Energy experts at PNNL are helping 56 states and territories deliver their state energy security plans (SESPs) through a transparent and collaborative review process.
PNNL is leading the nation with research addressing urgent needs for reimagining U.S. critical infrastructure against the realities of software-speed attacks and hazards.
Pacific Northwest National Laboratory partnered with the Treasury and Amazon Web Services to develop Cache, a cloud-based tool that allows the Treasury’s disparate data to be easily searched, translated, extracted, linked, and analyzed.
The Center for AI @PNNL is driving a research agenda that explores the foundations and emerging frontiers of AI, combining capability development and application to mission areas in science, security and energy resilience.
Cyber, physical, and blended cyber-physical threats are real, ubiquitous, and expensive to deal with. Private companies, government institutions, and critical infrastructures struggle to implement viable solutions as technology evolves.
RemPlex provides a global forum committed to fostering technical leadership, collaborative research, and professional development that facilitates the cost-effective remediation of complex sites.
PNNL is helping communities with significant historical ties to fossil energy understand opportunities and pursue numerous federal resources available to support coal power plant redevelopment.
Pacific Northwest National Laboratory, supported by the Department of Energy’s Grid Deployment Office, is leading a technical assistance initiative to help utilities test and deploy alternate GPS timing solutions.
The Computational and Theoretical Chemistry Institute (CTCI) aspires to establish a premier international center for chemistry and materials science software at extreme scales.
Pacific Northwest National Laboratory is partnering with the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency to develop and operate the Control Environment Laboratory Resource
Cyber networks are constantly under attack by bugs, bots, and nefarious actors. While system owners acutely understand the need to secure their networks, they’re not always sure of the best actions to take.