Skip to main content
3D printed “Frankenstein design” collimator show the “scars” where the individual parts are joined

Scientists at ORNL have developed 3D-printed collimator techniques that can be used to custom design collimators that better filter out noise during different types of neutron scattering experiments

Researchers used Frontier, the world’s first exascale supercomputer, to simulate a magnesium system of nearly 75,000 atoms and the National Energy Research Computing Center’s Perlmutter supercomputer to simulate a quasicrystal structure, above, in a ytterbium-cadmium alloy. Credit: Vikram Gavini

Researchers used the world’s first exascale supercomputer to run one of the largest simulations of an alloy ever and achieve near-quantum accuracy.

Sam Hollifield displays a prototype of the Secure Hijack, Intrusion and Exploit Layered Detector, or SHIELD, the device monitoring the cybersecurity of the semi-truck. Credit: Lena Shoemaker/ORNL, U.S. Dept. of Energy

As vehicles gain technological capabilities, car manufacturers are using an increasing number of computers and sensors to improve situational awareness and enhance the driving experience.

The OpeN-AM experimental platform, installed at the VULCAN instrument at ORNL’s Spallation Neutron Source, features a robotic arm that prints layers of molten metal to create complex shapes. This allows scientists to study 3D printed welds microscopically. Credit: Jill Hemman, ORNL/U.S. Dept. of Energy

Using neutrons to see the additive manufacturing process at the atomic level, scientists have shown that they can measure strain in a material as it evolves and track how atoms move in response to stress.

The image conceptualizes the processing, structure and mechanical behavior of glassy ion conductors for solid state lithium batteries. Credit: Adam Malin/ORNL, U.S. Dept. of Energy

As current courses through a battery, its materials erode over time. Mechanical influences such as stress and strain affect this trajectory, although their impacts on battery efficacy and longevity are not fully understood.

The Department of Energy’s Oak Ridge National Laboratory announced the establishment of its Center for AI Security Research, or CAISER, to address threats already present as governments and industries around the world adopt artificial intelligence and take advantage of the benefits it promises in data processing, operational efficiencies and decision-making. Credit: Rachel Green/ORNL, U.S. Dept. of Energy

The Department of Energy’s Oak Ridge National Laboratory announced the establishment of the Center for AI Security Research, or CAISER, to address threats already present as governments and industries around the world adopt artificial intelligence and take advantage of the benefits it promises in data processing, operational efficiencies and decision-making.

Director of ORNL’s AI Initiative Prasanna Balaprakash addresses attendees at the Generative AI for ORNL Science Workshop. Credit: ORNL, U.S. Dept. of Energy

The Department of Energy’s Oak Ridge National Laboratory hosted its Smoky Mountains Computational Science and Engineering Conference for the first time in person since the COVID pandemic broke in 2020. The conference, which celebrated its 20th consecutive year, took place at the Crowne Plaza Hotel in downtown Knoxville, Tenn., in late August.

Tom Karnowski (left) and Jordan Johnson (right). Credit: Carlos Jones/ORNL, U.S. Dept. of Energy

Tom Karnowski and Jordan Johnson of ORNL have been named chair and vice chair, respectively, of the East Tennessee section of the Institute of Electrical and Electronics Engineers, or IEEE.

Mike Huettel

Mike Huettel is a cyber technical professional. He also recently completed the 6-month Cyber Warfare Technician course for the United States Army, where he learned technical and tactical proficiency leadership in operations throughout the cyber domain.

Tristen Mullins. Credit: Carlos Jones/ORNL, U.S. Dept. of Energy

Tristen Mullins enjoys the hidden side of computers. As a signals processing engineer for ORNL, she tries to uncover information hidden in components used on the nation’s power grid — information that may be susceptible to cyberattacks.