Skip to main content
VERA’s tools allow a virtual “window” inside the reactor core, down to a molecular level.

A software package, 10 years in the making, that can predict the behavior of nuclear reactors’ cores with stunning accuracy has been licensed commercially for the first time.

Dalton Lunga

A typhoon strikes an island in the Pacific Ocean, downing power lines and cell towers. An earthquake hits a remote mountainous region, destroying structures and leaving no communication infrastructure behind.

Tyler Gerczak, a materials scientist at Oak Ridge National Laboratory, is focused on post-irradiation examination and separate effects testing of current fuels for light water reactors and advanced fuel types that could be used in future nuclear systems. Credit: Carlos Jones/Oak Ridge National Laboratory, U.S. Dept. of Energy

Ask Tyler Gerczak to find a negative in working at the Department of Energy’s Oak Ridge National Laboratory, and his only complaint is the summer weather. It is not as forgiving as the summers in Pulaski, Wisconsin, his hometown.

ORNL cybersecurity researchers Jared Smith (left) and Elliot Greenlee (right) participate in a demonstration day event to showcase how Akatosh, a new security analysis tool, quickly sorts through data to identify potential threats.

As technology continues to evolve, cybersecurity threats do as well. To better safeguard digital information, a team of researchers at the US Department of Energy’s (DOE’s) Oak Ridge National Laboratory (ORNL) has developed Akatosh, a security analysis tool that works in conjunctio...

Ryan Kerekes is leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory. Photos by Genevieve Martin, ORNL.

As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.