![White car (Porsche Taycan) with the hood popped is inside the building with an american flag on the wall.](/sites/default/files/styles/featured_square_large/public/2024-06/2024-P09317.jpg?h=8f9cfe54&itok=m6sQhZRq)
Filter News
Area of Research
- (-) Clean Energy (9)
- (-) Materials (8)
- (-) Supercomputing (10)
- Biology and Environment (2)
- Computational Engineering (1)
- Computer Science (1)
- Fusion and Fission (1)
- Isotopes (1)
- Materials for Computing (1)
- National Security (1)
- Neutron Science (3)
- Nuclear Science and Technology (2)
- Sensors and Controls (1)
News Topics
- (-) Artificial Intelligence (2)
- (-) Biomedical (1)
- (-) Composites (3)
- (-) Computer Science (11)
- (-) Machine Learning (1)
- (-) Microscopy (5)
- (-) Security (1)
- (-) Sustainable Energy (5)
- 3-D Printing/Advanced Manufacturing (9)
- Big Data (1)
- Bioenergy (3)
- Biology (2)
- Buildings (3)
- Chemical Sciences (1)
- Climate Change (1)
- Coronavirus (1)
- Critical Materials (2)
- Cybersecurity (3)
- Decarbonization (1)
- Energy Storage (9)
- Environment (3)
- Frontier (3)
- Fusion (1)
- Grid (2)
- High-Performance Computing (3)
- Isotopes (2)
- ITER (1)
- Materials (7)
- Materials Science (5)
- Mercury (1)
- Nanotechnology (7)
- National Security (1)
- Neutron Science (5)
- Physics (4)
- Polymers (2)
- Quantum Computing (3)
- Quantum Science (4)
- Summit (5)
- Transportation (4)
Media Contacts
![Graphical representation of a deuteron, the bound state of a proton (red) and a neutron (blue). Credit: Andy Sproles/Oak Ridge National Laboratory, U.S. Dept. of Energy. Graphical representation of a deuteron, the bound state of a proton (red) and a neutron (blue). Credit: Andy Sproles/Oak Ridge National Laboratory, U.S. Dept. of Energy.](/sites/default/files/styles/list_page_thumbnail/public/news/images/deuteron%5B4%5D.jpg?itok=hEV9C82i)
Scientists at the Department of Energy’s Oak Ridge National Laboratory are the first to successfully simulate an atomic nucleus using a quantum computer. The results, published in Physical Review Letters, demonstrate the ability of quantum systems to compute nuclear ph...
![From left, Andrew Lupini and Juan Carlos Idrobo use ORNL’s new monochromated, aberration-corrected scanning transmission electron microscope, a Nion HERMES to take the temperatures of materials at the nanoscale. Image credit: Oak Ridge National Laboratory From left, Andrew Lupini and Juan Carlos Idrobo use ORNL’s new monochromated, aberration-corrected scanning transmission electron microscope, a Nion HERMES to take the temperatures of materials at the nanoscale. Image credit: Oak Ridge National Laboratory](/sites/default/files/styles/list_page_thumbnail/public/news/images/2018-P00413.jpg?itok=UKejk7r2)
A scientific team led by the Department of Energy’s Oak Ridge National Laboratory has found a new way to take the local temperature of a material from an area about a billionth of a meter wide, or approximately 100,000 times thinner than a human hair. This discove...
![ORNL’s Steven Young (left) and Travis Johnston used Titan to prove the design and training of deep learning networks could be greatly accelerated with a capable computing system. ORNL’s Steven Young (left) and Travis Johnston used Titan to prove the design and training of deep learning networks could be greatly accelerated with a capable computing system.](/sites/default/files/styles/list_page_thumbnail/public/news/images/RAvENNA%20release%20pic.png?itok=2bDpK5Mo)
A team of researchers from the Department of Energy’s Oak Ridge National Laboratory has married artificial intelligence and high-performance computing to achieve a peak speed of 20 petaflops in the generation and training of deep learning networks on the
![ORNL-Lenvio_tech_license_signing_ceremony2 ORNL-Lenvio_tech_license_signing_ceremony2](/sites/default/files/styles/list_page_thumbnail/public/ORNL-Lenvio_tech_license_signing_ceremony2.jpg?itok=xcfN-PbJ)
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.