Skip to main content
After a monolayer MXene is heated, functional groups are removed from both surfaces. Titanium and carbon atoms migrate from one area to both surfaces, creating a pore and forming new structures. Credit: ORNL, USDOE; image by Xiahan Sang and Andy Sproles.

Scientists at the Department of Energy’s Oak Ridge National Laboratory induced a two-dimensional material to cannibalize itself for atomic “building blocks” from which stable structures formed. The findings, reported in Nature Communications, provide insights that ...

QRNG_photo_ORNL.png

Qrypt, Inc., has exclusively licensed a novel cyber security technology from the Department of Energy’s Oak Ridge National Laboratory, promising a stronger defense against cyberattacks including those posed by quantum computing.

An ORNL-led team used scanning transmission electron microscopy to observed atomic transformations on the edges of pores in a two-dimensional transition metal dichalcogenide. The controlled production of nanopores with stable atomic edge structures may en

An Oak Ridge National Laboratory–led team has learned how to engineer tiny pores embellished with distinct edge structures inside atomically-thin two-dimensional, or 2D, crystals. The 2D crystals are envisioned as stackable building blocks for ultrathin electronics and other advance...

Oak Ridge National Laboratory’s Summit supercomputer was named No. 1 on the TOP500 List, a semiannual ranking of the world’s fastest computing systems. Credit: Carlos Jones/Oak Ridge National Laboratory, U.S. Dept. of Energy.

The US Department of Energy’s Oak Ridge National Laboratory is once again officially home to the fastest supercomputer in the world, according to the TOP500 List, a semiannual ranking of the world’s fastest computing systems.

Oak Ridge National Laboratory launches Summit supercomputer.

The U.S. Department of Energy’s Oak Ridge National Laboratory today unveiled Summit as the world’s most powerful and smartest scientific supercomputer.

Radiochemical technicians David Denton and Karen Murphy use hot cell manipulators at Oak Ridge National Laboratory during the production of actinium-227.

The Department of Energy’s Oak Ridge National Laboratory is now producing actinium-227 (Ac-227) to meet projected demand for a highly effective cancer drug through a 10-year contract between the U.S. DOE Isotope Program and Bayer.

From left, Andrew Lupini and Juan Carlos Idrobo use ORNL’s new monochromated, aberration-corrected scanning transmission electron microscope, a Nion HERMES to take the temperatures of materials at the nanoscale. Image credit: Oak Ridge National Laboratory

A scientific team led by the Department of Energy’s Oak Ridge National Laboratory has found a new way to take the local temperature of a material from an area about a billionth of a meter wide, or approximately 100,000 times thinner than a human hair. This discove...

Oak Ridge National Laboratory researcher Halil Tekinalp combines silanes and polylactic acid to create supertough renewable plastic.

A novel method developed at Oak Ridge National Laboratory creates supertough renewable plastic with improved manufacturability. Working with polylactic acid, a biobased plastic often used in packaging, textiles, biomedical implants and 3D printing, the research team added tiny amo...

ORNL’s Frank Combs and Michael Starr of the U.S. Armed Forces (driver) work in ORNL’s Vehicle Security Laboratory to evaluate a prototype device that can detect network intrusions in all modern vehicles. Credit: Carlos Jones/ORNL, U.S. Dept. of Energy

A new Oak Ridge National Laboratory-developed method promises to protect connected and autonomous vehicles from possible network intrusion. Researchers built a prototype plug-in device designed to alert drivers of vehicle cyberattacks. The prototype is coded to learn regular timing...

ORNL-Lenvio_tech_license_signing_ceremony2

Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.