Skip to main content
Jianlin Li, leader of the Energy Storage and Conversion Manufacturing Group, directs the development of advanced manufacturing schemes and pilot-scale devices into emerging energy storage and conversion research. Credit: Carlos Jones/ORNL, U.S. Dept. of Energy

In his career focused on energy storage science, Jianlin Li has learned that discovering new ways to process and assemble batteries is just as important as the development of new materials.

Porter Bailey started and will end his 33-year career at ORNL in the same building: 7920 of the Radiochemical Engineering Development Center.

Porter Bailey started and will end his 33-year career at ORNL in the same building: 7920 of the Radiochemical Engineering Development Center.

Joe Hagerman is expanding connected neighborhood research at ORNL and envisions buildings of the future as resources capable of managing the flow and exchange of energy based on economic and market signals – a concept known as transactive energy. Credit: Carlos Jones/Oak Ridge National Laboratory, U.S. Department of Energy

Joe Hagerman, ORNL research lead for buildings integration and controls, understands the impact building technology innovations can have during times of crisis. Over a decade ago, he found himself in the middle of one of the most devastating natural disasters of the century, Hurricane Katrina.

Ilias Belharouak portrait

Ilias Belharouak is leading ORNL’s research efforts in investigating new materials for solid-state batteries, which can double the charging capacity of lithium-ion batteries, commonly used today for electronic devices such as cell phones.

Ryan Kerekes is leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory. Photos by Genevieve Martin, ORNL.

As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.