Skip to main content
Steve Nolan, left, who manages many ORNL facilities for United Cleanup Oak Ridge, and Carl Dukes worked closely together to accommodate bringing members of the public into the Oak Ridge Reservation to collect distant images from overhead for the BRIAR biometric recognition project. Credit: Carlos Jones/ORNL, U.S. Dept. of Energy

Carl Dukes’ career as an adept communicator got off to a slow start: He was about 5 years old when he spoke for the first time. “I’ve been making up for lost time ever since,” joked Dukes, a technical professional at the Department of Energy’s Oak Ridge National Laboratory.

Yue Yuan, Weinberg Distinguished Staff Fellow at ORNL, is researching ways to create new materials to help the environment. Credit: Genevieve Martin/ORNL, U.S. Dept. of Energy

Growing up in China, Yue Yuan stood beneath the world’s largest hydroelectric dam, built to harness the world’s third-longest river. Her father brought her to Three Gorges Dam every year as it was being constructed across the Yangtze River so she could witness its progress.

Sergei Kalinin, director of the Institute for Functional Imaging of Materials at Oak Ridge National Laboratory, convenes experts in microscopy and computing to gain scientific insights that will inform design of advanced materials for energy and informati

Sergei Kalinin of the Department of Energy’s Oak Ridge National Laboratory knows that seeing something is not the same as understanding it. As director of ORNL’s Institute for Functional Imaging of Materials, he convenes experts in microscopy and computing to gain scientific insigh...

Ryan Kerekes is leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory. Photos by Genevieve Martin, ORNL.

As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.