomers

  2. An investigation of DUA caching strategies for public key certificates

    SciTech Connect (OSTI)

    Cheung, T.C.

    1993-11-01

    Internet Privacy Enhanced Mail (PEM) provides security services to users of Internet electronic mail. PEM is designed with the intention that it will eventually obtain public key certificates from the X.500 directory service. However, such a capability is not present in most PEM implementations today. While the prevalent PEM implementation uses a public key certificate-based strategy, certificates are mostly distributed via e-mail exchanges, which raises several security and performance issues. In this thesis research, we changed the reference PEM implementation to make use of the X.500 directory service instead of local databases for public key certificate management. The thesis discusses some problems with using the X.500 directory service, explores the relevant issues, and develops an approach to address them. The approach makes use of a memory cache to store public key certificates. We implemented a centralized cache server and addressed the denial-of-service security problem that is present in the server. In designing the cache, we investigated several cache management strategies. One result of our study is that the use of a cache significantly improves performance. Our research also indicates that security incurs extra performance cost. Different cache replacement algorithms do not seem to yield significant performance differences, while delaying dirty-writes to the backing store does improve performance over immediate writes.

  3. Index of /datasets/files/41/pub/PUBID8_3989

    Open Energy Info (EERE)

    Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 2142255935 Varnish cache server Directory Listing This is a file-level view of...

  4. Checkpointing in speculative versioning caches

    DOE Patents [OSTI]

    Eichenberger, Alexandre E; Gara, Alan; Gschwind, Michael K; Ohmacht, Martin

    2013-08-27

    Mechanisms for generating checkpoints in a speculative versioning cache of a data processing system are provided. The mechanisms execute code within the data processing system, wherein the code accesses cache lines in the speculative versioning cache. The mechanisms further determine whether a first condition occurs indicating a need to generate a checkpoint in the speculative versioning cache. The checkpoint is a speculative cache line which is made non-speculative in response to a second condition occurring that requires a roll-back of changes to a cache line corresponding to the speculative cache line. The mechanisms also generate the checkpoint in the speculative versioning cache in response to a determination that the first condition has occurred.

  5. Purge Lock Server

    Energy Science and Technology Software Center (OSTI)

    2012-08-21

    The software provides a simple web api to allow users to request a time window where a file will not be removed from cache. HPSS provides the concept of a "purge lock". When a purge lock is set on a file, the file will not be removed from disk, entering tape only state. A lot of network file protocols assume a file is on disk so it is good to purge lock a file beforemore » transferring using one of those protocols. HPSS's purge lock system is very coarse grained though. A file is either purge locked or not. Nothing enforces quotas, timely unlocking of purge locks, or managing the races inherent with multiple users wanting to lock/unlock the same file. The Purge Lock Server lets you, through a simple REST API, specify a list of files to purge lock and an expire time, and the system will ensure things happen properly.« less

  6. EnCache: A Dynamic Profiling Based Reconfiguration Technique for Improving Cache Energy Efficiency

    SciTech Connect (OSTI)

    Mittal, Sparsh; Zhang, Zhao

    2014-01-01

    With each CMOS technology generation, leakage energy consumption has been dramatically increasing and hence, managing leakage power consumption of large last-level caches (LLCs) has become a critical issue in modern processor design. In this paper, we present EnCache, a novel software-based technique which uses dynamic profiling-based cache reconfiguration for saving cache leakage energy. EnCache uses a simple hardware component called profiling cache, which dynamically predicts energy efficiency of an application for 32 possible cache configurations. Using these estimates, system software reconfigures the cache to the most energy efficient configuration. EnCache uses dynamic cache reconfiguration and hence, it does not require offline profiling or tuning the parameter for each application. Furthermore, EnCache optimizes directly for the overall memory subsystem (LLC and main memory) energy efficiency instead of the LLC energy efficiency alone. The experiments performed with an x86-64 simulator and workloads from SPEC2006 suite confirm that EnCache provides larger energy saving than a conventional energy saving scheme. For single core and dual-core system configurations, the average savings in memory subsystem energy over a shared baseline configuration are 30.0% and 27.3%, respectively.

  7. Locality-Driven Dynamic GPU Cache Bypassing

    SciTech Connect (OSTI)

    Li, Chao; Song, Shuaiwen; Dai, Hongwen; Sidelnik, A.; Hari, Siva; Zhou, Huiyang

    2015-06-07

    This paper presents novel cache optimizations for massively parallel, throughput-oriented architectures like GPUs. Based on the reuse characteristics of GPU workloads, we propose a design that integrates such efficient locality filtering capability into the decoupled tag store of the existing L1 D-cache through simple and cost-effective hardware extensions.

  8. Index of /datasets/files/41/pub/PUBID8_0772

    Open Energy Info (EERE)

    :49 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 979859490 Varnish cache server Directory Listing This is a file-level view...

  9. Index of /datasets/files/41/pub/PUBID8_3844

    Open Energy Info (EERE)

    :01 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 979859543 Varnish cache server Directory Listing This is a file-level view...

  10. Index of /datasets/files/41/pub/PUBID8_2886

    Open Energy Info (EERE)

    :32 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 994569761 Varnish cache server Directory Listing This is a file-level view...

  11. Index of /datasets/files/41/pub/PUBID8_0001/Base

    Open Energy Info (EERE)

    Sim1 18-Apr-2012 11:06 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 653191374 Varnish cache server Directory Listing This...

  12. Index of /datasets/files/41/pub/PUBID8_4214

    Open Energy Info (EERE)

    - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 994569787 Varnish cache server Directory Listing This is a file-level view of...

  13. Index of /datasets/files/41/pub/PUBID8_1613

    Open Energy Info (EERE)

    429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 994569752 Varnish cache server Directory Listing This is a file-level view of...

  14. FlexiWay: A Cache Energy Saving Technique Using Fine-grained Cache Reconfiguration

    SciTech Connect (OSTI)

    Mittal, Sparsh ORNL; Zhang, Zhao Iowa State University; Vetter, Jeffrey S ORNL

    2013-01-01

    Recent trends of CMOS scaling and use of large last level caches (LLCs) have led to significant increase in the leakage energy consumption of LLCs and hence, managing their energy consumption has become extremely important in modern processor design. The conventional cache energy saving techniques require offline profiling or provide only coarse granularity of cache allocation. We present FlexiWay, a cache energy saving technique which uses dynamic cache reconfiguration. FlexiWay logically divides the cache sets into multiple (e.g. 16) modules and dynamically turns off suitable and possibly different number of cache ways in each module. FlexiWay has very small implementation overhead and it provides fine-grain cache allocation even with caches of typical associativity, e.g. an 8-way cache. Microarchitectural simulations have been performed using an x86-64 simulator and workloads from SPEC2006 suite. Also, FlexiWay has been compared with two conventional energy saving techniques. The results show that FlexiWay provides largest energy saving and incurs only small loss in performance. For single, dual and quad core systems, the average energy saving using FlexiWay are 26.2%, 25.7% and 22.4%, respectively.

  15. HPSS Disk Cache Upgrade Caters to Capacity

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HPSS Disk Cache Upgrade Caters to Capacity HPSS Disk Cache Upgrade Caters to Capacity Analysis of NERSC Users' Data-Access Habits Reveals Sweet Spot for Short-term Storage October 16, 2015 Contact: Kathy Kincade, +1 510 495 2124, kkincade@lbl.gov HPSS 09 vert NERSC users today are benefiting from a business decision made three years ago by the center's Storage Systems Group (SSG) as they were looking to upgrade the High-Performance Storage System (HPSS) disk cache: rather than focus primarily on

  16. HPSS Disk Cache Upgrade Caters to Capacity

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HPSS Disk Cache Upgrade Caters to Capacity Analysis of NERSC Users' Data-Access Habits Reveals Sweet Spot for Short-term Storage October 16, 2015 Contact: Kathy Kincade, +1 510 495 ...

  17. Nercenergy Microsoft Exchange Servers

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Pillars of Web Application Monitoring http:www.nercenergy.comthe-four-pillars-of-microsoft-exchange-server-monitoring http:www.nercenergy.comthe-four-pillars-of-microsoft-...

  18. Cache County, Utah: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    Climate Zone Number 6 Climate Zone Subtype B. Places in Cache County, Utah Amalga, Utah Avon, Utah Benson, Utah Cache, Utah Clarkston, Utah Cornish, Utah Cove, Utah Hyde Park, Utah...

  19. Hydrolyzable polyester resins, varnishes and coating compositions containing the same

    DOE Patents [OSTI]

    Yamamori, Naoki; Yokoi, Junji; Yoshikawa, Motoyoshi

    1984-01-01

    Preparation of hydrolyzable polyester resin comprising reacting polycarboxylic acid and polyhydric alcohol components, which is characterized by using, as at least part of said polyhydric alcohol component, a metallic salt of hydroxy carboxylic acid of the formula defined and effecting the polycondensation at a temperature which is no more than the decomposition temperature of said metallic salt. The polyester resins are useful as resinous vehicle of varnishes and antifouling paints.

  20. A Survey of Architectural Techniques For Improving Cache Power Efficiency

    SciTech Connect (OSTI)

    Mittal, Sparsh

    2013-01-01

    Modern processors are using increasingly larger sized on-chip caches. Also, with each CMOS technology generation, there has been a significant increase in their leakage energy consumption. For this reason, cache power management has become a crucial research issue in modern processor design. To address this challenge and also meet the goals of sustainable computing, researchers have proposed several techniques for improving energy efficiency of cache architectures. This paper surveys recent architectural techniques for improving cache power efficiency and also presents a classification of these techniques based on their characteristics. For providing an application perspective, this paper also reviews several real-world processor chips that employ cache energy saving techniques. The aim of this survey is to enable engineers and researchers to get insights into the techniques for improving cache power efficiency and motivate them to invent novel solutions for enabling low-power operation of caches.

  1. Multi-level Hybrid Cache: Impact and Feasibility

    SciTech Connect (OSTI)

    Zhang, Zhe; Kim, Youngjae; Ma, Xiaosong; Shipman, Galen M; Zhou, Yuanyuan

    2012-02-01

    Storage class memories, including flash, has been attracting much attention as promising candidates fitting into in today's enterprise storage systems. In particular, since the cost and performance characteristics of flash are in-between those of DRAM and hard disks, it has been considered by many studies as an secondary caching layer underneath main memory cache. However, there has been a lack of studies of correlation and interdependency between DRAM and flash caching. This paper views this problem as a special form of multi-level caching, and tries to understand the benefits of this multi-level hybrid cache hierarchy. We reveal that significant costs could be saved by using Flash to reduce the size of DRAM cache, while maintaing the same performance. We also discuss design challenges of using flash in the caching hierarchy and present potential solutions.

  2. Secure IRC Server

    Energy Science and Technology Software Center (OSTI)

    2003-08-25

    The IRCD is an IRC server that was originally distributed by the IRCD Hybrid developer team for use as a server in IRC message over the public Internet. By supporting the IRC protocol defined in the IRC RFC, IRCD allows the users to create and join channels for group or one-to-one text-based instant messaging. It stores information about channels (e.g., whether it is public, secret, or invite-only, the topic set, membership) and users (who ismore » online and what channels they are members of). It receives messages for a specific user or channel and forwards these messages to the targeted destination. Since server-to-server communication is also supported, these targeted destinations may be connected to different IRC servers. Messages are exchanged over TCP connections that remain open between the client and the server. The IRCD is being used within the Pervasive Computing Collaboration Environment (PCCE) as the 'chat server' for message exchange over public and private channels. After an LBNLSecureMessaging(PCCE chat) client has been authenticated, the client connects to IRCD with its assigned nickname or 'nick.' The client can then create or join channels for group discussions or one-to-one conversations. These channels can have an initial mode of public or invite-only and the mode may be changed after creation. If a channel is public, any one online can join the discussion; if a channel is invite-only, users can only join if existing members of the channel explicity invite them. Users can be invited to any type of channel and users may be members of multiple channels simultaneously. For use with the PCCE environment, the IRCD application (which was written in C) was ported to Linux and has been tested and installed under Linux Redhat 7.2. The source code was also modified with SSL so that all messages exchanged over the network are encrypted. This modified IRC server also verifies with an authentication server that the client is who he or she claims to be and

  3. A Network-Aware Distributed Storage Cache for Data Intensive...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network-Aware Distributed Storage Cache for Data Intensive Environments 1 Brian L. ... visualizing, and analyzing massive amounts of data at multiple sites around the world. ...

  4. Cache directory lookup reader set encoding for partial cache line speculation support

    SciTech Connect (OSTI)

    Gara, Alan; Ohmacht, Martin

    2014-10-21

    In a multiprocessor system, with conflict checking implemented in a directory lookup of a shared cache memory, a reader set encoding permits dynamic recordation of read accesses. The reader set encoding includes an indication of a portion of a line read, for instance by indicating boundaries of read accesses. Different encodings may apply to different types of speculative execution.

  5. ESnet IPv6 Mirror Servers

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    servers to provide IPv6-native access to open source software for our sites and our collaborators. These servers are open to all. They are also available via IPv4 to aid in the...

  6. Microsoft Exchange Servers Archives - Nercenergy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Exchange Servers What Certificates Should My Microsoft Exchange Server Have? Much like any other network application, in order to secure the functionality and safety of Microsoft Exchange Servers, it's essential to adopt specific certificates. Due to the literally thousands, if not millions, of security threats bombarding your Exchange Server every day, these certificates ensure users have a safe messaging experience while simultaneously safeguarding your data and sensitive information from

  7. Version pressure feedback mechanisms for speculative versioning caches

    DOE Patents [OSTI]

    Eichenberger, Alexandre E.; Gara, Alan; O& #x27; Brien, Kathryn M.; Ohmacht, Martin; Zhuang, Xiaotong

    2013-03-12

    Mechanisms are provided for controlling version pressure on a speculative versioning cache. Raw version pressure data is collected based on one or more threads accessing cache lines of the speculative versioning cache. One or more statistical measures of version pressure are generated based on the collected raw version pressure data. A determination is made as to whether one or more modifications to an operation of a data processing system are to be performed based on the one or more statistical measures of version pressure, the one or more modifications affecting version pressure exerted on the speculative versioning cache. An operation of the data processing system is modified based on the one or more determined modifications, in response to a determination that one or more modifications to the operation of the data processing system are to be performed, to affect the version pressure exerted on the speculative versioning cache.

  8. Automated Cache Performance Analysis And Optimization

    SciTech Connect (OSTI)

    Mohror, Kathryn

    2013-12-23

    While there is no lack of performance counter tools for coarse-grained measurement of cache activity, there is a critical lack of tools for relating data layout to cache behavior to application performance. Generally, any nontrivial optimizations are either not done at all, or are done ”by hand” requiring significant time and expertise. To the best of our knowledge no tool available to users measures the latency of memory reference instructions for partic- ular addresses and makes this information available to users in an easy-to-use and intuitive way. In this project, we worked to enable the Open|SpeedShop performance analysis tool to gather memory reference latency information for specific instructions and memory ad- dresses, and to gather and display this information in an easy-to-use and intuitive way to aid performance analysts in identifying problematic data structures in their codes. This tool was primarily designed for use in the supercomputer domain as well as grid, cluster, cloud-based parallel e-commerce, and engineering systems and middleware. Ultimately, we envision a tool to automate optimization of application cache layout and utilization in the Open|SpeedShop performance analysis tool. To commercialize this soft- ware, we worked to develop core capabilities for gathering enhanced memory usage per- formance data from applications and create and apply novel methods for automatic data structure layout optimizations, tailoring the overall approach to support existing supercom- puter and cluster programming models and constraints. In this Phase I project, we focused on infrastructure necessary to gather performance data and present it in an intuitive way to users. With the advent of enhanced Precise Event-Based Sampling (PEBS) counters on recent Intel processor architectures and equivalent technology on AMD processors, we are now in a position to access memory reference information for particular addresses. Prior to the introduction of PEBS counters

  9. NIC atomic operation unit with caching and bandwidth mitigation

    DOE Patents [OSTI]

    Hemmert, Karl Scott; Underwood, Keith D.; Levenhagen, Michael J.

