Filter News
Area of Research
- (-) Supercomputing (42)
- Advanced Manufacturing (2)
- Biological Systems (1)
- Biology and Environment (10)
- Building Technologies (1)
- Clean Energy (16)
- Climate and Environmental Systems (2)
- Computational Biology (1)
- Computational Engineering (3)
- Computer Science (12)
- Fusion and Fission (1)
- Isotopes (11)
- Materials (10)
- Materials for Computing (4)
- Mathematics (1)
- National Security (5)
- Neutron Science (14)
- Nuclear Science and Technology (3)
- Quantum information Science (5)
News Topics
- (-) Biomedical (3)
- (-) Computer Science (40)
- (-) Cybersecurity (5)
- (-) Exascale Computing (2)
- (-) Physics (2)
- (-) Space Exploration (2)
- 3-D Printing/Advanced Manufacturing (2)
- Advanced Reactors (1)
- Artificial Intelligence (9)
- Big Data (5)
- Bioenergy (2)
- Biology (1)
- Buildings (1)
- Chemical Sciences (1)
- Climate Change (3)
- Coronavirus (2)
- Energy Storage (3)
- Environment (9)
- Frontier (5)
- Grid (1)
- High-Performance Computing (10)
- Machine Learning (1)
- Materials Science (4)
- Microscopy (2)
- Nanotechnology (2)
- National Security (1)
- Neutron Science (3)
- Nuclear Energy (2)
- Quantum Computing (5)
- Quantum Science (7)
- Security (2)
- Summit (14)
- Sustainable Energy (3)
- Transportation (2)
Media Contacts
![Arjun Shankar Arjun Shankar](/sites/default/files/styles/list_page_thumbnail/public/shankar.png?itok=qqOR_eUI)
The field of “Big Data” has exploded in the blink of an eye, growing exponentially into almost every branch of science in just a few decades. Sectors such as energy, manufacturing, healthcare and many others depend on scalable data processing and analysis for continued in...
![ORNL-Lenvio_tech_license_signing_ceremony2 ORNL-Lenvio_tech_license_signing_ceremony2](/sites/default/files/styles/list_page_thumbnail/public/ORNL-Lenvio_tech_license_signing_ceremony2.jpg?itok=xcfN-PbJ)
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.