Skip to main content
Ecosystem Ecologist Verity Salmon captures and analyzes field data from sites in in Alaska and Minnesota to inform earth system models that are being used to predict environmental change.

While some of her earth system modeling colleagues at ORNL face challenges such as processor allocation or debugging code, Verity Salmon prepares for mosquito swarms and the possibility of grizzly bears.

Elizabeth Herndon takes a soil sample at a field site outside Abisko, Sweden in July 2019.

Elizabeth Herndon believes in going the distance whether she is preparing to compete in the 2020 Olympic marathon trials or examining how metals move through the environment as a geochemist at the Department of Energy’s Oak Ridge National Laboratory.

In ORNL’s Low Activation Materials Development and Analysis Laboratory, Field makes use of a transmission electron microscope to examine a sample made with a focused ion beam. He investigates the defects produced in a FeCrAl alloy bombarded with neutrons in HFIR. Credit: Carlos Jones/Oak Ridge National Laboratory, U.S. Dept. of Energy

Kevin Field at the Department of Energy’s Oak Ridge National Laboratory synthesizes and scrutinizes materials for nuclear power systems that must perform safely and efficiently over decades of irradiation.

Lauren Garrison

The materials inside a fusion reactor must withstand one of the most extreme environments in science, with temperatures in the thousands of degrees Celsius and a constant bombardment of neutron radiation and deuterium and tritium, isotopes of hydrogen, from the volatile plasma at th...

Ryan Kerekes is leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory. Photos by Genevieve Martin, ORNL.

As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.