    2016-03-01

    A network interface controller atomic operation unit and a network interface control method comprising, in an atomic operation unit of a network interface controller, using a write-through cache and employing a rate-limiting functional unit.

  10. Constant time worker thread allocation via configuration caching

    DOE Patents [OSTI]

    Eichenberger, Alexandre E; O'Brien, John K. P.

    2014-11-04

    Mechanisms are provided for allocating threads for execution of a parallel region of code. A request for allocation of worker threads to execute the parallel region of code is received from a master thread. Cached thread allocation information identifying prior thread allocations that have been performed for the master thread are accessed. Worker threads are allocated to the master thread based on the cached thread allocation information. The parallel region of code is executed using the allocated worker threads.

  11. Data Centers and Servers | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commercial Buildings Past Projects Data Centers and Servers Data Centers and Servers Photo of the Green Data Center at the Research Support Facility. Data centers are one of ...

  12. Cache directory look-up re-use as conflict check mechanism for speculative memory requests

    DOE Patents [OSTI]

    Ohmacht, Martin

    2013-09-10

    In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous.

  13. Improving energy efficiency of Embedded DRAM Caches for High-end Computing Systems

    SciTech Connect (OSTI)

    Mittal, Sparsh; Vetter, Jeffrey S; Li, Dong

    2014-01-01

    With increasing system core-count, the size of last level cache (LLC) has increased and since SRAM consumes high leakage power, power consumption of LLCs is becoming a significant fraction of processor power consumption. To address this, researchers have used embedded DRAM (eDRAM) LLCs which consume low-leakage power. However, eDRAM caches consume a significant amount of energy in the form of refresh energy. In this paper, we propose ESTEEM, an energy saving technique for embedded DRAM caches. ESTEEM uses dynamic cache reconfiguration to turn-off a portion of the cache to save both leakage and refresh energy. It logically divides the cache sets into multiple modules and turns-off possibly different number of ways in each module. Microarchitectural simulations confirm that ESTEEM is effective in improving performance and energy efficiency and provides better results compared to a recently-proposed eDRAM cache energy saving technique, namely Refrint. For single and dual-core simulations, the average saving in memory subsystem (LLC+main memory) on using ESTEEM is 25.8% and 32.6%, respectively and average weighted speedup are 1.09X and 1.22X, respectively. Additional experiments confirm that ESTEEM works well for a wide-range of system parameters.

  14. Property:Building/SPElectrtyUsePercLargeComputersServers | Open...

    Open Energy Info (EERE)

    Jump to: navigation, search This is a property of type String. Large computers servers Pages using the property "BuildingSPElectrtyUsePercLargeComputersServers"...

  15. U-200: Red Hat Directory Server Information Disclosure Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

  16. 2014-02-21 Issuance: Proposed Determination of Computer Servers...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Issuance: Proposed Determination of Computer Servers as a Covered Consumer Product; ... previously proposed determination that computer servers qualify as a covered product, as ...

  17. Creating Large Scale Database Servers (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Creating Large Scale Database Servers Citation Details In-Document Search Title: Creating Large Scale Database Servers The BaBar experiment at the Stanford Linear Accelerator ...

  18. PDS: A Performance Database Server

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Berry, Michael W.; Dongarra, Jack J.; Larose, Brian H.; Letsche, Todd A.

    1994-01-01

    The process of gathering, archiving, and distributing computer benchmark data is a cumbersome task usually performed by computer users and vendors with little coordination. Most important, there is no publicly available central depository of performance data for all ranges of machines from personal computers to supercomputers. We present an Internet-accessible performance database server (PDS) that can be used to extract current benchmark data and literature. As an extension to the X-Windows-based user interface (Xnetlib) to the Netlib archival system, PDS provides an on-line catalog of public domain computer benchmarks such as the LINPACK benchmark, Perfect benchmarks, and the NAS parallelmore » benchmarks. PDS does not reformat or present the benchmark data in any way that conflicts with the original methodology of any particular benchmark; it is thereby devoid of any subjective interpretations of machine performance. We believe that all branches (research laboratories, academia, and industry) of the general computing community can use this facility to archive performance metrics and make them readily available to the public. PDS can provide a more manageable approach to the development and support of a large dynamic database of published performance metrics.« less

  19. New Servers Implemented | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    New Servers Implemented Cyber Train Changes have been made to the implementation of Cyber Train. More information about how to acces Cyber Train from either on or off site can be...

  20. dCache: Big Data storage for HEP communities and beyond

    SciTech Connect (OSTI)

    Millar, A. P.; Behrmann, G.; Bernardt, C.; Fuhrmann, P.; Litvintsev, D.; Mkrtchyan, T.; Petersen, A.; Rossi, A.; Schwank, K.

    2014-01-01

    With over ten years in production use dCache data storage system has evolved to match ever changing lansdcape of continually evolving storage technologies with new solutions to both existing problems and new challenges. In this paper, we present three areas of innovation in dCache: providing efficient access to data with NFS v4.1 pNFS, adoption of CDMI and WebDAV as an alternative to SRM for managing data, and integration with alternative authentication mechanisms.

  1. U-181: IBM WebSphere Application Server Information Disclosure

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerability | Department of Energy 81: IBM WebSphere Application Server Information Disclosure Vulnerability U-181: IBM WebSphere Application Server Information Disclosure Vulnerability June 1, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in IBM WebSphere Application Server. PLATFORM: IBM WebSphere Application Server 6.1.x IBM WebSphere Application Server 7.0.x IBM WebSphere Application Server 8.0.x ABSTRACT: The vulnerability is caused due to missing access controls in

  2. Evict on write, a management strategy for a prefetch unit and/or first level cache in a multiprocessor system with speculative execution

    DOE Patents [OSTI]

    Gara, Alan; Ohmacht, Martin

    2014-09-16

    In a multiprocessor system with at least two levels of cache, a speculative thread may run on a core processor in parallel with other threads. When the thread seeks to do a write to main memory, this access is to be written through the first level cache to the second level cache. After the write though, the corresponding line is deleted from the first level cache and/or prefetch unit, so that any further accesses to the same location in main memory have to be retrieved from the second level cache. The second level cache keeps track of multiple versions of data, where more than one speculative thread is running in parallel, while the first level cache does not have any of the versions during speculation. A switch allows choosing between modes of operation of a speculation blind first level cache.

  3. Simplifying and speeding the management of intra-node cache coherence

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Phillip; Hoenicke, Dirk; Ohmacht, Martin

    2012-04-17

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

  4. Reader set encoding for directory of shared cache memory in multiprocessor system

    SciTech Connect (OSTI)

    Ahn, Dnaiel; Ceze, Luis H.; Gara, Alan; Ohmacht, Martin; Xiaotong, Zhuang

    2014-06-10

    In a parallel processing system with speculative execution, conflict checking occurs in a directory lookup of a cache memory that is shared by all processors. In each case, the same physical memory address will map to the same set of that cache, no matter which processor originated that access. The directory includes a dynamic reader set encoding, indicating what speculative threads have read a particular line. This reader set encoding is used in conflict checking. A bitset encoding is used to specify particular threads that have read the line.

  5. Energy Efficiency in Small Server Rooms: Field Surveys and Findings

    SciTech Connect (OSTI)

    Cheung, Iris; Greenberg, Steve; Mahdavi, Roozbeh; Brown, Richard; Tschudi, William

    2014-08-11

    Fifty-seven percent of US servers are housed in server closets, server rooms, and localized data centers, in what are commonly referred to as small server rooms, which comprise 99percent of all server spaces in the US. While many mid-tier and enterprise-class data centers are owned by large corporations that consider energy efficiency a goal to minimize business operating costs, small server rooms typically are not similarly motivated. They are characterized by decentralized ownership and management and come in many configurations, which creates a unique set of efficiency challenges. To develop energy efficiency strategies for these spaces, we surveyed 30 small server rooms across eight institutions, and selected four of them for detailed assessments. The four rooms had Power Usage Effectiveness (PUE) values ranging from 1.5 to 2.1. Energy saving opportunities ranged from no- to low-cost measures such as raising cooling set points and better airflow management, to more involved but cost-effective measures including server consolidation and virtualization, and dedicated cooling with economizers. We found that inefficiencies mainly resulted from organizational rather than technical issues. Because of the inherent space and resource limitations, the most effective measure is to operate servers through energy-efficient cloud-based services or well-managed larger data centers, rather than server rooms. Backup power requirement, and IT and cooling efficiency should be evaluated to minimize energy waste in the server space. Utility programs are instrumental in raising awareness and spreading technical knowledge on server operation, and the implementation of energy efficiency measures in small server rooms.

  6. A Survey Of Architectural Approaches for Managing Embedded DRAM and Non-volatile On-chip Caches

    SciTech Connect (OSTI)

    Mittal, Sparsh; Vetter, Jeffrey S; Li, Dong

    2014-01-01

    Recent trends of CMOS scaling and increasing number of on-chip cores have led to a large increase in the size of on-chip caches. Since SRAM has low density and consumes large amount of leakage power, its use in designing on-chip caches has become more challenging. To address this issue, researchers are exploring the use of several emerging memory technologies, such as embedded DRAM, spin transfer torque RAM, resistive RAM, phase change RAM and domain wall memory. In this paper, we survey the architectural approaches proposed for designing memory systems and, specifically, caches with these emerging memory technologies. To highlight their similarities and differences, we present a classification of these technologies and architectural approaches based on their key characteristics. We also briefly summarize the challenges in using these technologies for architecting caches. We believe that this survey will help the readers gain insights into the emerging memory device technologies, and their potential use in designing future computing systems.

  7. Covered Product Category: Enterprise Servers | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Enterprise Servers Covered Product Category: Enterprise Servers The Federal Energy Management Program (FEMP) provides acquisition guidance for enterprise servers, a product category covered by the ENERGY STAR program. Federal laws and requirements mandate that agencies buy ENERGY STAR-qualified products in all product categories covered by this program and any acquisition actions that are not specifically exempted by law. MEETING EFFICIENCY REQUIREMENTS FOR FEDERAL PURCHASES The U.S.

  8. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  9. Dense Servers for Reduced Energy Use and Facility Space Requirements...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information technology (IT) and telecommunications facilities account for 3% of all U.S. electricity consumption. In data centers, volume servers account for 68% of the power ...

  10. EqualWrites: Reducing Intra-set Write Variations for Enhancing Lifetime of Non-volatile Caches

    SciTech Connect (OSTI)

    Mittal, Sparsh; Vetter, Jeffrey S.

    2015-01-29

    Driven by the trends of increasing core-count and bandwidth-wall problem, the size of last level caches (LLCs) has greatly increased and hence, the researchers have explored non-volatile memories (NVMs) which provide high density and consume low-leakage power. Since NVMs have low write-endurance and the existing cache management policies are write variation-unaware, effective wear-leveling techniques are required for achieving reasonable cache lifetimes using NVMs. We present EqualWrites, a technique for mitigating intra-set write variation. In this paper, our technique works by recording the number of writes on a block and changing the cache-block location of a hot data-item to redirect the future writes to a cold block to achieve wear-leveling. Simulation experiments have been performed using an x86-64 simulator and benchmarks from SPEC06 and HPC (high-performance computing) field. The results show that for single, dual and quad-core system configurations, EqualWrites improves cache lifetime by 6.31X, 8.74X and 10.54X, respectively. In addition, its implementation overhead is very small and it provides larger improvement in lifetime than three other intra-set wear-leveling techniques and a cache replacement policy.

  11. EqualWrites: Reducing Intra-set Write Variations for Enhancing Lifetime of Non-volatile Caches

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Mittal, Sparsh; Vetter, Jeffrey S.

    2015-01-29

    Driven by the trends of increasing core-count and bandwidth-wall problem, the size of last level caches (LLCs) has greatly increased and hence, the researchers have explored non-volatile memories (NVMs) which provide high density and consume low-leakage power. Since NVMs have low write-endurance and the existing cache management policies are write variation-unaware, effective wear-leveling techniques are required for achieving reasonable cache lifetimes using NVMs. We present EqualWrites, a technique for mitigating intra-set write variation. In this paper, our technique works by recording the number of writes on a block and changing the cache-block location of a hot data-item to redirect themore » future writes to a cold block to achieve wear-leveling. Simulation experiments have been performed using an x86-64 simulator and benchmarks from SPEC06 and HPC (high-performance computing) field. The results show that for single, dual and quad-core system configurations, EqualWrites improves cache lifetime by 6.31X, 8.74X and 10.54X, respectively. In addition, its implementation overhead is very small and it provides larger improvement in lifetime than three other intra-set wear-leveling techniques and a cache replacement policy.« less

  12. Sandia Text ANaLysis Extensible librarY Server

    Energy Science and Technology Software Center (OSTI)

    2006-05-11

    This is a server wrapper for STANLEY (Sandia Text ANaLysis Extensible librarY). STANLEY provides capabilities for analyzing, indexing and searching through text. STANLEY Server exposes this capability through a TCP/IP interface allowing third party applications and remote clients to access it.

  13. V-163: Red Hat Network Satellite Server Inter-Satellite Sync...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass May...

  14. V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache HTTP Server modrewrite and "httpOnly" Cookie Disclosure Vulnerabilities V-206: Apache HTTP Server modrewrite and "httpOnly" Cookie Disclosure Vulnerabilities July 30,...

  15. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  16. How to secure your servers, code and data

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. Advice and best practices regarding the security of your servers, code and data will be presented. We will also describe how the Computer Security Team can help you reduce the risks.

  17. Managing storage en masse with a shared server

    SciTech Connect (OSTI)

    Platz, R.L.; Blackledge, R.C.; Hughes, J.H.

    1983-05-01

    Incorporating parallel processing, bit-slice technology, and queued instructions into mass storage control has a dramatic result. A single server can attend to several host processors while overseeing scores of storage peripherals.

  18. T-542: SAP Crystal Reports Server Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system.

  19. Comparing Server Energy Use and Efficiency Using Small Sample Sizes

    SciTech Connect (OSTI)

    Coles, Henry C.; Qin, Yong; Price, Phillip N.

    2014-11-01

    This report documents a demonstration that compared the energy consumption and efficiency of a limited sample size of server-type IT equipment from different manufacturers by measuring power at the server power supply power cords. The results are specific to the equipment and methods used. However, it is hoped that those responsible for IT equipment selection can used the methods described to choose models that optimize energy use efficiency. The demonstration was conducted in a data center at Lawrence Berkeley National Laboratory in Berkeley, California. It was performed with five servers of similar mechanical and electronic specifications; three from Intel and one each from Dell and Supermicro. Server IT equipment is constructed using commodity components, server manufacturer-designed assemblies, and control systems. Server compute efficiency is constrained by the commodity component specifications and integration requirements. The design freedom, outside of the commodity component constraints, provides room for the manufacturer to offer a product with competitive efficiency that meets market needs at a compelling price. A goal of the demonstration was to compare and quantify the server efficiency for three different brands. The efficiency is defined as the average compute rate (computations per unit of time) divided by the average energy consumption rate. The research team used an industry standard benchmark software package to provide a repeatable software load to obtain the compute rate and provide a variety of power consumption levels. Energy use when the servers were in an idle state (not providing computing work) were also measured. At high server compute loads, all brands, using the same key components (processors and memory), had similar results; therefore, from these results, it could not be concluded that one brand is more efficient than the other brands. The test results show that the power consumption variability caused by the key components as a

  20. Three Elements to Remember When Establishing Your Microsoft Exchange Server

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    - Nercenergy Three Elements to Remember When Establishing Your Microsoft Exchange Server Microsoft Exchange Server is among the world's most popular email messaging and collaborative systems. Due to its advanced-level structuring, yet user-friendly interface, it's utilized by businesses and corporations of all sizes. While you may be familiar with Exchange, and perhaps you even utilize this service for your email communications, there are several elements you must remember while you

  1. In-depth survey report: control technology for falling solids at Cincinnati Paint and Varnish, Cincinnati, Ohio

    SciTech Connect (OSTI)

    Heitbrink, W.A.

