Filter News
Area of Research
- (-) Biology and Environment (56)
- (-) Clean Energy (144)
- (-) Supercomputing (115)
- Advanced Manufacturing (6)
- Building Technologies (2)
- Climate and Environmental Systems (1)
- Computational Biology (1)
- Computational Engineering (3)
- Computer Science (16)
- Electricity and Smart Grid (1)
- Energy Sciences (1)
- Functional Materials for Energy (1)
- Fusion and Fission (7)
- Fusion Energy (3)
- Isotopes (1)
- Materials (55)
- Materials for Computing (17)
- Mathematics (1)
- National Security (33)
- Neutron Science (23)
- Nuclear Science and Technology (3)
- Quantum information Science (7)
- Transportation Systems (2)
News Topics
- (-) Artificial Intelligence (44)
- (-) Computer Science (116)
- (-) Machine Learning (23)
- (-) Polymers (14)
- (-) Sustainable Energy (94)
- (-) Transportation (70)
- 3-D Printing/Advanced Manufacturing (81)
- Advanced Reactors (7)
- Big Data (30)
- Bioenergy (65)
- Biology (81)
- Biomedical (32)
- Biotechnology (17)
- Buildings (37)
- Chemical Sciences (20)
- Clean Water (19)
- Climate Change (67)
- Composites (19)
- Coronavirus (31)
- Critical Materials (12)
- Cybersecurity (15)
- Decarbonization (48)
- Energy Storage (76)
- Environment (144)
- Exascale Computing (25)
- Fossil Energy (2)
- Frontier (28)
- Fusion (3)
- Grid (43)
- High-Performance Computing (52)
- Hydropower (9)
- Isotopes (2)
- Materials (49)
- Materials Science (43)
- Mathematics (5)
- Mercury (10)
- Microelectronics (1)
- Microscopy (20)
- Molten Salt (1)
- Nanotechnology (18)
- National Security (12)
- Net Zero (6)
- Neutron Science (23)
- Nuclear Energy (11)
- Partnerships (12)
- Physics (8)
- Quantum Computing (19)
- Quantum Science (25)
- Renewable Energy (2)
- Security (9)
- Simulation (25)
- Software (1)
- Space Exploration (6)
- Statistics (1)
- Summit (47)
- Transformational Challenge Reactor (3)
Media Contacts
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.