WEBVTT 00:01:16.000 --> 00:01:21.000 So are the attendees in. 00:01:21.000 --> 00:01:30.000 Yes. Yes, you can get started. 00:01:30.000 --> 00:01:38.000 Oh, welcome everyone to the webinar today on cyber training and Skype. Good afternoon. I'm Ashok Shrina. 00:01:38.000 --> 00:01:47.000 I run the fiber training panel along with my colleagues. Gen Lee, the cyber training panel along with my colleagues, Gen Lee, Shadmister Bak Chi Chen and, Sheikh Gafu. 00:01:47.000 --> 00:01:52.000 We will also have a presentation on the Skype program by my colleague Don Gulbransen. 00:01:52.000 --> 00:02:02.000 Our program has grown a lot since last year and we expect to get even more of you submitting proposals this year. 00:02:02.000 --> 00:02:23.000 So let me go to by discuss the cyber training program part of it first 00:02:23.000 --> 00:02:35.000 So, the webinar goals are to, first to orient the research community to the Rubai cyber training and Skype solicitations and summarize the program and review criteria. 00:02:35.000 --> 00:02:48.000 Then, we will, answer question. We hope that, these will improve your understanding of the solicitations and help better align your proposal with the program. 00:02:48.000 --> 00:02:55.000 So, we start the presentation with Ovi of fiber training program followed by Sky. 00:02:55.000 --> 00:03:02.000 We will highlight important aspects with the details left to the solicitation. We didn't take questions from the webinar participants. 00:03:02.000 --> 00:03:21.000 A recording of this webinar will be available on the program page. For the purpose of the solicitation, CI refers to advanced cyber infrastructure, which includes software, data, related methods and services for advanced computation, large-scale data handling, networking and security. 00:03:21.000 --> 00:03:34.000 To enable and transform science and engineering research. The target community is at various stages of their career pipelines comprise under Davage and Broadway students, researchers and educators as well as CI professionals. 00:03:34.000 --> 00:03:41.000 The cyber training as type program focus on 3 different sites big communities. Nope, first to see a contributors. 00:03:41.000 --> 00:03:50.000 They are computational and data scientists typically who research and develop new Ca capabilities, new approaches and new methods. 00:03:50.000 --> 00:03:54.000 See, I users. 00:03:54.000 --> 00:04:02.000 A domain scientists typically, a domain scientists are engineers who want to effectively exploit advanced CI capabilities and methods for that research. 00:04:02.000 --> 00:04:15.000 Finally, CI professionals constitute the community of research, CI and professional staff who deploy, manage and support the effective use of research. 00:04:15.000 --> 00:04:24.000 We don't discuss this. I am training solicitation and it's motivation. Under trying its motivation may help you align the proposal with a programs role. 00:04:24.000 --> 00:04:32.000 The cyber training program is motivated by the increasing role of advanced CI in a enabling science across a variety of domains. 00:04:32.000 --> 00:04:40.000 The research workforce would benefit from innovative training and curricular materials that are tailored for the target disciplines. 00:04:40.000 --> 00:04:51.000 There's also a need to foster broad adoption of existing CI resources and tools. And method by diverse research communities. 00:04:51.000 --> 00:04:55.000 Oh, is he has 7, program related to CI that may increase some overlapping goals. 00:04:55.000 --> 00:05:01.000 It doesn't somewhat idealized view that may enable you to choose the right program for your needs. Oh what? 00:05:01.000 --> 00:05:09.000 This is a simplified view and a solid station would provide more detail guidance. So please use this only as for a high level you. 00:05:09.000 --> 00:05:15.000 If you want to develop software or data repository then you may wish to look at the CSSI program. 00:05:15.000 --> 00:05:23.000 You'd produce a community sustained CI to enhance the CI ecosystem available for research or education. 00:05:23.000 --> 00:05:29.000 If you want to perform research that will enable future CI, you may want to look at the OEC code program. 00:05:29.000 --> 00:05:38.000 The deadline is past, but, if you want up, like, so next cycle, you would typically develop techniques and see a prototype that will yield the program knowledge. 00:05:38.000 --> 00:05:44.000 Needed for future production. Yeah. No, we come to the 2 Solid Stations, 11 to this webinar. 00:05:44.000 --> 00:05:51.000 If you want to deploy CI professionals and also foster their carriers, then the Skype program may suit you. 00:05:51.000 --> 00:06:03.000 Your CIP will support research that leverages CI and would establish carrier path for them. This they particularly benefit groups that are currently underserved with respect to the use of CI for research. 