    1988-04-01

    A visit was made to the Cincinnati Paint and Varnish Company, Cincinnati, Ohio, to determine the effectiveness of control measures used to contain dust generated during the manufacturing of custom coatings. Dust arose when 50 pound bags of different powdered materials, titanium dioxide, talc, and crystalline silica, were emptied into 600-gallon mixing tanks by a worker. The worker slit the bags with a knife, lifted the bag, poured the contents into the mixer, and returned the empty bags to the floor. Exterior surfaces of the bags were dusty; handling them released some dust into the atmosphere. A slot hood was used to capture dust generated during the operation. Air velocity toward th slot hood along the lip of the tank where the bags were emptied ranged from 50 to 100 feet per minute. The total dust concentrations determined for crystalline silica during this operation averaged 3.0mg/cum. During a revisit to the site this worker's exposure was below 0.15mg/cum for a time-weighted average of less than 0.004 mg/m/sup 3/. The difference in liquid level in the tank at the time each powdered ingredient was added may have significantly affected the amount of dust released. Measurements of the actual process indicated that the silica had to fall almost 1 meter before reaching any liquid in the mixing tank whereas the talc had to fall only 25 centimeters.

  2. Vectorization, threading, and cache-blocking considerations for hydrocodes on emerging architectures

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Fung, J.; Aulwes, R. T.; Bement, M. T.; Campbell, J. M.; Ferenbaugh, C. R.; Jean, B. A.; Kelley, T. M.; Kenamond, M. A.; Lally, B. R.; Lovegrove, E. G.; et al

    2015-07-14

    This work reports on considerations for improving computational performance in preparation for current and expected changes to computer architecture. The algorithms studied will include increasingly complex prototypes for radiation hydrodynamics codes, such as gradient routines and diffusion matrix assembly (e.g., in [1-6]). The meshes considered for the algorithms are structured or unstructured meshes. The considerations applied for performance improvements are meant to be general in terms of architecture (not specifically graphical processing unit (GPUs) or multi-core machines, for example) and include techniques for vectorization, threading, tiling, and cache blocking. Out of a survey of optimization techniques on applications such asmore » diffusion and hydrodynamics, we make general recommendations with a view toward making these techniques conceptually accessible to the applications code developer. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.« less

  3. Vectorization, threading, and cache-blocking considerations for hydrocodes on emerging architectures

    SciTech Connect (OSTI)

    Fung, J.; Aulwes, R. T.; Bement, M. T.; Campbell, J. M.; Ferenbaugh, C. R.; Jean, B. A.; Kelley, T. M.; Kenamond, M. A.; Lally, B. R.; Lovegrove, E. G.; Nelson, E. M.; Powell, D. M.

    2015-07-14

    This work reports on considerations for improving computational performance in preparation for current and expected changes to computer architecture. The algorithms studied will include increasingly complex prototypes for radiation hydrodynamics codes, such as gradient routines and diffusion matrix assembly (e.g., in [1-6]). The meshes considered for the algorithms are structured or unstructured meshes. The considerations applied for performance improvements are meant to be general in terms of architecture (not specifically graphical processing unit (GPUs) or multi-core machines, for example) and include techniques for vectorization, threading, tiling, and cache blocking. Out of a survey of optimization techniques on applications such as diffusion and hydrodynamics, we make general recommendations with a view toward making these techniques conceptually accessible to the applications code developer. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  4. Performance model of the Argonne Voyager multimedia server

    SciTech Connect (OSTI)

    Disz, T.; Olson, R.; Stevens, R.

    1997-07-01

    The Argonne Voyager Multimedia Server is being developed in the Futures Lab of the Mathematics and Computer Science Division at Argonne National Laboratory. As a network-based service for recording and playing multimedia streams, it is important that the Voyager system be capable of sustaining certain minimal levels of performance in order for it to be a viable system. In this article, the authors examine the performance characteristics of the server. As they examine the architecture of the system, they try to determine where bottlenecks lie, show actual vs potential performance, and recommend areas for improvement through custom architectures and system tuning.

  5. CSU Final Report on the Math/CS Institute CACHE: Communication-Avoiding and Communication-Hiding at the Extreme Scale

    SciTech Connect (OSTI)

    Strout, Michelle

    2014-06-10

    The CACHE project entails researching and developing new versions of numerical algorithms that result in data reuse that can be scheduled in a communication avoiding way. Since memory accesses take more time than any computation and require the most power, the focus on turning data reuse into data locality is critical to improving performance and reducing power usage in scientific simulations. This final report summarizes the accomplishments at Colorado State University as part of the CACHE project.

  6. T-621: Citrix XenServer Lets Local Administrative Users on the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 -...

  7. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    server and command line utilities for server administration. Addthis Related Articles T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges V-041: Red Hat...

  8. V-166: HP-UX Directory Server Discloses Passwords to Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May...

  9. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative...

  10. U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability

    Broader source: Energy.gov [DOE]

    If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password.

  11. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

  12. T-602: BlackBerry Enterprise Server Input Validation Flaw in...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation...

  13. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  14. Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA, Information

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Resourses Management Division | Department of Energy SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management Division Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management Division Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management Division Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management Division (81.87 KB) More Documents & Publications

  15. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  16. Evaluation of low-temperature geothermal potential in Cache Valley, Utah. Report of investigation No. 174

    SciTech Connect (OSTI)

    de Vries, J.L.

    1982-11-01

    Field work consisted of locating 90 wells and springs throughout the study area, collecting water samples for later laboratory analyses, and field measurement of pH, temperature, bicarbonate alkalinity, and electrical conductivity. Na/sup +/, K/sup +/, Ca/sup +2/, Mg/sup +2/, SiO/sub 2/, Fe, SO/sub 4//sup -2/, Cl/sup -/, F/sup -/, and total dissolved solids were determined in the laboratory. Temperature profiles were measured in 12 additional, unused walls. Thermal gradients calculated from the profiles were approximately the same as the average for the Basin and Range province, about 35/sup 0/C/km. One well produced a gradient of 297/sup 0/C/km, most probably as a result of a near-surface occurrence of warm water. Possible warm water reservoir temperatures were calculated using both the silica and the Na-K-Ca geothermometers, with the results averaging about 50 to 100/sup 0/C. If mixing calculations were applied, taking into account the temperatures and silica contents of both warm springs or wells and the cold groundwater, reservoir temperatures up to about 200/sup 0/C were indicated. Considering measured surface water temperatures, calculated reservoir temperatures, thermal gradients, and the local geology, most of the Cache Valley, Utah area is unsuited for geothermal development. However, the areas of North Logan, Benson, and Trenton were found to have anomalously warm groundwater in comparison to the background temperature of 13.0/sup 0/C for the study area. The warm water has potential for isolated energy development but is not warm enough for major commercial development.

  17. 2014-02-21 Issuance: Proposed Determination of Computer Servers as a

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Covered Consumer Product; Withdrawal | Department of Energy Servers as a Covered Consumer Product; Withdrawal 2014-02-21 Issuance: Proposed Determination of Computer Servers as a Covered Consumer Product; Withdrawal This document is a pre-publication Federal Register notice withdrawing the previously proposed determination that computer servers qualify as a covered product, as issued by the Deputy Assistant Secretary for Energy Efficiency on February 21, 2014. Though it is not intended or

  18. T-589: Citrix XenApp and Citrix Presentation Server Bug

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system.

  19. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  20. U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system.

  1. T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Passwords | Department of Energy 92: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 - 3:47pm Addthis PROBLEM: A vulnerability was reported in VMware vFabric tc Server. A remote user can login using an obfuscated version of their password. PLATFORM: Version(s): vFabric tc Server 2.0.0.RELEASE to 2.0.5.SR01, 2.1.0.RELEASE to 2.1.1.SR01 ABSTRACT: VMware vFabric tc

  2. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  3. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact

    Broader source: Energy.gov [DOE]

    A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service.

  4. T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash.

  5. Optimal routing of IP packets to multi-homed servers

    SciTech Connect (OSTI)

    Swartz, K.L.

    1992-08-01

    Multi-homing, or direct attachment to multiple networks, offers both performance and availability benefits for important servers on busy networks. Exploiting these benefits to their fullest requires a modicum of routing knowledge in the clients. Careful policy control must also be reflected in the routing used within the network to make best use of specialized and often scarce resources. While relatively straightforward in theory, this problem becomes much more difficult to solve in a real network containing often intractable implementations from a variety of vendors. This paper presents an analysis of the problem and proposes a useful solution for a typical campus network. Application of this solution at the Stanford Linear Accelerator Center is studied and the problems and pitfalls encountered are discussed, as are the workarounds used to make the system work in the real world.

  6. GlusterFS One Storage Server to Rule Them All

    SciTech Connect (OSTI)

    Boyer, Eric B.; Broomfield, Matthew C.; Perrotti, Terrell A.

    2012-07-30

    GlusterFS is a Linux based distributed file system, designed to be highly scalable and serve many clients. Some reasons to use GlusterFS are: No centralized metadata server, Scalability, Open Source, Dynamic and live service modifications, Can be used over Infiniband or Ethernet, Can be tuned for speed and/or resilience and Flexible administration. It's useful for enterprise environments - virtualization; high performance computing (HPC) and it works with Mac, Linux and Windows clients. Conclusions are: (1) GlusterFS proved to have widespread capabilities as a virtual file system; (2) Scalability is very dependent upon the underlying hardware; (3) Lack of built-in encryption and security paradigm; and (4) Best suited in a general purpose computing environment.

  7. T-640: RSA Access Manager Server CVE-2011-0322 Update

    Broader source: Energy.gov [DOE]

    RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3 ?Security Hot fix # 6.0.4.60 for RSA Access Manager Server version 6.0.4 ?Security Hot fix # 6.1.2.08 for RSA Access Manager Server version 6.1.2 ?Security Hot fix # 6.1.3.05 for RSA Access Manager Server version 6.1.3

  8. Property:Building/SPBreakdownOfElctrcityUseKwhM2LargeComputersServers...

    Open Energy Info (EERE)

    Jump to: navigation, search This is a property of type String. Large computers servers Pages using the property "BuildingSPBreakdownOfElctrcityUseKwhM2LargeComp...

  9. Solid Waste Information and Tracking System Client Server Conversion Project Management Plan

    SciTech Connect (OSTI)

    GLASSCOCK, J.A.

    2000-02-10

    The Project Management Plan governing the conversion of SWITS to a client-server architecture. The PMP describes the background, planning and management of the SWITS conversion. Requirements and specification documentation needed for the SWITS conversion

  10. Tank waste remediation system year 2000 dedicated file server project HNF-3418 project plan

    SciTech Connect (OSTI)

    SPENCER, S.G.

    1999-04-26

    The Server Project is to ensure that all TWRS supporting hardware (fileservers and workstations) will not cause a system failure because of the BIOS or Operating Systems cannot process Year 2000 dates.

  11. THE PHOTOMETRIC CLASSIFICATION SERVER FOR Pan-STARRS1

    SciTech Connect (OSTI)

    Saglia, R. P.; Bender, R.; Seitz, S.; Senger, R.; Snigula, J.; Phleps, S.; Wilman, D.; Tonry, J. L.; Burgett, W. S.; Chambers, K. C.; Heasley, J. N.; Kaiser, N.; Magnier, E. A.; Morgan, J. S.; Greisel, N.; Bailer-Jones, C. A. L.; Klement, R. J.; Rix, H.-W.; Smith, K.; Green, P. J.; and others

    2012-02-20

    The Pan-STARRS1 survey is obtaining multi-epoch imaging in five bands (g{sub P1} r{sub P1} i{sub P1} z{sub P1} y{sub P1}) over the entire sky north of declination -30 deg. We describe here the implementation of the Photometric Classification Server (PCS) for Pan-STARRS1. PCS will allow the automatic classification of objects into star/galaxy/quasar classes based on colors and the measurement of photometric redshifts for extragalactic objects, and will constrain stellar parameters for stellar objects, working at the catalog level. We present tests of the system based on high signal-to-noise photometry derived from the Medium-Deep Fields of Pan-STARRS1, using available spectroscopic surveys as training and/or verification sets. We show that the Pan-STARRS1 photometry delivers classifications and photometric redshifts as good as the Sloan Digital Sky Survey (SDSS) photometry to the same magnitude limits. In particular, our preliminary results, based on this relatively limited data set down to the SDSS spectroscopic limits, and therefore potentially improvable, show that stars are correctly classified as such in 85% of cases, galaxies in 97%, and QSOs in 84%. False positives are less than 1% for galaxies, Almost-Equal-To 19% for stars, and Almost-Equal-To 28% for QSOs. Moreover, photometric redshifts for 1000 luminous red galaxies up to redshift 0.5 are determined to 2.4% precision (defined as 1.48 Multiplication-Sign Median|z{sub phot} - z{sub spec}|/(1 + z)) with just 0.4% catastrophic outliers and small (-0.5%) residual bias. For bluer galaxies up to the same redshift, the residual bias (on average -0.5%) trend, percentage of catastrophic failures (1.2%), and precision (4.2%) are higher, but still interestingly small for many science applications. Good photometric redshifts (to 5%) can be obtained for at most 60% of the QSOs of the sample. PCS will create a value-added catalog with classifications and photometric redshifts for eventually many millions of sources.

  12. U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

  13. An RFC 1179 Compatible Remote Print Server for Windows 3.1

    Energy Science and Technology Software Center (OSTI)

    1993-11-09

    Internet RFC 1179 describes the protocol to be used for printing files on a remote printer in a TCP/IP network. The protocol is client/server, meaning that the client initiates the print request, and the server receives the request and performs the actual printing locally. This protocol has been in long use on Unix systems derived from the Berkeley Software Distribution, such as DEC''s Ultrix and Sun''s SunOS. LPD Services implements the server portion of thismore » protocol. It handles both the network communication and conformance with the protocol, and printing using the Microsoft Windows device independent printing interface.« less

  14. Index of /datasets/files/41/pub/PUBID8_0332

    Open Energy Info (EERE)

    Apr-2012 11:07 - DIR MaxTech 18-Apr-2012 11:07 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 979859487 Varnish cache...

  15. Report to Congress on Server and Data Center Energy Efficiency: Public Law 109-431

    SciTech Connect (OSTI)

    Alliance to Save Energy; ICF Incorporated; ERG Incorporated; U.S. Environmental Protection Agency; Brown, Richard E; Brown, Richard; Masanet, Eric; Nordman, Bruce; Tschudi, Bill; Shehabi, Arman; Stanley, John; Koomey, Jonathan; Sartor, Dale; Chan, Peter; Loper, Joe; Capana, Steve; Hedman, Bruce; Duff, Rebecca; Haines, Evan; Sass, Danielle; Fanara, Andrew

    2007-08-02

    This report was prepared in response to the request from Congress stated in Public Law 109-431 (H.R. 5646),"An Act to Study and Promote the Use of Energy Efficient Computer Servers in the United States." This report assesses current trends in energy use and energy costs of data centers and servers in the U.S. (especially Federal government facilities) and outlines existing and emerging opportunities for improved energy efficiency. It also makes recommendations for pursuing these energy-efficiency opportunities broadly across the country through the use of information and incentive-based programs.

