Skip to main content

LLNL’s Computing & Communications portfolio is a gateway for accessing LLNL’s wide variety of solutions and intellectual property for use in information technologies, communications, quantum sciences, data sciences and applied software/modeling & simulations. LLNL’s long history and strong capabilities in computing underpin our success in research, in developing new solutions for our missions, and in our collaborations with the academic and private sectors. We license solutions via diverse mechanisms suited to the use cases, ranging from open-source software licensing, to nonexclusive end user licenses, to custom proprietary licenses for distributors, startups, and other commercialization licensees. We also collaborate with industry partners interested in applying LLNL’s unique capabilities and computing solutions to their company’s challenges.

Portfolio News and Multimedia

Image
An Open-Source, Data-Science Toolkit for Energy Grids

Lawrence Livermore National Laboratory has developed GridDS — an open-source, data-science toolkit for power and data engineers that will provide an integrated energy data storage and augmentation infrastructure, as well as a flexible and comprehensive set of state-of-the-art machine-learning models.

One ID

With business applications moving to the cloud from traditional corporate networks, a crucial part of any organization’s cybersecurity is managing the users who can access their computers, networks, software applications and data. LLNL’s One ID technology is a cost-effective way to more easily manage a large organization’s enterprise security.

Livermore Tomography Tools: Accurate, Fast, and Flexible Software Solution for Data Processing and Reconstruction by Kyle Champley

Join us to hear about the latest in CT image reconstruction and data processing. Medical imaging, industrial manufacturing inspection and airport luggage security rely on CT. LLNL researchers have developed an innovative software product that betters the competition in imaging fidelity.

IT and Communications Technologies

Image
cyber

CSP-POST provides the capability to inspect all incoming and outgoing emails while providing after-the-fact forensic capabilities. Using commercially available lightweight and serverless technologies, CSP-POST easily collects all email and parses it into easily searchable metadata, enriched and ready for analysis. The web-based application is deployed in a repeatable, testable, and auditable…

Image
A system to cryptographically distinguish between human-generated text vs. AI-generated text

LLNL has invented a new system that uses public key cryptography to differentiate between human-generated text and AI-generated text. This invention can be used to validate that text is likely to be human generated for the purposes of sorting or gatekeeping on the internet, can detect cheating on essay assignments, and can be used as an automatic captcha that does away with the hassle of…

Image
Encrypting computer clusters

LLNL has developed a new method for securely processing protected data on HPC systems with minimal impact on the existing HPC operations and execution environment. It can be used with no alterations to traditional HPC operations and can be managed locally. It is fully compatible with traditional (unencrypted) processing and can run other jobs, unencrypted or not, on the cluster simultaneously…

Image
Cell phone 2

LLNL's NeMS system enables network mapping operations by using two LLNL-developed software systems: LLNL's NeMS tool and the Everest visualization system. Each software system can be also used separately for their specific applications. When the two systems are used together as an iterative analysis platform, LLNL's NeMS system provides network security managers and information technology…