Polyphase wireless power transfer system achieves 270-kilowatt charge, s...
Filter News
Area of Research
- (-) Climate and Environmental Systems (1)
- (-) Fusion and Fission (11)
- (-) Nuclear Science and Technology (5)
- (-) Supercomputing (128)
- Advanced Manufacturing (5)
- Biology and Environment (66)
- Building Technologies (2)
- Clean Energy (143)
- Computational Biology (1)
- Computational Engineering (3)
- Computer Science (16)
- Electricity and Smart Grid (1)
- Energy Frontier Research Centers (1)
- Energy Sciences (2)
- Functional Materials for Energy (2)
- Fusion Energy (3)
- Isotopes (2)
- Materials (124)
- Materials for Computing (20)
- Mathematics (1)
- National Security (25)
- Neutron Science (38)
- Quantum information Science (8)
News Topics
- (-) Big Data (19)
- (-) Computer Science (97)
- (-) Energy Storage (11)
- (-) Frontier (29)
- (-) Nanotechnology (12)
- (-) Physics (10)
- (-) Polymers (2)
- (-) Sustainable Energy (13)
- 3-D Printing/Advanced Manufacturing (10)
- Advanced Reactors (18)
- Artificial Intelligence (36)
- Bioenergy (10)
- Biology (13)
- Biomedical (20)
- Biotechnology (2)
- Buildings (5)
- Chemical Sciences (9)
- Climate Change (19)
- Composites (1)
- Coronavirus (14)
- Critical Materials (4)
- Cybersecurity (9)
- Decarbonization (7)
- Environment (28)
- Exascale Computing (23)
- Fossil Energy (1)
- Fusion (31)
- Grid (7)
- High-Performance Computing (39)
- Isotopes (7)
- ITER (6)
- Machine Learning (14)
- Materials (16)
- Materials Science (22)
- Mathematics (1)
- Mercury (1)
- Microscopy (8)
- Molten Salt (5)
- National Security (8)
- Net Zero (2)
- Neutron Science (18)
- Nuclear Energy (64)
- Partnerships (4)
- Quantum Computing (19)
- Quantum Science (24)
- Security (5)
- Simulation (17)
- Software (1)
- Space Exploration (8)
- Summit (42)
- Transformational Challenge Reactor (3)
- Transportation (8)
Media Contacts
Virginia-based Lenvio Inc. has exclusively licensed a cyber security technology from the Department of Energy’s Oak Ridge National Laboratory that can quickly detect malicious behavior in software not previously identified as a threat.