  16. Report to Congress on Server and Data Center Energy Efficiency: Public Law 109-431: Appendices

    SciTech Connect (OSTI)

    Alliance to Save Energy; ICF Incorporated; ERG Incorporated; U.S. Environmental Protection Agency; Brown, Richard E; Brown, Richard; Masanet, Eric; Nordman, Bruce; Tschudi, Bill; Shehabi, Arman; Stanley, John; Koomey, Jonathan; Sartor, Dale; Chan, Peter; Loper, Joe; Capana, Steve; Hedman, Bruce; Duff, Rebecca; Haines, Evan; Sass, Danielle; Fanara, Andrew

    2007-08-02

    This report is the appendices to a companion report, prepared in response to the request from Congress stated in Public Law 109-431 (H.R. 5646),"An Act to Study and Promote the Use of Energy Efficient Computer Servers in the United States." This report assesses current trends in energy use and energy costs of data centers and servers in the U.S. (especially Federal government facilities) and outlines existing and emerging opportunities for improved energy efficiency. It also makes recommendations for pursuing these energy-efficiency opportunities broadly across the country through the use of information and incentive-based programs.

  17. Solid waste information and tracking system server conversion project management plan

    SciTech Connect (OSTI)

    MAY, D.L.

    1999-04-12

    The Project Management Plan governing the conversion of Solid Waste Information and Tracking System (SWITS) to a client-server architecture. The Solid Waste Information and Tracking System Project Management Plan (PMP) describes the background, planning and management of the SWITS conversion. Requirements and specification documentation needed for the SWITS conversion will be released as supporting documents.

  18. Mitigation of cache memory using an embedded hard-core PPC440 processor in a Virtex-5 Field Programmable Gate Array.

    SciTech Connect (OSTI)

    Learn, Mark Walter

    2010-02-01

    Sandia National Laboratories is currently developing new processing and data communication architectures for use in future satellite payloads. These architectures will leverage the flexibility and performance of state-of-the-art static-random-access-memory-based Field Programmable Gate Arrays (FPGAs). One such FPGA is the radiation-hardened version of the Virtex-5 being developed by Xilinx. However, not all features of this FPGA are being radiation-hardened by design and could still be susceptible to on-orbit upsets. One such feature is the embedded hard-core PPC440 processor. Since this processor is implemented in the FPGA as a hard-core, traditional mitigation approaches such as Triple Modular Redundancy (TMR) are not available to improve the processor's on-orbit reliability. The goal of this work is to investigate techniques that can help mitigate the embedded hard-core PPC440 processor within the Virtex-5 FPGA other than TMR. Implementing various mitigation schemes reliably within the PPC440 offers a powerful reconfigurable computing resource to these node-based processing architectures. This document summarizes the work done on the cache mitigation scheme for the embedded hard-core PPC440 processor within the Virtex-5 FPGAs, and describes in detail the design of the cache mitigation scheme and the testing conducted at the radiation effects facility on the Texas A&M campus.

  19. Workload Characterization and Performance Implications of Large-Scale Blog Servers

    SciTech Connect (OSTI)

    Jeon, Myeongjae; Kim, Youngjae; Hwang, Jaeho; Lee, Joonwon; Seo, Euiseong

    2012-01-01

    With the ever-increasing popularity of social network services (SNSs), an understanding of the characteristics of these services and their effects on the behavior of their host servers is critical. However, there has been a lack of research on the workload characterization of servers running SNS applications such as blog services. To fill this void, we empirically characterized real-world web server logs collected from one of the largest South Korean blog hosting sites for 12 consecutive days. The logs consist of more than 96 million HTTP requests and 4.7 TB of network traffic. Our analysis reveals the followings: (i) The transfer size of non-multimedia files and blog articles can be modeled using a truncated Pareto distribution and a log-normal distribution, respectively; (ii) User access for blog articles does not show temporal locality, but is strongly biased towards those posted with image or audio files. We additionally discuss the potential performance improvement through clustering of small files on a blog page into contiguous disk blocks, which benefits from the observed file access patterns. Trace-driven simulations show that, on average, the suggested approach achieves 60.6% better system throughput and reduces the processing time for file access by 30.8% compared to the best performance of the Ext4 file system.

  20. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions.

  1. SIFTER search: a web server for accurate phylogeny-based protein function prediction

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Sahraeian, Sayed M.; Luo, Kevin R.; Brenner, Steven E.

    2015-05-15

    We are awash in proteins discovered through high-throughput sequencing projects. As only a minuscule fraction of these have been experimentally characterized, computational methods are widely used for automated annotation. Here, we introduce a user-friendly web interface for accurate protein function prediction using the SIFTER algorithm. SIFTER is a state-of-the-art sequence-based gene molecular function prediction algorithm that uses a statistical model of function evolution to incorporate annotations throughout the phylogenetic tree. Due to the resources needed by the SIFTER algorithm, running SIFTER locally is not trivial for most users, especially for large-scale problems. The SIFTER web server thus provides access tomore » precomputed predictions on 16 863 537 proteins from 232 403 species. Users can explore SIFTER predictions with queries for proteins, species, functions, and homologs of sequences not in the precomputed prediction set. Lastly, the SIFTER web server is accessible at http://sifter.berkeley.edu/ and the source code can be downloaded.« less

  2. SIFTER search: a web server for accurate phylogeny-based protein function prediction

    SciTech Connect (OSTI)

    Sahraeian, Sayed M.; Luo, Kevin R.; Brenner, Steven E.

    2015-05-15

    We are awash in proteins discovered through high-throughput sequencing projects. As only a minuscule fraction of these have been experimentally characterized, computational methods are widely used for automated annotation. Here, we introduce a user-friendly web interface for accurate protein function prediction using the SIFTER algorithm. SIFTER is a state-of-the-art sequence-based gene molecular function prediction algorithm that uses a statistical model of function evolution to incorporate annotations throughout the phylogenetic tree. Due to the resources needed by the SIFTER algorithm, running SIFTER locally is not trivial for most users, especially for large-scale problems. The SIFTER web server thus provides access to precomputed predictions on 16 863 537 proteins from 232 403 species. Users can explore SIFTER predictions with queries for proteins, species, functions, and homologs of sequences not in the precomputed prediction set. Lastly, the SIFTER web server is accessible at http://sifter.berkeley.edu/ and the source code can be downloaded.

  3. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  4. Recovery Act: SeaMicro Volume Server Power Reduction Research Development

    SciTech Connect (OSTI)

    Gary Lauterbach

    2012-03-22

    Cloud data centers are projected to be the fastest growing segment of the server market through 2015, according to IDC. Increasingly people and businesses rely on the Cloud to deliver digital content quickly and efficiently. Recovery Act funding from the Department of Energy has helped SeaMicro's technologies enhance the total cost of operation, performance and energy efficiency in large data center and Cloud environments. SeaMicro's innovative supercomputer fabric connects thousands of processor cores, memory, storage and input/output traffic. The company's fabric supports multiple processor instruction sets. Current systems featuring SeaMicro technology typically use one quarter the power and take one sixth the space of traditional servers with the same compute performance, yet deliver up to 12 times the bandwidth per core. Mozilla and eHarmony are two customers successfully using SeaMicro's technology. Numerous non-public customers have been successfully using the SeaMicro product in test and production facilities. As a result of the Recovery Act funding from the U.S. Department of Energy, more than 50 direct jobs were created at SeaMicro. To date, they primarily have been high-value, engineering jobs. Hardware, software and manufacturing engineering positions have been created, as well as sales and sales engineering. The positions have allowed SeaMicro to significantly accelerate engineering development and accelerate commercialization. As a result, commercialization and delivery to market are months ahead of initial schedule. Additional jobs were indirectly created through the development of the SeaMicro product. Through many years of research and hard work prior to receipt of public funding, SeaMicro was awarded 2 patents for its work. SeaMicro's product led the way for industry leaders to reconsider the market for low power servers and create new product lines. With valuable support of the U.S. Department of Energy and through SeaMicro's product, the market

  5. Solid waste information and tracking system client-server conversion project management plan

    SciTech Connect (OSTI)

    May, D.L.

    1998-04-15

    This Project Management Plan is the lead planning document governing the proposed conversion of the Solid Waste Information and Tracking System (SWITS) to a client-server architecture. This plan presents the content specified by American National Standards Institute (ANSI)/Institute of Electrical and Electronics Engineers (IEEE) standards for software development, with additional information categories deemed to be necessary to describe the conversion fully. This plan is a living document that will be reviewed on a periodic basis and revised when necessary to reflect changes in baseline design concepts and schedules. This PMP describes the background, planning and management of the SWITS conversion. It does not constitute a statement of product requirements. Requirements and specification documentation needed for the SWITS conversion will be released as supporting documents.

  6. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1996-08-06

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  7. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1997-12-09

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  8. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1997-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  9. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1996-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  10. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1999-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  11. Geographic Information Systems-Transportation ISTEA management systems server-net prototype pooled fund study: Phase B summary

    SciTech Connect (OSTI)

    Espinoza, J. Jr.; Dean, C.D.; Armstrong, H.M.

    1997-06-01

    The Geographic Information System-Transportation (GIS-T) ISTEA Management Systems Server Net Prototype Pooled Fund Study represents the first national cooperative effort in the transportation industry to address the management and monitoring systems as well as the statewide and metropolitan transportation planning requirements of the Intermodal Surface Transportation Efficiency Act of 1991 (ISTEA). The Study was initiated in November 1993 through the Alliance for Transportation Research and under the leadership of the New Mexico State Highway and Transportation Department. Sandia National Laboratories, an Alliance partner, and Geographic Paradigm Computing. Inc. provided technical leadership for the project. In 1992, the Alliance for Transportation Research, the New Mexico State Highway and Transportation Department, Sandia National Laboratories, and Geographic Paradigm Computing, Inc., proposed a comprehensive research agenda for GIS-T. That program outlined a national effort to synthesize new transportation policy initiatives (e.g., management systems and Intelligent Transportation Systems) with the GIS-T server net ideas contained in the NCHRP project {open_quotes}Adaptation of GIS to Transportation{close_quotes}. After much consultation with state, federal, and private interests, a project proposal based on this agenda was prepared and resulted in this Study. The general objective of the Study was to develop GIS-T server net prototypes supporting the ISTEA requirements for transportation planning and management and monitoring systems. This objective can be further qualified to: (1) Create integrated information system architectures and design requirements encompassing transportation planning activities and data. (2) Encourage the development of functional GIS-T server net prototypes. (3) Demonstrate multiple information systems implemented in a server net environment.

  12. The FELICIA bulletin board system and the IRBIS anonymous FTP server: Computer security information sources for the DOE community. CIAC-2302

    SciTech Connect (OSTI)

    Orvis, W.J.

    1993-11-03

    The Computer Incident Advisory Capability (CIAC) operates two information servers for the DOE community, FELICIA (formerly FELIX) and IRBIS. FELICIA is a computer Bulletin Board System (BBS) that can be accessed by telephone with a modem. IRBIS is an anonymous ftp server that can be accessed on the Internet. Both of these servers contain all of the publicly available CIAC, CERT, NIST, and DDN bulletins, virus descriptions, the VIRUS-L moderated virus bulletin board, copies of public domain and shareware virus- detection/protection software, and copies of useful public domain and shareware utility programs. This guide describes how to connect these systems and obtain files from them.

  13. Web servers and services for electrostatics calculations with APBS and PDB2PQR

    SciTech Connect (OSTI)

    Unni, Samir; Huang, Yong; Hanson, Robert M.; Tobias, Malcolm; Krishnan, Sriram; Li, Wilfred; Nielsen, Jens E.; Baker, Nathan A.

    2011-04-02

    APBS and PDB2PQR are widely utilized free software packages for biomolecular electrostatics calculations. Using the Opal toolkit, we have developed a web services framework for these software packages that enables the use of APBS and PDB2PQR by users who do not have local access to the necessary amount of computational capabilities. This not only increases accessibility of the software to a wider range of scientists, educators, and students but it also increases the availability of electrostatics calculations on portable computing platforms. Users can access this new functionality in two ways. First, an Opal-enabled version of APBS is provided in current distributions, available freely on the web. Second, we have extended the PDB2PQR web server to provide an interface for the setup, execution, and visualization electrostatics potentials as calculated by APBS. This web interface also uses the Opal framework which ensures the scalability needed to support the large APBS user community. Both of these resources are available from the APBS/PDB2PQR website: http://www.poissonboltzmann.org/.

  14. T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

  15. Protein Sequence Annotation Tool (PSAT): A centralized web-based meta-server for high-throughput sequence annotations

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Leung, Elo; Huang, Amy; Cadag, Eithon; Montana, Aldrin; Soliman, Jan Lorenz; Zhou, Carol L. Ecale

    2016-01-20

    In this study, we introduce the Protein Sequence Annotation Tool (PSAT), a web-based, sequence annotation meta-server for performing integrated, high-throughput, genome-wide sequence analyses. Our goals in building PSAT were to (1) create an extensible platform for integration of multiple sequence-based bioinformatics tools, (2) enable functional annotations and enzyme predictions over large input protein fasta data sets, and (3) provide a web interface for convenient execution of the tools. In this paper, we demonstrate the utility of PSAT by annotating the predicted peptide gene products of Herbaspirillum sp. strain RV1423, importing the results of PSAT into EC2KEGG, and using the resultingmore » functional comparisons to identify a putative catabolic pathway, thereby distinguishing RV1423 from a well annotated Herbaspirillum species. This analysis demonstrates that high-throughput enzyme predictions, provided by PSAT processing, can be used to identify metabolic potential in an otherwise poorly annotated genome. Lastly, PSAT is a meta server that combines the results from several sequence-based annotation and function prediction codes, and is available at http://psat.llnl.gov/psat/. PSAT stands apart from other sequencebased genome annotation systems in providing a high-throughput platform for rapid de novo enzyme predictions and sequence annotations over large input protein sequence data sets in FASTA. PSAT is most appropriately applied in annotation of large protein FASTA sets that may or may not be associated with a single genome.« less

  16. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server

    Broader source: Energy.gov [DOE]

    BlackBerry advisory describes a security issue that the BlackBerry Attachment Service component of the BlackBerry Enterprise Server is susceptible to. The issue relates to a known vulnerability in the PDF distiller component of the BlackBerry Attachment Service that affects how the BlackBerry Attachment Service processes PDF files.

  17. Eager protocol on a cache pipeline dataflow

    DOE Patents [OSTI]

    Ohmacht, Martin; Sugavanam, Krishnan

    2012-11-13

    A master device sends a request to communicate with a slave device to a switch. The master device waits for a period of cycles the switch takes to decide whether the master device can communicate with the slave device, and the master device sends data associated with the request to communicate at least after the period of cycles has passed since the master device sent the request to communicate to the switch without waiting to receive an acknowledgment from the switch that the master device can communicate with the slave device.

  18. Method and structure for cache aware transposition via rectangular subsections

    DOE Patents [OSTI]

    Gustavson, Fred Gehrung; Gunnels, John A

    2014-02-04

    A method and structure for transposing a rectangular matrix A in a computer includes subdividing the rectangular matrix A into one or more square submatrices and executing an in-place transposition for each of the square submatrices A.sub.ij.

  19. Checkpointing in speculative versioning caches (Patent) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    OSTI Identifier: 1093267 Report Number(s): 8,521,961 12544,704 DOE Contract Number: B554331 Resource Type: Patent Research Org: International Business Machines Corporation ...

  20. Checkpointing in speculative versioning caches (Patent) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    A paper copy of this document is also available for sale to the public from the National Technical Information Service, Springfield, VA at www.ntis.gov. Mechanisms for generating ...

  1. Constant time worker thread allocation via configuration caching...

    Office of Scientific and Technical Information (OSTI)

    Type: Patent Research Org: International Business Machine Corporation, Armonk, NY (United States) Sponsoring Org: USDOE Country of Publication: United States Language: English

  2. Method and structure for cache aware transposition via rectangular...

    Office of Scientific and Technical Information (OSTI)

    Resource Type: Patent Research Org: International Business Machines Corporation, Armonk, NY, USA Sponsoring Org: USDOE Country of Publication: United States Language: English ...