00:06:03.000 --> 00:06:09.000 If you want to provide training on CI for research purposes, then the cyber training program may interest you. 00:06:09.000 --> 00:06:17.000 You develop a scalable and sustainable training to help increase a research workforce that can leverage CI. 00:06:17.000 --> 00:06:21.000 Not that this is for a research workforce development rather than a general workforce and it should be for research and enabled by CI. 00:06:21.000 --> 00:06:28.000 And note that we have the CIA cyber training program targets all 3 communities training for all 3 communities including the cyber infrastructure professionals. 00:06:28.000 --> 00:06:41.000 The Skype program focus on deploying CIPs. Okay, so that's a distinguish factor that is are you providing training. 00:06:41.000 --> 00:06:42.000 The cyber training program is about providing training. So the text and highlighted in both phase are important. 00:06:42.000 --> 00:07:01.000 You have to provide training. It has be related to using CI for research purposes. So these are distinguishing factors of the CI of cyber training program. 00:07:01.000 --> 00:07:26.000 So cyber training programs. to prepare nurture and Google a national scientific research workforce for creating utilizing and supporting advanced cyber infrastructure work force by creating utilizing and supporting advanced cyber infrastructure to enable and potentially transform fundamental science and engineering research and contribute to the nation's and supporting advanced cyber infrastructure to enable and potentially transform fundamental science and engineering research and contribute to the nation's overall economic competitiveness and the project should aim to contribute to larger goal of 00:07:26.000 --> 00:07:34.000 an education ecosystem enabling computational and data driven signs for all scientists and engineers. 00:07:34.000 --> 00:07:39.000 This embrace is computation as a third below and data given signs are the fourth pillow of scientific discovery. 00:07:39.000 --> 00:07:55.000 In addition to the traditional first and second pillow of theory and experimentation. The specific consolidation goals are to ensure broad adoption of CI tools, methods and resources by the research community in order to catalyze major research advances. 00:07:55.000 --> 00:08:10.000 And to integrate core literacy and site discipline appropriate advanced skills in advanced CI as well as computational and data-driven science and engineering into the nation's educational curriculum and instructional fabric. 00:08:10.000 --> 00:08:14.000 But, in both undergraduate and graduate courses to add on fundamental research. We are personally 3, keen on broadening Ca access to groups that are coming. 00:08:14.000 --> 00:08:36.000 Under served in its use. Okay, so the broadening could be by a variety of. Criteria it could be by institution it could be by scientific community it could be by institution it could be by scientific community it could be by under receptor groups and so on. 00:08:36.000 --> 00:08:44.000 The cyber training program is led by the Office of Advanced Siber Infrastructure in the directive for computing and information science. 00:08:44.000 --> 00:09:02.000 However, it includes participation across the national science foundation from all the other 3 divisions in size, the education division, the geosciences division, the geosciences directory, the NPS directory, the geosciences directory, the NPS direct rate, SBI direct rate and so on the direct rate, SBI direct rate and so on. 00:09:02.000 --> 00:09:06.000 The direct rates and divisions have specific programmatic areas of interest that are described in the solicitation. 00:09:06.000 --> 00:09:16.000 So, let me highlight that one in total cyber training program is to stimulate co-funding between OEC and one or more science or engineering domains or direct trades. 00:09:16.000 --> 00:09:34.000 So, Positive Pi is a strongly encouraged to contact the, program officers in OEC but also in the participating directory or divisions relevant to the proposals to a certain whether the focus and budget of the proposed activities are appropriate to the solidification. 00:09:34.000 --> 00:09:46.000 If you send me or the other PD a one page summary and I identify other divisions of interest, you will share it with the other division PDs and get back to you. 00:09:46.000 --> 00:09:54.000 So, we'll, now, have you 3 provisions of the current Solar Association. The 3, project classes. 00:09:54.000 --> 00:10:04.000 The pilot projects have total budget of up to 300,000 and it's a duration up to 2 years under exploratory activities that may lead to implementation projects. 