Filter News
Area of Research
News Topics
- (-) Advanced Reactors (7)
- (-) Big Data (9)
- (-) Cybersecurity (7)
- (-) Grid (5)
- (-) Machine Learning (5)
- (-) Physics (8)
- (-) Quantum Science (10)
- 3-D Printing/Advanced Manufacturing (16)
- Artificial Intelligence (13)
- Bioenergy (11)
- Biology (1)
- Biomedical (5)
- Biotechnology (1)
- Clean Water (5)
- Composites (3)
- Computer Science (41)
- Energy Storage (9)
- Environment (23)
- Exascale Computing (3)
- Frontier (2)
- Fusion (6)
- Isotopes (1)
- Materials Science (22)
- Mercury (2)
- Microscopy (6)
- Molten Salt (1)
- Nanotechnology (6)
- Neutron Science (20)
- Nuclear Energy (17)
- Polymers (2)
- Security (2)
- Space Exploration (4)
- Summit (9)
- Sustainable Energy (8)
- Transportation (14)
Media Contacts
![COHERENT collaborators were the first to observe coherent elastic neutrino–nucleus scattering. Their results, published in the journal Science, confirm a prediction of the Standard Model and establish constraints on alternative theoretical models. Image c COHERENT collaborators were the first to observe coherent elastic neutrino–nucleus scattering. Their results, published in the journal Science, confirm a prediction of the Standard Model and establish constraints on alternative theoretical models. Image c](/sites/default/files/styles/list_page_thumbnail/public/SLIDESHOW%202_collaboration.jpg?itok=icKSVyYi)
After more than a year of operation at the Department of Energy’s (DOE’s) Oak Ridge National Laboratory (ORNL), the COHERENT experiment, using the world’s smallest neutrino detector, has found a big fingerprint of the elusive, electrically neutral particles that interact only weakly with matter.
![ORNL-Lenvio_tech_license_signing_ceremony2 ORNL-Lenvio_tech_license_signing_ceremony2](/sites/default/files/styles/list_page_thumbnail/public/ORNL-Lenvio_tech_license_signing_ceremony2.jpg?itok=xcfN-PbJ)
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.