![Sphere that has the top right fourth removed (exposed) Colors from left are orange, dark blue with orange dots, light blue with horizontal lines, then black. Inside the exposure is green and black with boxes.](/sites/default/files/styles/featured_square_large/public/2024-06/slicer.jpg?h=56311bf6&itok=bCZz09pJ)
Filter News
Area of Research
News Type
News Topics
- (-) 3-D Printing/Advanced Manufacturing (11)
- (-) Cybersecurity (7)
- (-) Nuclear Energy (9)
- Advanced Reactors (3)
- Artificial Intelligence (4)
- Big Data (2)
- Bioenergy (9)
- Biology (2)
- Biomedical (3)
- Clean Water (2)
- Composites (3)
- Computer Science (20)
- Energy Storage (1)
- Environment (11)
- Exascale Computing (1)
- Frontier (2)
- Fusion (4)
- Grid (2)
- Isotopes (3)
- Machine Learning (1)
- Materials Science (15)
- Mercury (2)
- Microscopy (5)
- Nanotechnology (8)
- Neutron Science (13)
- Physics (11)
- Polymers (2)
- Quantum Science (8)
- Security (7)
- Summit (5)
- Sustainable Energy (5)
- Transportation (6)
Media Contacts
![Innovation Crossroads fellows at Oak Ridge National Laboratory access world-class research facilities and entrepreneurial guidance to accelerate the transformation of novel ideas into U.S.-based companies. Innovation Crossroads fellows at Oak Ridge National Laboratory access world-class research facilities and entrepreneurial guidance to accelerate the transformation of novel ideas into U.S.-based companies.](/sites/default/files/styles/list_page_thumbnail/public/news/images/2018-P04298_0.jpg?itok=TSgDX0g_)
The next cohort of Innovation Crossroads fellows at Oak Ridge National Laboratory will receive support from the U.S. Department of Energy’s Advanced Manufacturing Office (AMO) and the Tennessee Valley Authority (TVA). Officials made the announcement today at th...
![QRNG_photo_ORNL.png QRNG_photo_ORNL.png](/sites/default/files/styles/list_page_thumbnail/public/QRNG_photo_ORNL.png?itok=-avZ0m1m)
Qrypt, Inc., has exclusively licensed a novel cyber security technology from the Department of Energy’s Oak Ridge National Laboratory, promising a stronger defense against cyberattacks including those posed by quantum computing.
![Ryan Kerekes is leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory. Photos by Genevieve Martin, ORNL. Ryan Kerekes is leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory. Photos by Genevieve Martin, ORNL.](/sites/default/files/styles/list_page_thumbnail/public/Ryan%20Kerekes%20Profile%20lab1_0.jpg?itok=btnfhbaJ)
As leader of the RF, Communications, and Cyber-Physical Security Group at Oak Ridge National Laboratory, Kerekes heads an accelerated lab-directed research program to build virtual models of critical infrastructure systems like the power grid that can be used to develop ways to detect and repel cyber-intrusion and to make the network resilient when disruption occurs.
![Julie Smith Julie Smith](/sites/default/files/styles/list_page_thumbnail/public/julie_smith_bb.png?itok=Z9DoY2ss)
It may take a village to raise a child, according to the old proverb, but it takes an entire team of highly trained scientists and engineers to install and operate a state-of-the-art, exceptionally complex ion microprobe. Just ask Julie Smith, a nuclear security scientist at the Depa...
![ORNL Image](/sites/default/files/styles/list_page_thumbnail/public/MattSallasCloseup.jpg?itok=iKfN8LeV)
While serving in Kandahar, Afghanistan, U.S. Navy construction mechanic Matthew Sallas may not have imagined where his experience would take him next. But researchers at Oak Ridge National Laboratory certainly had the future in mind as they were creating programs to train men and wome...
![ORNL-Lenvio_tech_license_signing_ceremony2 ORNL-Lenvio_tech_license_signing_ceremony2](/sites/default/files/styles/list_page_thumbnail/public/ORNL-Lenvio_tech_license_signing_ceremony2.jpg?itok=xcfN-PbJ)
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.