Polyphase wireless power transfer system achieves 270-kilowatt charge, s...
Filter News
Area of Research
- Advanced Manufacturing (3)
- Biology and Environment (2)
- Clean Energy (15)
- Computer Science (2)
- Fusion and Fission (1)
- Fusion Energy (8)
- Materials (15)
- Materials for Computing (2)
- National Security (5)
- Neutron Science (7)
- Nuclear Science and Technology (5)
- Nuclear Systems Modeling, Simulation and Validation (1)
- Quantum information Science (3)
- Supercomputing (22)
News Type
News Topics
- (-) Advanced Reactors (15)
- (-) Composites (4)
- (-) Cybersecurity (8)
- (-) Grid (8)
- (-) Polymers (7)
- (-) Quantum Science (14)
- (-) Summit (15)
- 3-D Printing/Advanced Manufacturing (25)
- Artificial Intelligence (12)
- Big Data (8)
- Bioenergy (12)
- Biology (3)
- Biomedical (14)
- Biotechnology (1)
- Buildings (1)
- Chemical Sciences (3)
- Clean Water (3)
- Climate Change (9)
- Computer Science (44)
- Coronavirus (12)
- Critical Materials (2)
- Decarbonization (1)
- Energy Storage (19)
- Environment (28)
- Exascale Computing (2)
- Frontier (3)
- Fusion (9)
- High-Performance Computing (2)
- Isotopes (6)
- Machine Learning (10)
- Materials (2)
- Materials Science (41)
- Mercury (1)
- Microscopy (8)
- Molten Salt (3)
- Nanotechnology (17)
- National Security (2)
- Neutron Science (35)
- Nuclear Energy (23)
- Physics (10)
- Security (3)
- Space Exploration (4)
- Sustainable Energy (26)
- Transformational Challenge Reactor (2)
- Transportation (20)
Media Contacts
A new manufacturing method created by Oak Ridge National Laboratory and Rice University combines 3D printing with traditional casting to produce damage-tolerant components composed of multiple materials. Composite components made by pouring an aluminum alloy over a printed steel lattice showed an order of magnitude greater damage tolerance than aluminum alone.
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.