![White car (Porsche Taycan) with the hood popped is inside the building with an american flag on the wall.](/sites/default/files/styles/featured_square_large/public/2024-06/2024-P09317.jpg?h=8f9cfe54&itok=m6sQhZRq)
Filter News
Area of Research
- (-) Supercomputing (104)
- Advanced Manufacturing (2)
- Biology and Environment (115)
- Biology and Soft Matter (1)
- Clean Energy (148)
- Climate and Environmental Systems (6)
- Computational Biology (1)
- Computational Engineering (1)
- Computer Science (6)
- Electricity and Smart Grid (1)
- Energy Sciences (1)
- Functional Materials for Energy (2)
- Fusion and Fission (11)
- Fusion Energy (1)
- Isotope Development and Production (1)
- Isotopes (27)
- Materials (93)
- Materials for Computing (17)
- Mathematics (1)
- National Security (32)
- Neutron Science (36)
- Nuclear Science and Technology (11)
- Quantum information Science (9)
News Topics
- (-) Chemical Sciences (5)
- (-) Climate Change (17)
- (-) Coronavirus (14)
- (-) Cybersecurity (8)
- (-) Energy Storage (8)
- (-) Environment (21)
- (-) Frontier (28)
- (-) Isotopes (1)
- (-) Quantum Science (24)
- (-) Space Exploration (3)
- 3-D Printing/Advanced Manufacturing (5)
- Advanced Reactors (1)
- Artificial Intelligence (36)
- Big Data (19)
- Bioenergy (9)
- Biology (11)
- Biomedical (17)
- Biotechnology (2)
- Buildings (4)
- Computer Science (95)
- Critical Materials (3)
- Decarbonization (5)
- Exascale Computing (22)
- Fusion (1)
- Grid (5)
- High-Performance Computing (38)
- Machine Learning (14)
- Materials (15)
- Materials Science (16)
- Mathematics (1)
- Microscopy (7)
- Molten Salt (1)
- Nanotechnology (11)
- National Security (8)
- Net Zero (1)
- Neutron Science (13)
- Nuclear Energy (4)
- Partnerships (1)
- Physics (7)
- Polymers (2)
- Quantum Computing (19)
- Security (5)
- Simulation (14)
- Software (1)
- Summit (42)
- Sustainable Energy (10)
- Transportation (6)
Media Contacts
![Joseph Lukens, Raphael Pooser, and Nick Peters (from left) of ORNL’s Quantum Information Science Group developed and tested a new interferometer made from highly nonlinear fiber in pursuit of improved sensitivity at the quantum scale. Credit: Carlos Jones](/sites/default/files/styles/list_page_thumbnail/public/news/images/2018-P09674%5B4%5D.jpg?h=1d98ccbd&itok=ztuyXqpm)
By analyzing a pattern formed by the intersection of two beams of light, researchers can capture elusive details regarding the behavior of mysterious phenomena such as gravitational waves. Creating and precisely measuring these interference patterns would not be possible without instruments called interferometers.
![Graphical representation of a deuteron, the bound state of a proton (red) and a neutron (blue). Credit: Andy Sproles/Oak Ridge National Laboratory, U.S. Dept. of Energy. Graphical representation of a deuteron, the bound state of a proton (red) and a neutron (blue). Credit: Andy Sproles/Oak Ridge National Laboratory, U.S. Dept. of Energy.](/sites/default/files/styles/list_page_thumbnail/public/news/images/deuteron%5B4%5D.jpg?itok=hEV9C82i)
Scientists at the Department of Energy’s Oak Ridge National Laboratory are the first to successfully simulate an atomic nucleus using a quantum computer. The results, published in Physical Review Letters, demonstrate the ability of quantum systems to compute nuclear ph...
![Arjun Shankar Arjun Shankar](/sites/default/files/styles/list_page_thumbnail/public/shankar.png?itok=qqOR_eUI)
The field of “Big Data” has exploded in the blink of an eye, growing exponentially into almost every branch of science in just a few decades. Sectors such as energy, manufacturing, healthcare and many others depend on scalable data processing and analysis for continued in...
![ORNL-Lenvio_tech_license_signing_ceremony2 ORNL-Lenvio_tech_license_signing_ceremony2](/sites/default/files/styles/list_page_thumbnail/public/ORNL-Lenvio_tech_license_signing_ceremony2.jpg?itok=xcfN-PbJ)
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.