Skip to main content
Joseph Lukens, Raphael Pooser, and Nick Peters (from left) of ORNL’s Quantum Information Science Group developed and tested a new interferometer made from highly nonlinear fiber in pursuit of improved sensitivity at the quantum scale. Credit: Carlos Jones

By analyzing a pattern formed by the intersection of two beams of light, researchers can capture elusive details regarding the behavior of mysterious phenomena such as gravitational waves. Creating and precisely measuring these interference patterns would not be possible without instruments called interferometers.

Reaching rare earths_v2.png

Scientists from the Critical Materials Institute used the Titan supercomputer and Eos computing cluster at ORNL to analyze designer molecules that could increase the yield of rare earth elements found in bastnaesite, an important mineral 

Graphical representation of a deuteron, the bound state of a proton (red) and a neutron (blue). Credit: Andy Sproles/Oak Ridge National Laboratory, U.S. Dept. of Energy.

Scientists at the Department of Energy’s Oak Ridge National Laboratory are the first to successfully simulate an atomic nucleus using a quantum computer. The results, published in Physical Review Letters, demonstrate the ability of quantum systems to compute nuclear ph...

Materials—Polymer-theory-problem

Scientists at Oak Ridge National Laboratory have conducted a series of breakthrough experimental and computational studies that cast doubt on a 40-year-old theory describing how polymers in plastic materials behave during processing.

Arjun Shankar

The field of “Big Data” has exploded in the blink of an eye, growing exponentially into almost every branch of science in just a few decades. Sectors such as energy, manufacturing, healthcare and many others depend on scalable data processing and analysis for continued in...

ORNL-Lenvio_tech_license_signing_ceremony2

Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.