  3. Engineering the CernVM-Filesystem as a High Bandwidth Distributed Filesystem for Auxiliary Physics Data

    SciTech Connect (OSTI)

    Dykstra, D.; Bockelman, B.; Blomer, J.; Herner, K.; Levshina, T.; Slyz, M.

    2015-12-23

    A common use pattern in the computing models of particle physics experiments is running many distributed applications that read from a shared set of data files. We refer to this data is auxiliary data, to distinguish it from (a) event data from the detector (which tends to be different for every job), and (b) conditions data about the detector (which tends to be the same for each job in a batch of jobs). Relatively speaking, conditions data also tends to be relatively small per job where both event data and auxiliary data are larger per job. Unlike event data, auxiliary data comes from a limited working set of shared files. Since there is spatial locality of the auxiliary data access, the use case appears to be identical to that of the CernVM- Filesystem (CVMFS). However, we show that distributing auxiliary data through CVMFS causes the existing CVMFS infrastructure to perform poorly. We utilize a CVMFS client feature called 'alien cache' to cache data on existing local high-bandwidth data servers that were engineered for storing event data. This cache is shared between the worker nodes at a site and replaces caching CVMFS files on both the worker node local disks and on the site's local squids. We have tested this alien cache with the dCache NFSv4.1 interface, Lustre, and the Hadoop Distributed File System (HDFS) FUSE interface, and measured performance. In addition, we use high-bandwidth data servers at central sites to perform the CVMFS Stratum 1 function instead of the low-bandwidth web servers deployed for the CVMFS software distribution function. We have tested this using the dCache HTTP interface. As a result, we have a design for an end-to-end high-bandwidth distributed caching read-only filesystem, using existing client software already widely deployed to grid worker nodes and existing file servers already widely installed at grid sites. Files are published in a central place and are soon available on demand throughout the grid and cached locally on the

  4. Pageflex Server [document: PF4577458_00001

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    You'll enjoy more value and the lowest out-of-pocket costs. * High Quality Vision Care. You'll get the best care from a VSP provider, including a WellVision Exam -the most...

  5. SeaMicro Volume Server Power Reduction

    Broader source: Energy.gov [DOE]

    Fact sheet about saving 75% of computing energy through an inter-connected array of low-power central processing units

  6. Pageflex Server [document: PR5018074_00001

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    when you see a VSP doctor. Diabetic EyeCare Annual eye exams can help prevent diabetes-related blindness. If you have type 1 or type 2 diabetes, you can get both your...

  7. Pageflex Server [document: PF1888317_00001

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    when you see a VSP provider. Diabetic EyeCare Annual eye exams can help prevent diabetes related blindness. If you have type 1 or type 2 diabetes, you can get both your...

  8. SeaMicro Volume Server Power Reduction

    SciTech Connect (OSTI)

    2011-05-31

    Fact sheet about saving 75% of computing energy through an inter-connected array of low-power central processing units.

  9. Pageflex Server [document: PF4577458_00001]

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Page Under Construction Page Under Construction This page is currently under construction.

    Protect your vision with VSP. Get the best in eyecare and eyewear with Los Alamos National Labs and VSP ® Vision Care. At VSP, we invest in the things you value most-the best care at the lowest out-of-pocket costs. Because we're the only national not-for-profit vision care company, you can trust that we'll always put your wellness first. You'll like what you see with VSP. * Value and Savings. You'll

  10. Aggregation server for grid-integrated vehicles

    DOE Patents [OSTI]

    Kempton, Willett

    2015-05-26

    Methods, systems, and apparatus for aggregating electric power flow between an electric grid and electric vehicles are disclosed. An apparatus for aggregating power flow may include a memory and a processor coupled to the memory to receive electric vehicle equipment (EVE) attributes from a plurality of EVEs, aggregate EVE attributes, predict total available capacity based on the EVE attributes, and dispatch at least a portion of the total available capacity to the grid. Power flow may be aggregated by receiving EVE operational parameters from each EVE, aggregating the received EVE operational parameters, predicting total available capacity based on the aggregated EVE operational parameters, and dispatching at least a portion of the total available capacity to the grid.

  11. Horizontally scaling dChache SRM with the Terracotta platform

    SciTech Connect (OSTI)

    Perelmutov, T.; Crawford, M.; Moibenko, A.; Oleynik, G.; /Fermilab

    2011-01-01

    The dCache disk caching file system has been chosen by a majority of LHC experiments Tier 1 centers for their data storage needs. It is also deployed at many Tier 2 centers. The Storage Resource Manager (SRM) is a standardized grid storage interface and a single point of remote entry into dCache, and hence is a critical component. SRM must scale to increasing transaction rates and remain resilient against changing usage patterns. The initial implementation of the SRM service in dCache suffered from an inability to support clustered deployment, and its performance was limited by the hardware of a single node. Using the Terracotta platform, we added the ability to horizontally scale the dCache SRM service to run on multiple nodes in a cluster configuration, coupled with network load balancing. This gives site administrators the ability to increase the performance and reliability of SRM service to face the ever-increasing requirements of LHC data handling. In this paper we will describe the previous limitations of the architecture SRM server and how the Terracotta platform allowed us to readily convert single node service into a highly scalable clustered application.

  12. FY08 LDRD Final Report LOCAL: Locality-Optimizing Caching Algorithms and Layouts

    SciTech Connect (OSTI)

    Lindstrom, P

    2009-02-27

    This project investigated layout and compression techniques for large, unstructured simulation data to reduce bandwidth requirements and latency in simulation I/O and subsequent post-processing, e.g. data analysis and visualization. The main goal was to eliminate the data-transfer bottleneck - for example, from disk to memory and from central processing unit to graphics processing unit - through coherent data access and by trading underutilized compute power for effective bandwidth and storage. This was accomplished by (1) designing algorithms that both enforce and exploit compactness and locality in unstructured data, and (2) adapting offline computations to a novel stream processing framework that supports pipelining and low-latency sequential access to compressed data. This report summarizes the techniques developed and results achieved, and includes references to publications that elaborate on the technical details of these methods.

  13. Design and operation of the high energy physics information server

    SciTech Connect (OSTI)

    Dingbaum, J.J.; Martin, D.E.

    1994-12-31

    HEPIC an information {open_quotes}center of centers{close_quotes} for the HEP community, is a 24 hour online location where a HEP researcher can start her/his search for information. Operated by the HEP Network Research Center, HEPIC is accessible via WWW, gopher, anonymous FTP, DECnet, and AFS. This paper describes HEPIC`s design and future plans, and the HEPNRC`s efforts to collect information and link high energy physics researchers world-wide.

  14. U-181: IBM WebSphere Application Server Information Disclosure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execution Vulnerability U-272: IBM WebSphere Commerce User Information Disclosure Vulnerability T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site ...

  15. Metagenomes from Argonne's MG-RAST Metagenomics Analysis Server

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    MG-RAST has a large number of datasets that researchers have deposited for public use. As of July, 2014, the number of metagenomes represented by MG-RAST numbered more than 18,500, and the number of available sequences was more than 75 million! The public can browse the collection several different ways, and researchers can login to deposit new data. Researchers have the choice of keeping a dataset private so that it is viewable only by them when logged in, or they can choose to make a dataset public at any time with a simple click of a link. MG-RAST was launched in 2007 by the Mathematics and Computer Science Division at Argonne National Laboratory (ANL). It is part of the toolkit available to the Terragenomics project, which seeks to do a comprehensive metagenomics study of U.S. soil. The Terragenomics project page is located at http://www.mcs.anl.gov/research/projects/terragenomics/.

  16. Creating Large Scale Database Servers (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Sponsoring Org: USDOE Office of Energy Research (ER) (US) Country of Publication: United States Language: English Subject: 43 PARTICLE ACCELERATORS; ARCHITECTURE; DESIGN; ...

  17. U-139: IBM Tivoli Directory Server Input Validation Flaw

    Broader source: Energy.gov [DOE]

    The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input.

  18. Web Application Design Using Server-Side JavaScript

    SciTech Connect (OSTI)

    Hampton, J.; Simons, R.

    1999-02-01

    This document describes the application design philosophy for the Comprehensive Nuclear Test Ban Treaty Research & Development Web Site. This design incorporates object-oriented techniques to produce a flexible and maintainable system of applications that support the web site. These techniques will be discussed at length along with the issues they address. The overall structure of the applications and their relationships with one another will also be described. The current problems and future design changes will be discussed as well.

  19. OROSharePoint(MicrosoftSHarePointServer)PIA.pdf

    Energy Savers [EERE]

  20. What Certificates Should My Microsoft Exchange Server Have? - Nercenergy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Department | Department of Energy "Stranger Things" Didn't Get Quite-So-Right About the Energy Department What "Stranger Things" Didn't Get Quite-So-Right About the Energy Department August 5, 2016 - 3:01pm Addthis The Netflix series "Stranger Things" depicts the fictional Hawkins National Laboratory as discovering a bizarre alternate universe called "The Upside Down." However, the Energy Department does help power the exploration of our solar system

  1. Monitoring jobs with qs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Jobs » Monitoring jobs with qs Monitoring jobs with qs qs is an alternative tool to the SGE-provided qstat for querying the queue status developed at NERSC. qs provides an enhanced user interface designed to make it easier to see resource requests, utilization, and job position in the queue. qs provides a centralized web-service that can be queried using either the provided "qs" client, or by HTTP connection to the qs server. qs reports data from a cached copy of the genepool UGE

  2. CMS conditions data access using FroNTier

    SciTech Connect (OSTI)

    Blumenfeld, Barry J.; Dykstra, David; Lueking, Lee; Wicklund, Eric; /Fermilab

    2007-10-01

    The CMS experiment at the LHC has established an infrastructure using the FroNTier framework to deliver conditions (i.e. calibration, alignment, etc.) data to processing clients worldwide. FroNTier is a simple web service approach providing client HTTP access to a central database service. The system for CMS has been developed to work with POOL which provides object relational mapping between the C++ clients and various database technologies. Because of the read only nature of the data, Squid proxy caching servers are maintained near clients and these caches provide high performance data access. Several features have been developed to make the system meet the needs of CMS including careful attention to cache coherency with the central database, and low latency loading required for the operation of the online High Level Trigger. The ease of deployment, stability of operation, and high performance make the FroNTier approach well suited to the GRID environment being used for CMS offline, as well as for the online environment used by the CMS High Level Trigger (HLT). The use of standard software, such as Squid and various monitoring tools, make the system reliable, highly configurable and easily maintained. We describe the architecture, software, deployment, performance, monitoring and overall operational experience for the system.

  3. Microsoft PowerPoint - SWL HPConf2012

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ROCK FORREST CITY CACHE RIVER LEGEND WILDLIFE REFUGE AUGUSTA LITTLE ROCK 10 EXISTING RESERVOIR OR LAKE WHITE RIVER NATIONAL WILDLIFE REFUGE CACHE RIVER WILDLIFE REFUGE WHITE...

  4. Frontier: High Performance Database Access Using Standard Web Components in a Scalable Multi-Tier Architecture

    SciTech Connect (OSTI)

    Kosyakov, S.; Kowalkowski, J.; Litvintsev, D.; Lueking, L.; Paterno, M.; White, S.P.; Autio, Lauri; Blumenfeld, B.; Maksimovic, P.; Mathis, M.; /Johns Hopkins U.

    2004-09-01

    A high performance system has been assembled using standard web components to deliver database information to a large number of broadly distributed clients. The CDF Experiment at Fermilab is establishing processing centers around the world imposing a high demand on their database repository. For delivering read-only data, such as calibrations, trigger information, and run conditions data, we have abstracted the interface that clients use to retrieve data objects. A middle tier is deployed that translates client requests into database specific queries and returns the data to the client as XML datagrams. The database connection management, request translation, and data encoding are accomplished in servlets running under Tomcat. Squid Proxy caching layers are deployed near the Tomcat servers, as well as close to the clients, to significantly reduce the load on the database and provide a scalable deployment model. Details the system's construction and use are presented, including its architecture, design, interfaces, administration, performance measurements, and deployment plan.

  5. U-253: Citrix XenServer Denial of Service and Privilege Escalation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LINKS: Citrix Document ID: CTX134708 Secunia Advisory SA50530 Bugtraq ID: 55432 CVE-2012-3432 CVE-2012-3433 CVE-2012-3494 CVE-2012-3495 CVE-2012-3496 CVE-2012-3498...

  6. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  7. From: Sells_List_Server%DOELNC@DOE.GOV Subject: YELLOW/Caution...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    that appeared to be copper was slightly modified by grinding. The metal shielding had no hazardous warning label, however the fingerstock was not pure copper, but a beryllium ...

  8. Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA,...

    Energy Savers [EERE]

    PIA, Idaho National Laboratory Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory...

  9. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  10. Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA,...

    Broader source: Energy.gov (indexed) [DOE]

    Occupational Injury & Illness System (01&15) PIA, Idaho National Laboratory Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine ...

  11. T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service

    Broader source: Energy.gov [DOE]

    A local administrative user on a guest operating system can interrupt the normal operation of the target hypervisor.

  12. CASL L3 Report: Tally Server implementation in OpenMC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... do not need to store the tallies inmemory (other than meta-data describing the tally). ... High performance computing and Monte Carlo. Trans. Am. Nucl. Soc., 91(1):279-280, 2004. ...

  13. Data Transfer Software-SAS MetaData Server & Phoenix Integration Model Center

    Energy Science and Technology Software Center (OSTI)

    2010-04-15

    This software is a plug-in that interfaces between the Phoenix Integration's Model Center and the Base SAS 9.2 applications. The end use of the plug-in is to link input and output data that resides in SAS tables or MS SQL to and from "legacy" software programs without recoding. The potential end users are users who need to run legacy code and want data stored in a SQL database.

  14. From: Sells_List_Server%DOELNC@DOE.GOV Subject: YELLOW/Caution...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Analysis: As with other small appliances, laboratory equipment such as water baths and hot ... These can be used on laboratory equipment as well as coffee pots to avoid having them run ...

  15. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can login using an obfuscated version of their password. PLATFORM: ... user can use the password in obfuscated form (or in plain text form) to authenticate. ...

  16. A Faster Parallel Algorithm and Efficient Multithreaded Implementations for Evaluating Betweenness Centrality on Massive Datasets

    SciTech Connect (OSTI)

    Madduri, Kamesh; Ediger, David; Jiang, Karl; Bader, David A.; Chavarria-Miranda, Daniel

    2009-02-15

    We present a new lock-free parallel algorithm for computing betweenness centralityof massive small-world networks. With minor changes to the data structures, ouralgorithm also achieves better spatial cache locality compared to previous approaches. Betweenness centrality is a key algorithm kernel in HPCS SSCA#2, a benchmark extensively used to evaluate the performance of emerging high-performance computing architectures for graph-theoretic computations. We design optimized implementations of betweenness centrality and the SSCA#2 benchmark for two hardware multithreaded systems: a Cray XMT system with the Threadstorm processor, and a single-socket Sun multicore server with the UltraSPARC T2 processor. For a small-world network of 134 million vertices and 1.073 billion edges, the 16-processor XMT system and the 8-core Sun Fire T5120 server achieve TEPS scores (an algorithmic performance count for the SSCA#2 benchmark) of 160 million and 90 million respectively, which corresponds to more than a 2X performance improvement over the previous parallel implementations. To better characterize the performance of these multithreaded systems, we correlate the SSCA#2 performance results with data from the memory-intensive STREAM and RandomAccess benchmarks. Finally, we demonstrate the applicability of our implementation to analyze massive real-world datasets by computing approximate betweenness centrality for a large-scale IMDb movie-actor network.