00:10:04.000 --> 00:10:14.000 Implementation, and 8 or small, with total budgets up to 500,000 or medium with total budget up to 1 million dollar with duration up to 4 years. 00:10:14.000 --> 00:10:26.000 Implementation projects make CI training and educational activities are curricular and instructional materials broadly accessible to a significant portion of a community for one or more. 00:10:26.000 --> 00:10:36.000 Medium information projects also foster a community to catalyze the adoption of advanced Ca methods or to incorporate training resources and materials into the curriculum. 00:10:36.000 --> 00:10:50.000 All proposals should have well identified proposal elements that clearly address the solo situation specific review criteria listed here. In addition to addressing the standard NSF intellectual merit and broader impact. 00:10:50.000 --> 00:10:52.000 Review also be asked to address the following questions. That is, do you have a rationale for challenges? 00:10:52.000 --> 00:11:05.000 Identified for research workforce development? Proposal should address at least one of these 2, criteria. 00:11:05.000 --> 00:11:14.000 That is, the strength of the project, are you broaden your use of CI methods and resources by the research community? 00:11:14.000 --> 00:11:17.000 Or are you integrating CI skills into the institutional and disciplinary, and instructional fabric fabric. 00:11:17.000 --> 00:11:33.000 Okay. At least one of the criteria has be addressed strong proposals will address both these criteria. And we also expect you to coordinate with the access program as mentioned in the solves the patient. 00:11:33.000 --> 00:11:43.000 Small programs will also address a scalably and sustainability of the training program beyond the scope of the funding period. 00:11:43.000 --> 00:12:00.000 And we'll also, as a, as a evaluate based on the recurrent, evaluation plans and collective impact strategy, including evaluation plans and collective impact strategy, including, are you having some organizational backbone to support a collective impact strategy, including, are you having some organizational backbone to support a collective impact across many institutions, for instance? 00:12:00.000 --> 00:12:07.000 Right. And medium proposals in addition will also foster a collective impact across many institutions for instance. A collective impact across many institutions for instance. Right. 00:12:07.000 --> 00:12:13.000 And medium proposals in addition, we'll also foster a suitable community by 00:12:13.000 --> 00:12:29.000 So note that the access coordination, can be along 2 directions. You may actually share material and access to knowledge based or you and you may also share your expertise by that just ring through access. 00:12:29.000 --> 00:12:37.000 Sort of programmatic areas of interest are mentioned in the solicitation. The common theme is to provide the solicitation. 00:12:37.000 --> 00:12:47.000 The common theme is to provide discipline appropriate training on one on one or more topics, a common theme is to provide discipline, appropriate training on one or more topics or related training on one on one or more topics or related training on one on one or more topics or related training on one on one or more topics or relate to the CI for research purposes. 00:12:47.000 --> 00:12:51.000 Okay, so please see this solicitation for details each division will have their own priorities on. So please see this solicitation for details. 00:12:51.000 --> 00:12:53.000 Each division will have their own priorities on, what 00:12:53.000 --> 00:13:04.000 I also meant I want to mention that there's opportunity for you to use leverage resources provided by NSF supported the research provider for your in your training program. 00:13:04.000 --> 00:13:16.000 Okay, so the SPC is resources can be opting through an access allocation. High supercomputing resources can be out in through path and cloud computing resource can can be opted through cloud back. 00:13:16.000 --> 00:13:22.000 See the solicitation for further details. 00:13:22.000 --> 00:13:34.000 So, with this, I will, pass on, the podium to my colleague Tom Gull Branson who can talk about the Skype program. 00:13:34.000 --> 00:13:37.000 Before you pass on, should I start with the beginning slides again? 00:13:37.000 --> 00:13:39.000 We covered it. 00:13:39.000 --> 00:13:41.000 You cover that. 00:13:41.000 --> 00:13:45.000 Ashok, I think you have to stop sharing so that I can start. 00:13:45.000 --> 00:13:53.000 Yes, I stop sharing. Oh, sorry, I didn't. Okay. 00:13:53.000 --> 00:14:08.000 So, that will be the end of the cyber training. Section if you have questions please note them in the QA so that we can address them at the end of the whole handful of slides that I'm gonna put up here. 00:14:08.000 --> 00:14:14.000 We'll take all the questions back and forth. I think some of them might be common to both solicitations. 