Katy Bradford: Cassette approach offers compelling construction solution
Filter News
Area of Research
- Advanced Manufacturing (2)
- Biology and Environment (4)
- Building Technologies (1)
- Clean Energy (14)
- Computational Engineering (2)
- Computer Science (4)
- Isotopes (1)
- Materials (6)
- Materials for Computing (2)
- Mathematics (1)
- National Security (3)
- Neutron Science (4)
- Nuclear Science and Technology (4)
- Quantum information Science (1)
- Sensors and Controls (1)
- Supercomputing (11)
News Type
News Topics
- (-) Bioenergy (7)
- (-) Biomedical (7)
- (-) Composites (8)
- (-) Computer Science (27)
- (-) Cybersecurity (7)
- (-) Molten Salt (3)
- (-) Security (5)
- 3-D Printing/Advanced Manufacturing (24)
- Advanced Reactors (2)
- Artificial Intelligence (5)
- Big Data (3)
- Biology (9)
- Biotechnology (2)
- Buildings (8)
- Chemical Sciences (5)
- Clean Water (6)
- Climate Change (8)
- Coronavirus (7)
- Critical Materials (5)
- Decarbonization (2)
- Energy Storage (15)
- Environment (21)
- Frontier (3)
- Fusion (8)
- Grid (9)
- High-Performance Computing (10)
- Isotopes (9)
- ITER (3)
- Machine Learning (1)
- Materials (27)
- Materials Science (18)
- Mathematics (1)
- Mercury (2)
- Microscopy (9)
- Nanotechnology (12)
- National Security (3)
- Net Zero (1)
- Neutron Science (18)
- Nuclear Energy (7)
- Physics (6)
- Polymers (6)
- Quantum Computing (4)
- Quantum Science (10)
- Space Exploration (4)
- Statistics (1)
- Summit (7)
- Sustainable Energy (26)
- Transportation (17)
Media Contacts
A new manufacturing method created by Oak Ridge National Laboratory and Rice University combines 3D printing with traditional casting to produce damage-tolerant components composed of multiple materials. Composite components made by pouring an aluminum alloy over a printed steel lattice showed an order of magnitude greater damage tolerance than aluminum alone.
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.