  17. Cloud services for the Fermilab scientific stakeholders

    SciTech Connect (OSTI)

    Timm, S.; Garzoglio, G.; Mhashilkar, P.; Boyd, J.; Bernabeu, G.; Sharma, N.; Peregonow, N.; Kim, H.; Noh, S.; Palur, S.; Raicu, I.

    2015-01-01

    As part of the Fermilab/KISTI cooperative research project, Fermilab has successfully run an experimental simulation workflow at scale on a federation of Amazon Web Services (AWS), FermiCloud, and local FermiGrid resources. We used the CernVM-FS (CVMFS) file system to deliver the application software. We established Squid caching servers in AWS as well, using the Shoal system to let each individual virtual machine find the closest squid server. We also developed an automatic virtual machine conversion system so that we could transition virtual machines made on FermiCloud to Amazon Web Services. We used this system to successfully run a cosmic ray simulation of the NOvA detector at Fermilab, making use of both AWS spot pricing and network bandwidth discounts to minimize the cost. On FermiCloud we also were able to run the workflow at the scale of 1000 virtual machines, using a private network routable inside of Fermilab. As a result, we present in detail the technological improvements that were used to make this work a reality.

  18. Cloud services for the Fermilab scientific stakeholders

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Timm, S.; Garzoglio, G.; Mhashilkar, P.; Boyd, J.; Bernabeu, G.; Sharma, N.; Peregonow, N.; Kim, H.; Noh, S.; Palur, S.; et al

    2015-01-01

    As part of the Fermilab/KISTI cooperative research project, Fermilab has successfully run an experimental simulation workflow at scale on a federation of Amazon Web Services (AWS), FermiCloud, and local FermiGrid resources. We used the CernVM-FS (CVMFS) file system to deliver the application software. We established Squid caching servers in AWS as well, using the Shoal system to let each individual virtual machine find the closest squid server. We also developed an automatic virtual machine conversion system so that we could transition virtual machines made on FermiCloud to Amazon Web Services. We used this system to successfully run a cosmic raymore » simulation of the NOvA detector at Fermilab, making use of both AWS spot pricing and network bandwidth discounts to minimize the cost. On FermiCloud we also were able to run the workflow at the scale of 1000 virtual machines, using a private network routable inside of Fermilab. As a result, we present in detail the technological improvements that were used to make this work a reality.« less

  19. Interactive, Internet Delivery of Scientific Visualization viaStructured, Prerendered Multiresolution Imagery

    SciTech Connect (OSTI)

    Chen, Jerry; Yoon, Ilmi; Bethel, E. Wes

    2005-04-20

    We present a novel approach for highly interactive remote delivery of visualization results. Instead of real-time rendering across the internet, our approach, inspired by QuickTime VR's Object Movieconcept, delivers pre-rendered images corresponding to different viewpoints and different time steps to provide the experience of 3D and temporal navigation. We use tiled, multiresolution image streaming to consume minimum bandwidth while providing the maximum resolution that a user can perceive from a given viewpoint. Since image data, a viewpoint and time stamps are the only required inputs, our approach is generally applicable to all visualization and graphics rendering applications capable of generating image files in an ordered fashion. Our design is a form of latency-tolerant remote visualization, where visualization and Rendering time is effectively decoupled from interactive exploration. Our approach trades off increased interactivity, flexible resolution (for individual clients), reduced load and effective reuse of coherent frames between multiple users (from the servers perspective) at the expense of unconstrained exploration. A normal web server is the vehicle for providing on-demand images to the remote client application, which uses client-pull to obtain and cache only those images required to fulfill the interaction needs. This paper presents an architectural description of the system along with a performance characterization for stage of production, delivery and viewing pipeline.

  20. NOTICE OF INTENT: NGEM II Funding Opportunity | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Other Enabling Technologies to Improve Performance (Efficiency and Power Density): This ... insulation and varnishing materials, soft magnetic materials other than Si steel ...

  1. List based prefetch

    DOE Patents [OSTI]

    Boyle, Peter; Christ, Norman; Gara, Alan; Kim; ,Changhoan; Mawhinney, Robert; Ohmacht, Martin; Sugavanam, Krishnan

    2012-08-28

    A list prefetch engine improves a performance of a parallel computing system. The list prefetch engine receives a current cache miss address. The list prefetch engine evaluates whether the current cache miss address is valid. If the current cache miss address is valid, the list prefetch engine compares the current cache miss address and a list address. A list address represents an address in a list. A list describes an arbitrary sequence of prior cache miss addresses. The prefetch engine prefetches data according to the list, if there is a match between the current cache miss address and the list address.

  2. List based prefetch

    DOE Patents [OSTI]

    Boyle, Peter; Christ, Norman; Gara, Alan; Kim, Changhoan; Mawhinney, Robert; Ohmacht, Martin; Sugavanam, Krishnan

    2014-08-12

    A list prefetch engine improves a performance of a parallel computing system. The list prefetch engine receives a current cache miss address. The list prefetch engine evaluates whether the current cache miss address is valid. If the current cache miss address is valid, the list prefetch engine compares the current cache miss address and a list address. A list address represents an address in a list. A list describes an arbitrary sequence of prior cache miss addresses. The prefetch engine prefetches data according to the list, if there is a match between the current cache miss address and the list address.

  3. CEPH viewer: A client-server database to browse and manipulate CEPH physical mapping and linkage data

    SciTech Connect (OSTI)

    Nadkarni, P.M.; Bray-Ward, P.

    1995-01-01

    With their announcement of the first high-level physical map of the human genome, the Center for Study of Human Polymorphisms (CEPH) made the supporting data on the clones in their mega-YAC library and their linkage markers publicly available through anonymous ftp. Individual researchers as well as genome centers now need to constantly reference this voluminous body of data that, as of May 9, 1994, held information on approximately 4000 STSs, 33,500 YACs, 17,600 STS-YAC associations, 87,400 YAC-YAC associations based on Alu-PCR analysis, and 99,000 YAC-YAC associations based on a combination of fingerprint and Alu-PCR data, in addition to 6 sets of fingerprints for each YAC and a total of 1.5 million fingerprint fragments for all YACs. 2 refs., 1 fig.

  4. T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

  5. Comanche County, Oklahoma: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    Oklahoma Cache, Oklahoma Chattanooga, Oklahoma Elgin, Oklahoma Faxon, Oklahoma Fletcher, Oklahoma Geronimo, Oklahoma Indiahoma, Oklahoma Lawton, Oklahoma Medicine Park,...

  6. C:\Documents and Settings\mirnov\Local Settings\Application Data\Mozilla\Firefox\Profiles\h0lebs8c.default\Cache\92AE6028d01.pd

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Finite electron temperature effects on interferometric and polarimetric measurements in fusion plasmas V. V. Mirnov University of Wisconsin-Madison and Center for Magnetic Self-Organization in Laboratory and Astrophysical Plasmas, Madison, Wisconsin 53706, USA W. X. Ding and D. L. Brower Department of Physics and Astronomy, University of California at Los Angeles, Los Angeles, California 90095, USA M. A. Van Zeeland and T. N. Carlstrom General Atomics, San Diego, California 92186-9784, USA

  7. Query and Visualization of extremely large network datasets over the web using Quadtree based KML Regional Network Links

    SciTech Connect (OSTI)

    Dadi, Upendra; Liu, Cheng; Vatsavai, Raju

    2009-01-01

    Geographic data sets are often very large in size. Interactive visualization of such data at all scales is not easy because of the limited resolution of the monitors and inability of visualization applications to handle the volume of data. This is especially true for large vector datasets. The end user s experience is frequently unsatisfactory when exploring such data over the web using a naive application. Network bandwidth is another contributing factor to the low performance. In this paper, a Quadtree based technique to visualize extremely large spatial network datasets over the web is described. It involves using custom developed algorithms leveraging a PostGIS database as the data source and Google Earth as the visualization client. This methodology supports both point and range queries along with non-spatial queries. This methodology is demonstrated using a network dataset consisting of several million links. The methodology is based on using some of the powerful features of KML (Keyhole Markup Language). Keyhole Markup Language (KML) is an Open Geospatial Consortium (OGC) standard for displaying geospatial data on Earth browsers. One of the features of KML is the notion of Network Links. Using network links, a wide range of geospatial data sources such as geodatabases, static files and geospatial data services can be simultaneously accessed and visualized seamlessly. Using the network links combined with Level of Detail principle, view based rendering and intelligent server and client-side caching, scalability in visualizing extremely large spatial datasets can be achieved.

  8. Bulk Data Mover

    SciTech Connect (OSTI)

    2011-01-03

    Bulk Data Mover (BDM) is a high-level data transfer management tool. BDM handles the issue of large variance in file sizes and a big portion of small files by managing the file transfers with optimized transfer queue and concurrency management algorithms. For example, climate simulation data sets are characterized by large volume of files with extreme variance in file sizes. The BDN achieves high performance using a variety of techniques, including multi-thraded concurrent transfer connections, data channel caching, load balancing over multiple transfer servers, and storage i/o pre-fetching. Logging information from the BDM is collected and analyzed to study the effectiveness of the transfer management algorithms. The BDM can accept a request composed of multiple files or an entire directory. The request also contains the target site and directory where the replicated files will reside. If a directory is provided at the source, then the BDM will replicate the structure of the source directory at the target site. The BDM is capable of transferring multiple files concurrently as well as using parallel TCP streams. The optimal level of concurrency or parallel streams depends on the bandwidth capacity of the storage systems at both ends of the transfer as well as achievable bandwidth of the wide-area network. Hardware req.-PC, MAC, Multi-platform & Workstation; Software req.: Compile/version-Java 1.50_x or ablove; Type of files: source code, executable modules, installation instructions other, user guide; URL: http://sdm.lbl.gov/bdm/

  9. Motivation and Design of the Sirocco Storage System Version 1.0.

    SciTech Connect (OSTI)

    Curry, Matthew Leon; Ward, H. Lee; Danielson, Geoffrey Charles

    2015-07-01

    Sirocco is a massively parallel, high performance storage system for the exascale era. It emphasizes client-to-client coordination, low server-side coupling, and free data movement to improve resilience and performance. Its architecture is inspired by peer-to-peer and victim- cache architectures. By leveraging these ideas, Sirocco natively supports several media types, including RAM, flash, disk, and archival storage, with automatic migration between levels. Sirocco also includes storage interfaces and support that are more advanced than typical block storage. Sirocco enables clients to efficiently use key-value storage or block-based storage with the same interface. It also provides several levels of transactional data updates within a single storage command, including full ACID-compliant updates. This transaction support extends to updating several objects within a single transaction. Further support is provided for con- currency control, enabling greater performance for workloads while providing safe concurrent modification. By pioneering these and other technologies and techniques in the storage system, Sirocco is poised to fulfill a need for a massively scalable, write-optimized storage system for exascale systems. This is version 1.0 of a document reflecting the current and planned state of Sirocco. Further versions of this document will be accessible at http://www.cs.sandia.gov/Scalable_IO/ sirocco .

  10. Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XML-RPC server accepts POST requests only.

  11. Oops

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The NETL website is down due to server maintainance

  12. Document Imaging | Department of Energy

    Energy Savers [EERE]

    Electronic files can be stored on file servers and posted on web servers giving broader ... management systems, and search engines that can be PC, file server or web server based. ...

  13. Conditional load and store in a shared memory

    SciTech Connect (OSTI)

    Blumrich, Matthias A; Ohmacht, Martin

    2015-02-03

    A method, system and computer program product for implementing load-reserve and store-conditional instructions in a multi-processor computing system. The computing system includes a multitude of processor units and a shared memory cache, and each of the processor units has access to the memory cache. In one embodiment, the method comprises providing the memory cache with a series of reservation registers, and storing in these registers addresses reserved in the memory cache for the processor units as a result of issuing load-reserve requests. In this embodiment, when one of the processor units makes a request to store data in the memory cache using a store-conditional request, the reservation registers are checked to determine if an address in the memory cache is reserved for that processor unit. If an address in the memory cache is reserved for that processor, the data are stored at this address.

  14. Microsoft PowerPoint - File Transfer-Turner

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    pftppftpgsi * Liabilities - Security * Password transmitted as plain text - Servers ... 18 Examples: ftp * HPSS only - Dummy password for "authentication server" % module ...

  15. T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The BlackBerry Web Desktop Manager not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the BlackBerry Web Desktop Manager software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  16. Energy Conservation Program for Consumer Products and Certain Commercial and Industrial Equipment: Proposed Determination of Computer Servers as a Covered Consumer Product, EERE-2013-BT-DET-0034

    Broader source: Energy.gov [DOE]

    Pursuant to the guidance issued by the Office of General Counsel in its Notice of Guidance on Ex Parte Communications, 74 F.R. 197, this memorandum summarizes a November 22, 2013 meeting between...

  17. Index of /datasets/files/41/pub/PUBID8_3941

    Open Energy Info (EERE)

    Exist 22-May-2012 01:04 - DIR MaxTech 22-May-2012 01:04 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 1006824916 Varnish...

  18. Index of /datasets/files/41/pub/PUBID8_0001/Exist

    Open Energy Info (EERE)

    Size DIR Parent Directory - DIR Sim1 18-Apr-2012 11:06 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 653191375 Varnish...

  19. Index of /datasets/files/41/pub/PUBID8_1506

    Open Energy Info (EERE)

    Exist 21-May-2012 23:49 - DIR MaxTech 21-May-2012 23:49 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 1006824909 Varnish...

  20. Index of /datasets/files/41/pub/PUBID8_0001/MaxTech

    Open Energy Info (EERE)

    Size DIR Parent Directory - DIR Sim1 18-Apr-2012 11:06 - 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 653191376 Varnish...

  1. Index of /datasets/files/41/pub/PUBID8_5935

    Open Energy Info (EERE)

    is a file-level view of datasets. Go back to Datasets Listing 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 1863489907 Varnish...

  2. Store-operate-coherence-on-value

    SciTech Connect (OSTI)

    Chen, Dong; Heidelberger, Philip; Kumar, Sameer; Ohmacht, Martin; Steinmacher-Burow, Burkhard

    2014-11-18

    A system, method and computer program product for performing various store-operate instructions in a parallel computing environment that includes a plurality of processors and at least one cache memory device. A queue in the system receives, from a processor, a store-operate instruction that specifies under which condition a cache coherence operation is to be invoked. A hardware unit in the system runs the received store-operate instruction. The hardware unit evaluates whether a result of the running the received store-operate instruction satisfies the condition. The hardware unit invokes a cache coherence operation on a cache memory address associated with the received store-operate instruction if the result satisfies the condition. Otherwise, the hardware unit does not invoke the cache coherence operation on the cache memory device.

  3. Version pressure feedback mechanisms for speculative versioning...

    Office of Scientific and Technical Information (OSTI)

    Version pressure feedback mechanisms for speculative versioning caches Citation Details In-Document Search Title: Version pressure feedback mechanisms for speculative versioning ...

  4. PowerPoint Presentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... CLEARWATER RESERVOIR MISSOURI ARKANSAS Lock and Dam No 1 10 CACHE RIVER LEGEND EXISTING ... Little Rock District, Southwestern Division Pine Mountain Dam * Authorized in 1965 and ...

  5. Microsoft PowerPoint - SWL HPConf2015.pptx [Read-Only

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CLEARWATER RESERVOIR MISSOURI ARKANSAS Lock and Dam No 1 10 CACHE RIVER LEGEND EXISTING ... M&I Water Supply Reallocation Studies Beaver Lake * Completed Studies * Beaver Dam Trout ...

  6. IOR

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    underlying disk subsystem. Procedures for adjusting IOR benchmark script parameters to reduce memory-caching effects will be provided later in the document. Required Runs IOR...

