Filter News
Area of Research
- (-) Supercomputing (102)
- Advanced Manufacturing (3)
- Biological Systems (1)
- Biology and Environment (94)
- Biology and Soft Matter (1)
- Clean Energy (65)
- Climate and Environmental Systems (2)
- Computational Biology (1)
- Computational Engineering (1)
- Computer Science (6)
- Fusion and Fission (8)
- Isotope Development and Production (1)
- Isotopes (7)
- Materials (89)
- Materials Characterization (1)
- Materials for Computing (11)
- Materials Under Extremes (1)
- National Security (29)
- Neutron Science (39)
- Nuclear Science and Technology (6)
- Quantum information Science (4)
- Sensors and Controls (1)
News Type
News Topics
- (-) Artificial Intelligence (33)
- (-) Biomedical (12)
- (-) Computer Science (76)
- (-) Environment (16)
- (-) Materials Science (14)
- (-) Microscopy (7)
- (-) Security (5)
- 3-D Printing/Advanced Manufacturing (5)
- Big Data (14)
- Bioenergy (9)
- Biology (10)
- Biotechnology (2)
- Buildings (3)
- Chemical Sciences (4)
- Climate Change (15)
- Coronavirus (12)
- Cybersecurity (8)
- Decarbonization (4)
- Energy Storage (6)
- Exascale Computing (19)
- Frontier (25)
- Grid (4)
- High-Performance Computing (31)
- Isotopes (1)
- Machine Learning (12)
- Materials (12)
- Mathematics (1)
- Molten Salt (1)
- Nanotechnology (10)
- National Security (8)
- Net Zero (1)
- Neutron Science (13)
- Nuclear Energy (3)
- Partnerships (1)
- Physics (7)
- Quantum Computing (15)
- Quantum Science (20)
- Simulation (11)
- Software (1)
- Space Exploration (2)
- Summit (35)
- Sustainable Energy (8)
- Transportation (5)
Media Contacts
The field of “Big Data” has exploded in the blink of an eye, growing exponentially into almost every branch of science in just a few decades. Sectors such as energy, manufacturing, healthcare and many others depend on scalable data processing and analysis for continued in...
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.