Skip to main content
Image
Laser peening induces deep compressive stress, which significantly extends the service lifetime over any conventional treatment

This invention proposes using a pulse laser configured to generate laser pulses and a controller for controlling operation of the pulse laser. The controller is further configured to control the pulse laser to cause the pulse laser to generate at least one of the laser pulses with a spatiotemporally varying laser fluence over a duration of at least one of the laser pulses. The spatiotemporally…

Image
cyber

CSP-POST provides the capability to inspect all incoming and outgoing emails while providing after-the-fact forensic capabilities. Using commercially available lightweight and serverless technologies, CSP-POST easily collects all email and parses it into easily searchable metadata, enriched and ready for analysis. The web-based application is deployed in a repeatable, testable, and auditable…

Image
A system to cryptographically distinguish between human-generated text vs. AI-generated text

LLNL has invented a new system that uses public key cryptography to differentiate between human-generated text and AI-generated text. This invention can be used to validate that text is likely to be human generated for the purposes of sorting or gatekeeping on the internet, can detect cheating on essay assignments, and can be used as an automatic captcha that does away with the hassle of…

Image
creation of ultra-high energy density matter by an intense laser pulse
Livermore Lab researchers have developed two new methods for improving the efficiency of laser drilling. The first method is based on multi-pulse laser technology. Two synchronized free-running laser pulses from a tandem-head Nd:YAG laser and a gated CW laser are capable of drilling through 1/8-in-thick stainless-steel targets at a standoff distance of 1 m without gas-assist. The combination of a…
Image
Encrypting computer clusters

LLNL has developed a new method for securely processing protected data on HPC systems with minimal impact on the existing HPC operations and execution environment. It can be used with no alterations to traditional HPC operations and can be managed locally. It is fully compatible with traditional (unencrypted) processing and can run other jobs, unencrypted or not, on the cluster simultaneously…

Image
Laser Peening

LLNL’s system consists of one or more flashlamp-pumped Nd:glass zig-zag amplifiers, a very low threshold stimulated-Brillouin-scattering (SBS) phase conjugator system, and a free-running single frequency Nd:YLF master oscillator.

Image
nuclear reactor

The new LLNL technique works by transiently removing and trapping concrete or rock surface material, so that contaminants are confined in a manner that is easy to isolate and remove. Our studies suggest that 10 m2 of surface could be processed per hour. The technique easily scales to more surface/hr.

Image
Cell phone 2

LLNL's NeMS system enables network mapping operations by using two LLNL-developed software systems: LLNL's NeMS tool and the Everest visualization system. Each software system can be also used separately for their specific applications. When the two systems are used together as an iterative analysis platform, LLNL's NeMS system provides network security managers and information technology…