  7. Multi-core Performance Analysis

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Scaling on Petascale- class Systems Cray XE/XT Architecture, System Software, and Scientific Libraries 34 CRAY XE/XT SYSTEM ARCHITECTURE 35 DDR3 Channel DDR3 Channel DDR3 Channel DDR3 Channel DDR3 Channel DDR3 Channel DDR3 Channel DDR3 Channel 6MB L3 Cache Greyhound Greyhound Greyhound Greyhound Greyhound Greyhound 6MB L3 Cache Greyhound Greyhound Greyhound Greyhound Greyhound Greyhound 6MB L3 Cache Greyhound Greyhound Greyhound Greyhound Greyhound Greyhound 6MB L3 Cache Greyhound Greyhound

  8. PDF Document (5127k)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Whatcom Spokane Marion Clackamas Clatsop Garfield Snohomish King Malheur Cache Rich Weber Box Elder Yellowstone Beaverhead Garfield Fergus Liberty Chouteau Stillwater Hill...

  9. The NetLogger Methodology for High Performance Distributed Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computing Sciences Directorate Lawrence Berkeley National Laboratory University of ... there are two cache hits (blocks found inmemory) as a result of previously requested, ...

  10. TTW 6-26-06

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Each underground cache will contain a mine phone with a selector switch. Redundant phone ... The address, which many viewed via satellite, covered some key accomplishments and several ...

  11. Scalla: Structured Cluster Architecture for Low Latency Access

    SciTech Connect (OSTI)

    Hanushevsky, Andrew; Wang, Daniel L.; /SLAC

    2012-03-20

    Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.

  12. Bulk Data Mover

    Energy Science and Technology Software Center (OSTI)

    2011-01-03

    Bulk Data Mover (BDM) is a high-level data transfer management tool. BDM handles the issue of large variance in file sizes and a big portion of small files by managing the file transfers with optimized transfer queue and concurrency management algorithms. For example, climate simulation data sets are characterized by large volume of files with extreme variance in file sizes. The BDN achieves high performance using a variety of techniques, including multi-thraded concurrent transfer connections,more » data channel caching, load balancing over multiple transfer servers, and storage i/o pre-fetching. Logging information from the BDM is collected and analyzed to study the effectiveness of the transfer management algorithms. The BDM can accept a request composed of multiple files or an entire directory. The request also contains the target site and directory where the replicated files will reside. If a directory is provided at the source, then the BDM will replicate the structure of the source directory at the target site. The BDM is capable of transferring multiple files concurrently as well as using parallel TCP streams. The optimal level of concurrency or parallel streams depends on the bandwidth capacity of the storage systems at both ends of the transfer as well as achievable bandwidth of the wide-area network. Hardware req.-PC, MAC, Multi-platform & Workstation; Software req.: Compile/version-Java 1.50_x or ablove; Type of files: source code, executable modules, installation instructions other, user guide; URL: http://sdm.lbl.gov/bdm/« less

  13. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server. PLATFORM: * BlackBerry Enterprise Server Express version...

  14. Nercenergy Web Application Development

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Three Elements to Remember When Establishing Your Microsoft Exchange Server http:www.nercenergy.comthree-elements-to-remember-when-establishing-your-microsoft-exchange-server...

  15. Energy Conservation Program for Consumer Products and Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Equipment: Proposed Determination of Computer Servers as a Covered Consumer Product, ... Equipment: Proposed Determination of Computer Servers as a Covered Consumer Product, ...

  16. Fuji2011_BusinessValueOfTape.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Utilities, Filesystem Scanner MySQL XML-RPC External Software Server Scalable server Command line tool 17 PIBS Hardware Layout GPFS disk arrays HPSS ... Fiber Channel fabric...

  17. T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash.

  18. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  19. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  20. Mapping virtual addresses to different physical addresses for value disambiguation for thread memory access requests

    SciTech Connect (OSTI)

    Gala, Alan; Ohmacht, Martin

    2014-09-02

    A multiprocessor system includes nodes. Each node includes a data path that includes a core, a TLB, and a first level cache implementing disambiguation. The system also includes at least one second level cache and a main memory. For thread memory access requests, the core uses an address associated with an instruction format of the core. The first level cache uses an address format related to the size of the main memory plus an offset corresponding to hardware thread meta data. The second level cache uses a physical main memory address plus software thread meta data to store the memory access request. The second level cache accesses the main memory using the physical address with neither the offset nor the thread meta data after resolving speculation. In short, this system includes mapping of a virtual address to a different physical addresses for value disambiguation for different threads.

  1. Ordering of guarded and unguarded stores for no-sync I/O

    DOE Patents [OSTI]

    Gara, Alan; Ohmacht, Martin

    2013-06-25

    A parallel computing system processes at least one store instruction. A first processor core issues a store instruction. A first queue, associated with the first processor core, stores the store instruction. A second queue, associated with a first local cache memory device of the first processor core, stores the store instruction. The first processor core updates first data in the first local cache memory device according to the store instruction. The third queue, associated with at least one shared cache memory device, stores the store instruction. The first processor core invalidates second data, associated with the store instruction, in the at least one shared cache memory. The first processor core invalidates third data, associated with the store instruction, in other local cache memory devices of other processor cores. The first processor core flushing only the first queue.

  2. Choreographer

    Energy Science and Technology Software Center (OSTI)

    2013-06-01

    Most organizations face on-going and damaging attacks on their public-facing servers. These servers are critical to the organization, yet provide an avenue of attack. The cost of an average data breach is estimated at $5.5 million. Our approach changes the public addresses of servers to make reconnaisance useless and to protect our servers from automated attacks.

  3. Optimization and Performance Modeling of Stencil Computations on Modern Microprocessors

    SciTech Connect (OSTI)

    Datta, Kaushik; Kamil, Shoaib; Williams, Samuel; Oliker, Leonid; Shalf, John; Yelick, Katherine

    2007-06-01

    Stencil-based kernels constitute the core of many important scientific applications on blockstructured grids. Unfortunately, these codes achieve a low fraction of peak performance, due primarily to the disparity between processor and main memory speeds. In this paper, we explore the impact of trends in memory subsystems on a variety of stencil optimization techniques and develop performance models to analytically guide our optimizations. Our work targets cache reuse methodologies across single and multiple stencil sweeps, examining cache-aware algorithms as well as cache-oblivious techniques on the Intel Itanium2, AMD Opteron, and IBM Power5. Additionally, we consider stencil computations on the heterogeneous multicore design of the Cell processor, a machine with an explicitly managed memory hierarchy. Overall our work represents one of the most extensive analyses of stencil optimizations and performance modeling to date. Results demonstrate that recent trends in memory system organization have reduced the efficacy of traditional cache-blocking optimizations. We also show that a cache-aware implementation is significantly faster than a cache-oblivious approach, while the explicitly managed memory on Cell enables the highest overall efficiency: Cell attains 88% of algorithmic peak while the best competing cache-based processor achieves only 54% of algorithmic peak performance.

  4. Compiler-Directed File Layout Optimization for Hierarchical Storage Systems

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Ding, Wei; Zhang, Yuanrui; Kandemir, Mahmut; Son, Seung Woo

    2013-01-01

    File layout of array data is a critical factor that effects the behavior of storage caches, and has so far taken not much attention in the context of hierarchical storage systems. The main contribution of this paper is a compiler-driven file layout optimization scheme for hierarchical storage caches. This approach, fully automated within an optimizing compiler, analyzes a multi-threaded application code and determines a file layout for each disk-resident array referenced by the code, such that the performance of the target storage cache hierarchy is maximized. We tested our approach using 16 I/O intensive application programs and compared its performancemore » against two previously proposed approaches under different cache space management schemes. Our experimental results show that the proposed approach improves the execution time of these parallel applications by 23.7% on average.« less

  5. A prototype functional language implementation for hierarchical-memory architectures

    SciTech Connect (OSTI)

    Wolski, R.; Feo, J.; Cann, D.

    1991-06-05

    The first implementation of Sisal was designed for general shared-memory architectures. Since then, we have optimized the system for vector and coherent-cache multiprocessors. Coherent-cache systems can be thought of as simple, two-level hierarchical memory systems, where the memory hierarchy is managed by the hardware. The compiler and run-time system for such an architecture needs to maintain data locality so that the processor caches are used as much as possible. In this paper, we extend the coherent-cache implementation to include explicit compiler and run-time control for medium-grain and coarse-grain hierarchical-memory architectures. We implemented the extended system on the BBN Butterfly using interleaved shared memory exclusively for the purposes of data sharing and exploiting the per-processor local memories. We give preliminary performance results for this extended system. 10 refs., 7 figs.

  6. APEX Workflows LANL, NERSC, SNL SAND2015-10342 O LA-UR-15-29113

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    be configured in a scratch mode, where files are explicitly moved between tiers using a command line or C API, or a cache mode, where file pages move transparently between tiers...

  7. NERSC-Overview-NUG12.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... caches large random-access files in memory 10 1.E+06 1.E+07 1.E+08 1.E+09 1.E+10 ... History of Production High Performance Computing Growth Rate: 10x every 4 years Goal: ...

  8. Edison-IO-CUG2014-paper-Zhao

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Since each compute node has perfectly balanced IO workload, and does not do any computing... size of a file that both the read and write-through caches will try to keep in memory. ...

  9. Microsupercomputers: Design and implementation. Technical progress report, November 1988-March 1989

    SciTech Connect (OSTI)

    Hennessy, J.L.; Horowitz, M.A.

    1989-03-01

    Contents: (1) parallel processor architecture; (2) parallel software; (3) unit processor architecture; (4) computer aided designs tools; (5) very large scale integration. keywords: scalable shared memory multiprocessors, high performance cache design.

  10. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department...

    Energy Savers [EERE]

    installed as world readable can be exploited to disclose e.g. the administrative password. 4) An error due to grinder having insecure permissions for the cache folder (var...

  11. Recovery Act Workers Add Time Capsule Before Sealing Reactor...

    Office of Environmental Management (EM)

    American Recovery and Reinvestment Act workers at the Savannah River Site (SRS) placed a time capsule with a cache of timely news items inside a former nuclear reactor this week ...

  12. ORISE: CHEMPACK Mapping Application | How ORISE is Making a Difference

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Until May 2011, the CDC managed cache tracking information on Microsoft Excel work sheets. With the help of ORISE multimedia and Web designers, a mapping application known as the ...

  13. LA-UR-14-26016 LA-UR-14-26016 Unclassified Heidi Sandoval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    6016 LA-UR-14-26016 Unclassified Heidi Sandoval California State University Matthew Dwyer Lynchburg College Anthony Pearson St. Cloud State University The Effects of SSD Caching on...

  14. Towards Optimal Petascale Simulations (Technical Report) | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    Towards Optimal Petascale Simulations Citation Details In-Document Search Title: Towards Optimal Petascale Simulations Our goal in this project was to design scalable numerical algorithms needed by SciDAC applications that adapt to use evolving hardware resources as efficiently as possible. Our primary challenge is minimizing communication costs, where communication means moving data either between levels of a memory hierarchy (L1 cache to L2 cache to main memory etc.) or between processors over

  15. NERSC Nick Balthaser NERSC Storage Systems Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction to HPSS at NERSC Nick Balthaser NERSC Storage Systems Group nabalthaser@lbl.gov Joint Genome Institute, Walnut Creek, CA Feb 10, 2011 * NERSC Archive Technologies Overview * Use Cases for the Archive * Hands-on: - Authentication - Client Usage and Examples * Client Installation Agenda 2 * Current data volume: 12PB in 100M files written to 26k tapes (user system) * Permanent storage is magnetic tape, disk cache is transient - All data written to HPSS goes through the disk cache -

  16. Laboratory Directed Research & Development Page National Energy Research Scientific Computing Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Directed Research & Development Page National Energy Research Scientific Computing Center T3E Individual Node Optimization Michael Stewart, SGI/Cray, 4/9/98 * Introduction * T3E Processor * T3E Local Memory * Cache Structure * Optimizing Codes for Cache Usage * Loop Unrolling * Other Useful Optimization Options * References 1 Laboratory Directed Research & Development Page National Energy Research Scientific Computing Center Introduction * Primary topic will be single processor

  17. Measuring and Understanding Memory Bandwidth

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Measuring and Understanding Memory Bandwidth Measuring and Understanding Memory Bandwidth Measuring Bandwidth Usage Measuring memory bandwidth is a good way of understanding how well your application uses cache memory. Today's processors are constructed under the assumption that a small amount of (expensive) fast memory - called "cache" - is used more often than a larger amount of slower memory (DRAM). The extent to which this assumption applies to your code is referred to as memory

  18. Image matrix processor for fast multi-dimensional computations

    DOE Patents [OSTI]

    Roberson, George P.; Skeate, Michael F.

    1996-01-01

    An apparatus for multi-dimensional computation which comprises a computation engine, including a plurality of processing modules. The processing modules are configured in parallel and compute respective contributions to a computed multi-dimensional image of respective two dimensional data sets. A high-speed, parallel access storage system is provided which stores the multi-dimensional data sets, and a switching circuit routes the data among the processing modules in the computation engine and the storage system. A data acquisition port receives the two dimensional data sets representing projections through an image, for reconstruction algorithms such as encountered in computerized tomography. The processing modules include a programmable local host, by which they may be configured to execute a plurality of different types of multi-dimensional algorithms. The processing modules thus include an image manipulation processor, which includes a source cache, a target cache, a coefficient table, and control software for executing image transformation routines using data in the source cache and the coefficient table and loading resulting data in the target cache. The local host processor operates to load the source cache with a two dimensional data set, loads the coefficient table, and transfers resulting data out of the target cache to the storage system, or to another destination.

  19. Image matrix processor for fast multi-dimensional computations

    DOE Patents [OSTI]

    Roberson, G.P.; Skeate, M.F.

    1996-10-15

    An apparatus for multi-dimensional computation is disclosed which comprises a computation engine, including a plurality of processing modules. The processing modules are configured in parallel and compute respective contributions to a computed multi-dimensional image of respective two dimensional data sets. A high-speed, parallel access storage system is provided which stores the multi-dimensional data sets, and a switching circuit routes the data among the processing modules in the computation engine and the storage system. A data acquisition port receives the two dimensional data sets representing projections through an image, for reconstruction algorithms such as encountered in computerized tomography. The processing modules include a programmable local host, by which they may be configured to execute a plurality of different types of multi-dimensional algorithms. The processing modules thus include an image manipulation processor, which includes a source cache, a target cache, a coefficient table, and control software for executing image transformation routines using data in the source cache and the coefficient table and loading resulting data in the target cache. The local host processor operates to load the source cache with a two dimensional data set, loads the coefficient table, and transfers resulting data out of the target cache to the storage system, or to another destination. 10 figs.

  20. SU-D-BRD-02: A Web-Based Image Processing and Plan Evaluation Platform (WIPPEP) for Future Cloud-Based Radiotherapy

    SciTech Connect (OSTI)

    Chai, X; Liu, L; Xing, L

    2014-06-01

    Purpose: Visualization and processing of medical images and radiation treatment plan evaluation have traditionally been constrained to local workstations with limited computation power and ability of data sharing and software update. We present a web-based image processing and planning evaluation platform (WIPPEP) for radiotherapy applications with high efficiency, ubiquitous web access, and real-time data sharing. Methods: This software platform consists of three parts: web server, image server and computation server. Each independent server communicates with each other through HTTP requests. The web server is the key component that provides visualizations and user interface through front-end web browsers and relay information to the backend to process user requests. The image server serves as a PACS system. The computation server performs the actual image processing and dose calculation. The web server backend is developed using Java Servlets and the frontend is developed using HTML5, Javascript, and jQuery. The image server is based on open source DCME4CHEE PACS system. The computation server can be written in any programming language as long as it can send/receive HTTP requests. Our computation server was implemented in Delphi, Python and PHP, which can process data directly or via a C++ program DLL. Results: This software platform is running on a 32-core CPU server virtually hosting the web server, image server, and computation servers separately. Users can visit our internal website with Chrome browser, select a specific patient, visualize image and RT structures belonging to this patient and perform image segmentation running Delphi computation server and Monte Carlo dose calculation on Python or PHP computation server. Conclusion: We have developed a webbased image processing and plan evaluation platform prototype for radiotherapy. This system has clearly demonstrated the feasibility of performing image processing and plan evaluation platform through a web

  1. Twin-tailed fail-over for fileservers maintaining full performance in the presence of a failure

    DOE Patents [OSTI]

    Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard D.

