Filter News
Area of Research
- (-) National Security (17)
- (-) Supercomputing (50)
- Advanced Manufacturing (3)
- Biology and Environment (42)
- Clean Energy (51)
- Climate and Environmental Systems (4)
- Computational Biology (1)
- Computational Engineering (2)
- Computer Science (4)
- Fuel Cycle Science and Technology (1)
- Fusion and Fission (12)
- Fusion Energy (7)
- Isotope Development and Production (1)
- Isotopes (9)
- Materials (76)
- Materials for Computing (10)
- Mathematics (1)
- Neutron Science (66)
- Nuclear Science and Technology (20)
- Nuclear Systems Modeling, Simulation and Validation (1)
- Quantum information Science (4)
News Type
News Topics
- (-) Chemical Sciences (4)
- (-) Cybersecurity (14)
- (-) Environment (8)
- (-) Isotopes (1)
- (-) Neutron Science (8)
- (-) Nuclear Energy (4)
- (-) Physics (5)
- (-) Quantum Science (13)
- (-) Summit (20)
- 3-D Printing/Advanced Manufacturing (4)
- Advanced Reactors (2)
- Artificial Intelligence (18)
- Big Data (6)
- Bioenergy (7)
- Biology (6)
- Biomedical (9)
- Biotechnology (1)
- Buildings (1)
- Climate Change (5)
- Computer Science (52)
- Coronavirus (8)
- Critical Materials (3)
- Decarbonization (1)
- Energy Storage (7)
- Exascale Computing (8)
- Frontier (13)
- Fusion (2)
- Grid (6)
- High-Performance Computing (14)
- Machine Learning (9)
- Materials (9)
- Materials Science (7)
- Microscopy (5)
- Molten Salt (1)
- Nanotechnology (6)
- National Security (11)
- Partnerships (4)
- Polymers (2)
- Quantum Computing (9)
- Security (8)
- Simulation (2)
- Space Exploration (2)
- Sustainable Energy (8)
- Transportation (5)
Media Contacts
Scientists at the Department of Energy’s Oak Ridge National Laboratory are the first to successfully simulate an atomic nucleus using a quantum computer. The results, published in Physical Review Letters, demonstrate the ability of quantum systems to compute nuclear ph...
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.