An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Dayna Blanchard, a longtime leader with nearly two decades of experience with the MEP Center, has been named as the next director of the Manufacturing Extension...
Electron or X-Ray Beam Lithography in Liquids Description These days, the fabrication of 2D and 3D structures out of liquid, biocompatible, hydrogel solutions...
Researchers at the National Institute of Standards and Technology (NIST) and collaborators have demonstrated an atom-based sensor that can determine the...
The U.S Commerce Department’s National Institute of Standards and Technology (NIST) Manufacturing Extension Partnership (MEP) has made one cooperative agreement...
Information security continuous monitoring (ISCM) programs provide an understanding of risk tolerance and help officials set priorities and consistently manage...
The National Institute of Standards and Technology (NIST) plans to award funding for cooperative agreements for curricula development that will educate students...
After the optical frequency comb made its debut as a ruler for light, spinoffs followed, including the astrocomb to measure starlight and a radar-like comb...
In recent years criminals and other attackers have compromised the networks of several major hospitality companies, exposing the information of hundreds of...
A new practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable...
To help secure our elections, NIST has released Draft NISTIR 8310, Cybersecurity Framework Election Infrastructure Profile. This Profile provides a voluntary...
NIST has completed the review of the second-round candidates in NIST's lightweight cryptography standardization process. After careful consideration, the ten...
A new method for monitoring biopharmaceutical product quality was recently put to the test by The National Institute of Standards and Technology (NIST) and 28...
When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part of...
Making elections secure means protecting against ever-evolving threats to information technology — which scans in-person and mail-in ballots, supports voter...
The latest exercise in NIST's Health Assessment Measurements Quality Assurance Program ( HAMQAP) is open for registration. HAMQAP, a collaboration with the...
More than 150 years ago, the Sun blasted Earth with a massive cloud of hot charged particles. This plasma blob generated a magnetic storm on Earth that caused...
NIST’s Applied Economic Office released a “ Guide for Environmentally Sustainable Investment Analysis” based on ASTM E3200. This guide presents techniques for...
In a significant advance toward the future redefinition of the international unit of time, the second, a research team led by the National Institute of...
The secret to building superconducting quantum computers with massive processing power may be an ordinary telecommunications technology — optical fiber...
Some of the most dangerous fires are the ones you don’t see coming. That goes not only for fires in buildings but for those kilometers off the ground, aboard...
The Technology Maturation Accelerator Program (TMAP) was begun at NIST in 2019 to provide a platform for NIST scientists and engineers to help propel their lab...
NIST announces the release of Draft NIST Internal Report (NISTIR) 8360, Machine Learning for Access Control Policy Verification. Access control policy...
In order to facilitate the development of applications and middleware that support the Personal Identity Verification (PIV) Card, the National Institute of...
Many organizations now support their employees' use of personal mobile devices to remotely perform work-related activities. This increasingly common practice...