    2008-02-12

    A method for maintaining full performance of a file system in the presence of a failure is provided. The file system having N storage devices, where N is an integer greater than zero and N primary file servers where each file server is operatively connected to a corresponding storage device for accessing files therein. The file system further having a secondary file server operatively connected to at least one of the N storage devices. The method including: switching the connection of one of the N storage devices to the secondary file server upon a failure of one of the N primary file servers; and switching the connections of one or more of the remaining storage devices to a primary file server other than the failed file server as necessary so as to prevent a loss in performance and to provide each storage device with an operating file server.

  2. MEMORANDUM FOR ELIZABETH MONTOYA TRANSITION TEAM FROM THOMAS...

    Office of Environmental Management (EM)

    The desktop functions and applications, e.g. word processing, spreadsheets, internet access, are provided by servers located in a data center. A single server in the data center ...

  3. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server via a MitM (Man-in-the-Middle) ...

  4. PDSF Selected Announcements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    will be set to zero 12 hours before the downtime begins. Read the full post New NERSC NX server May 25, 2011 by Eric Hjort Many of you have used the PDSF NX server to accelerate...

  5. U-011: Cisco Security Response: Cisco TelePresence Video Communication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Server Cross-Site Scripting Vulnerability | Department of Energy 11: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability U-011: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability October 14, 2011 - 12:30pm Addthis PROBLEM: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability PLATFORM: Version(s): VCS prior to 7.0 ABSTRACT: A

  6. T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code

    Broader source: Energy.gov [DOE]

    Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

  7. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  8. Soft-core processor study for node-based architectures.

    SciTech Connect (OSTI)

    Van Houten, Jonathan Roger; Jarosz, Jason P.; Welch, Benjamin James; Gallegos, Daniel E.; Learn, Mark Walter

    2008-09-01

    Node-based architecture (NBA) designs for future satellite projects hold the promise of decreasing system development time and costs, size, weight, and power and positioning the laboratory to address other emerging mission opportunities quickly. Reconfigurable Field Programmable Gate Array (FPGA) based modules will comprise the core of several of the NBA nodes. Microprocessing capabilities will be necessary with varying degrees of mission-specific performance requirements on these nodes. To enable the flexibility of these reconfigurable nodes, it is advantageous to incorporate the microprocessor into the FPGA itself, either as a hardcore processor built into the FPGA or as a soft-core processor built out of FPGA elements. This document describes the evaluation of three reconfigurable FPGA based processors for use in future NBA systems--two soft cores (MicroBlaze and non-fault-tolerant LEON) and one hard core (PowerPC 405). Two standard performance benchmark applications were developed for each processor. The first, Dhrystone, is a fixed-point operation metric. The second, Whetstone, is a floating-point operation metric. Several trials were run at varying code locations, loop counts, processor speeds, and cache configurations. FPGA resource utilization was recorded for each configuration. Cache configurations impacted the results greatly; for optimal processor efficiency it is necessary to enable caches on the processors. Processor caches carry a penalty; cache error mitigation is necessary when operating in a radiation environment.

  9. Outdoor durability of radiation-cured coatings

    SciTech Connect (OSTI)

    Holman, R.; Kennedy, R.

    1997-12-31

    Radiation cured coatings are used almost exclusively on products which have little or no exposure to moisture or the weather; inks, furniture varnishes, floor varnishes and coatings for electronic components. However there is considerable interest in being able to use this technology in exterior environments as a substitute for solvent-borne coatings. A 3-year study examining the possible reasons for the poor durability of radiation curable coatings showed that the resistance of the monomers and oligomers to hydrogen abstraction was crucially important, and the water permeability of the cured coating influenced the long-term adhesion performance. The project concluded that with the appropriate combination of curing technology and monomer/oligomer selection, the prospects of UV curable coatings for outdoor exposure are very encouraging.

  10. Programmable partitioning for high-performance coherence domains in a multiprocessor system

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Salapura, Valentina

    2011-01-25

    A multiprocessor computing system and a method of logically partitioning a multiprocessor computing system are disclosed. The multiprocessor computing system comprises a multitude of processing units, and a multitude of snoop units. Each of the processing units includes a local cache, and the snoop units are provided for supporting cache coherency in the multiprocessor system. Each of the snoop units is connected to a respective one of the processing units and to all of the other snoop units. The multiprocessor computing system further includes a partitioning system for using the snoop units to partition the multitude of processing units into a plurality of independent, memory-consistent, adjustable-size processing groups. Preferably, when the processor units are partitioned into these processing groups, the partitioning system also configures the snoop units to maintain cache coherency within each of said groups.

  11. Managing coherence via put/get windows

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Ohmacht, Martin

    2011-01-11

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

  12. Managing coherence via put/get windows

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Ohmacht, Martin

    2012-02-21

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

  13. Storage resource manager

    SciTech Connect (OSTI)

    Perelmutov, T.; Bakken, J.; Petravick, D.; /Fermilab

    2004-12-01

    Storage Resource Managers (SRMs) are middleware components whose function is to provide dynamic space allocation and file management on shared storage components on the Grid[1,2]. SRMs support protocol negotiation and reliable replication mechanism. The SRM standard supports independent SRM implementations, allowing for a uniform access to heterogeneous storage elements. SRMs allow site-specific policies at each location. Resource Reservations made through SRMs have limited lifetimes and allow for automatic collection of unused resources thus preventing clogging of storage systems with ''orphan'' files. At Fermilab, data handling systems use the SRM management interface to the dCache Distributed Disk Cache [5,6] and the Enstore Tape Storage System [15] as key components to satisfy current and future user requests [4]. The SAM project offers the SRM interface for its internal caches as well.

  14. Scaling up logic-based truth maintenance systems via fact garbage collection

    SciTech Connect (OSTI)

    Everett, J.O.; Forbus, K.D.

    1996-12-31

    Truth maintenance systems provide caches of beliefs and inferences that support explanations and search. Traditionally, the cost of using a TMS is monotonic growth in the size of this cache. In some applications this cost is too high; for example, intelligent learning environments may require students to explore many alternatives, which leads to unacceptable performance. This paper describes an algorithm for fact garbage collection that retains the explanation-generating capabilities of a TMS while eliminating the increased storage overhead. We describe the application context that motivated this work and the properties of applications that benefit from this technique. We present the algorithm, showing how to balance the tradeoff between maintaining a useful cache and reclaiming storage, and analyze its complexity. We demonstrate that this algorithm can eliminate monotonic storage growth, thus making it more practical to field large-scale TMS-based systems.

  15. Compute Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compute Nodes Compute Nodes Quad CoreAMDOpteronprocessor Compute Node Configuration 9,572 nodes 1 quad-core AMD 'Budapest' 2.3 GHz processor per node 4 cores per node (38,288 total cores) 8 GB DDR3 800 MHz memory per node Peak Gflop rate 9.2 Gflops/core 36.8 Gflops/node 352 Tflops for the entire machine Each core has their own L1 and L2 caches, with 64 KB and 512KB respectively 2 MB L3 cache shared among the 4 cores Compute Node Software By default the compute nodes run a restricted low-overhead

  16. Heidi Poxon Cobalt Batch System on Theta

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for Running and Tuning Programs on Cray XC Systems with KNL Heidi Poxon Cobalt Batch System on Theta 2 EXAMPLE: qsub -n 2 -t 15 --mode script -A Theta_ESP -q cache-quad --env OMP_NUM_THREADS=16 \ ./runScript qsub -n <number of nodes> -t <wallclock time> --mode script -A <project(allocation)> \ -q <queue> --env <var1=value1:var2=value2....> myScriptFile #!/bin/bash -evx # Command line options will override the three settings below: #COBALT -t 5 #COBALT -q cache-quad

  17. DOPPLER WEATHER SYSTEM

    Energy Science and Technology Software Center (OSTI)

    2002-08-05

    The SRS Doppler Weather System consists of a Doppler Server, A Master Server (also known as the Weather Server), several Doppler Slave Servers, and client-side software program called the Doppler Radar Client. This system is used to display near rel-time images taken from the SRS Weather Center's Doppler Radar computer. The Doppler Server is software that resides on the SRS Doppler Computer. It gathers raw data, 24-bit color weather images via screen scraping ever fivemore » minutes as requested by the Master Server. The Doppler Server then reduces the 24-bit color images to 8-bit color using a fixed color table for analysis and compression. This preserves the fidelity of the image color and arranges the colors in specific order for display. At the time of color reduction, the white color used for the city names on the background images are remapped to a different index (color) of white that the white on the weather scale. The Weather Server places a time stamp on the image, then compresses the image and passes it to all Doppler Slave servers. Each of the Doppler Slave servers mainitain a circular buffer of the eight most current images representing the last 40 minutes of weather data. As a new image is added, the oldest drops off. The Doppler Radar Client is an optional install program for any site-wide workstation. When a Client session is started, the Client requests Doppler Slave server assignment from the Master Server. Upon its initial request to the Slave Server, the Client obtains all eight current images and maintains its own circular buffer, updating its images every five minutes as the Doppler Slave is updated. Three background reference images are stored as part of the Client. The Client brings up the appropriate background image, decompresses the doppler data, and displays the doppler data on the background image.« less

  18. U-078: Microsoft Security Bulletin Advance Notification for January 2012 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 78: Microsoft Security Bulletin Advance Notification for January 2012 U-078: Microsoft Security Bulletin Advance Notification for January 2012 January 10, 2012 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for January 2012. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for January 2012. Microsoft has posted 1 Critical

  19. Detailed Drawings of NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File System Drawing Detailed Drawings of NERSC File Systems Cori Global Scratch cori scratch Global Project project Abbreviations CMP Chip Multicore Processor OSS Object Storage Server: a component of a Lustre File System OST Object Storage Target: a component of a Lustre File System LNET Lustre Network router MDS Metadata Server, manage file operation, e.g., create new file, write to shared file DVS Data Virtualization Server, Running a service to mount external storage to Cray systems HPSS

  20. ARM - Facility News Article

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    November 15, 2005 [Facility News] More Server Power Improves Performance at the ARM Data Management Facility Bookmark and Share Recently, several new Sun servers joined the production system at the ARM Data Management Facility (DMF). These servers provide much needed cpu-the Central Processing Unit is the computing part of the computer known as the processor-power to handle the ever-increasing processing load. The DMF is responsible for collecting and processing hourly data from all three ARM

  1. Wireless Sensor Networks for Data Centers | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Products & Technologies » Technology Deployment » Wireless Sensor Networks for Data Centers Wireless Sensor Networks for Data Centers Hot Aisle Containment System Hot Aisle Containment System Hot aisle containment system in the data center at the National Renewable Energy Laboratory's Research Support Facility. Server Rack Configuration Server Rack Configuration Server rack configuration in the data center at the National Renewable Energy Laboratory's Research Support Facility. Data

  2. Coding Archives - Nercenergy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Coding What Certificates Should My Microsoft Exchange Server Have? Much like any other network application, in order to secure the functionality and safety of Microsoft Exchange Servers, it's essential to adopt specific certificates. Due to the literally thousands, if not millions, of security threats bombarding your Exchange Server every day, these certificates ensure users have a safe messaging experience while simultaneously safeguarding your data and sensitive information from being

  3. T-611: Cisco IOS OCSP Revoked Certificate Security Issue

    Broader source: Energy.gov [DOE]

    The PKI functionality in Cisco IOS 15.0 and 15.1 does not prevent permanent caching of certain public keys, which allows remote attackers to bypass authentication and have unspecified other impact by leveraging an IKE peer relationship in which a key was previously valid but later revoked, aka Bug ID CSCth82164, a different vulnerability than CVE-2010-4685.

  4. The KSR1: Experimentation and modeling of poststore

    SciTech Connect (OSTI)

    Rosti, E.; Smirni, E.; Wagner, T.D.; Apon, A.W.; Dowdy, L.W.

    1993-02-01

    Kendall Square Research introduced the KSR1 system in 1991. The architecture is based on a ring of rings of 64-bit microprocessors. It is a distributed, shared memory system and is scalable. The memory structure is unique and is the key to understanding the system. Different levels of caching eliminates physical memory addressing and leads to the ALLCACHE{trademark} scheme. Since requested data may be found in any of several caches, the initial access time is variable. Once pulled into the local (sub)cache, subsequent access times are fixed and minimal. Thus, the KSR1 is a Cache-Only Memory Architecture (COMA) system.This paper describes experimentation and an analytic model of the KSR1. The focus is on the poststore programmer option. With the poststore option, the programmer can elect to broadcast the updated value of a variable to all processors that might have a copy. This may save time for threads on other processors, but delays the broadcasting thread and places additional traffic on the ring. The specific issue addressed is to determine under what conditions poststore is beneficial. The analytic model and the experimental observations are in good agreement. They indicate that the decision to use poststore depends both on the application and the current system load.

  5. The KSR1: Experimentation and modeling of poststore

    SciTech Connect (OSTI)

    Rosti, E. . Dipt. di Scienze dell'Informazione); Smirni, E.; Wagner, T.D.; Apon, A.W.; Dowdy, L.W. . Dept. of Computer Science)

    1993-02-01

    Kendall Square Research introduced the KSR1 system in 1991. The architecture is based on a ring of rings of 64-bit microprocessors. It is a distributed, shared memory system and is scalable. The memory structure is unique and is the key to understanding the system. Different levels of caching eliminates physical memory addressing and leads to the ALLCACHE[trademark] scheme. Since requested data may be found in any of several caches, the initial access time is variable. Once pulled into the local (sub)cache, subsequent access times are fixed and minimal. Thus, the KSR1 is a Cache-Only Memory Architecture (COMA) system.This paper describes experimentation and an analytic model of the KSR1. The focus is on the poststore programmer option. With the poststore option, the programmer can elect to broadcast the updated value of a variable to all processors that might have a copy. This may save time for threads on other processors, but delays the broadcasting thread and places additional traffic on the ring. The specific issue addressed is to determine under what conditions poststore is beneficial. The analytic model and the experimental observations are in good agreement. They indicate that the decision to use poststore depends both on the application and the current system load.

  6. Efficient Data Management for Knowledge Discovery in Large-Scale Geospatial Imagery Collections

    SciTech Connect (OSTI)

    Baldwin, C; Abdulla, G

    2006-01-24

    We describe the results of our investigation on supporting ad-hoc and continuous queries over data streams. The major problem we address here is how to identify and utilize metadata for smart caching and to support queries over streaming and archived or historical data.

  7. U-179: IBM Java 7 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  8. Stride Version 1.0

    Energy Science and Technology Software Center (OSTI)

    1994-01-01

    STRIDE is a suite of benchmarks, 8 in total, which access a computers low level caches and memory in a variety of patterns. The resulting performance of the kernels provides significant insight into the performance that a real application may incur and dictate how certain algorithmic choices should be made.

  9. Search for: All records | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    and information science (5) information systems ... The ongoing development includes new features, addressing ... applicable to virtually any kind of database server seeking ...

  10. Excessing of Computers Used for Unclassified Controlled Information...

    Broader source: Energy.gov (indexed) [DOE]

    of approxiinately 800 infomations ystems, including up to 11 5,000 personal computers, many powerful supercomputers, numerous servers, and a broad array of related...