00:14:14.000 --> 00:14:17.000 So if I share. 00:14:17.000 --> 00:14:27.000 This screen you should see. Computing resource opportunities. That's the, the way that people can. 00:14:27.000 --> 00:14:28.000 Okay. 00:14:28.000 --> 00:14:38.000 Get at the advanced cyber infrastructure. That the access program provides at very easy quick levels with explore level and discovery level. 00:14:38.000 --> 00:14:46.000 This would be suitable for training and for letting people letting trainees get to the programs without very much. 00:14:46.000 --> 00:14:53.000 Burden of trying to get an allocation and then the larger accelerated maximize those are more formal. 00:14:53.000 --> 00:15:03.000 Larger deployments that will go through review process. So what I'd like to do is Switch gears now to the Sky program strengthening CI professionals ecosystem. 00:15:03.000 --> 00:15:09.000 And, as a show pointed out, for a moment, I'll reinforce it again and again here. 00:15:09.000 --> 00:15:31.000 The distinction, well there are some things in common between cyber training and Skype. The largest distinction is that when when a Skype program is is implemented is executed, the outcome will be that research has advanced, that people have been deployed to help research move ahead. 00:15:31.000 --> 00:15:38.000 Along the way, there might be some training materials that are by product. And they might even be added to the knowledge base that was mentioned before. 00:15:38.000 --> 00:15:46.000 But primarily it's about. Helping people become ready to, serve and making some connections to enable those. 00:15:46.000 --> 00:15:53.000 Service. Inagements to happen. And also the strengthening of the ecosystem. 00:15:53.000 --> 00:16:15.000 Skype looks for change to occur. Had institutional levels. Not only do we want some people to become further skilled or you know skilled in new ways that are different than what they had but we hope that the places where they work or that they work from. 00:16:15.000 --> 00:16:30.000 Are altered in a way that allows their service the CI professional to be recognized, to be seen as a position to be seen as a position that has a a sequence, a path, a career path. 00:16:30.000 --> 00:16:40.000 We very often hear, from folks who do phenomenal work, but when the soft money is over is a challenge to find the next one. 00:16:40.000 --> 00:16:53.000 And so we look forward to hearing proposals about how to make those career paths. Clearer to recruit people and clearer for institutions to hire 2 and to keep people. 00:16:53.000 --> 00:16:58.000 So that's what the Skype program is trying to do as, go to some of the motivating factors. 00:16:58.000 --> 00:17:08.000 Another major factor in this strengthening is that democratizing. Verb, right? We're trying to bring these methods to more types of science. 00:17:08.000 --> 00:17:19.000 We're trying to bring these methods to people who haven't perfected it or become. Excellent providers yet. 00:17:19.000 --> 00:17:32.000 So. Great proposals are seen as very, very good or excellent because more people are enabled to be involved with the CF system as contrasted to. 00:17:32.000 --> 00:17:40.000 Another proposal which might, recognize somewhere number of people who are great at what they're doing and this would give them money to do it more. 00:17:40.000 --> 00:17:50.000 That's really not broadening. That broadening impact is about furthering the, breadth of people are involved and ways that people can get involved. 00:17:50.000 --> 00:17:53.000 This CI part of this solicitation isn't just software it can be about data can be about networking to do the transport needed. 00:17:53.000 --> 00:18:06.000 So it is very inclusive in in the definition of what's available and to who whom can we. 00:18:06.000 --> 00:18:15.000 Make these services available or who can we make connections with? It can be to the computational scientists. Who very often have some of these, advanced skills, but other times maybe they need some optimization. 00:18:15.000 --> 00:18:29.000 So it's a connection to other skills. That might not even be in the same institution. In fact, it's that crossover that Skype. 00:18:29.000 --> 00:18:39.000 Looks for, when you read through the PI. Expectations and the domain expertise that's called for. 00:18:39.000 --> 00:18:46.000 Proposals are expected to have a PI in the cyber infrastructure and a PI from a domain or specific discipline. 00:18:46.000 --> 00:18:54.000 Why? Because that's that connectivity that we're trying to see done in new ways to new places. 00:18:54.000 --> 00:18:56.000 In fact, the whole access program is dedicated to that same kind of wreaking across to new disciplines. 00:18:56.000 --> 00:19:08.000 So a Skype awardee that does it well. Could perhaps in some cases teach access program how to serve. 00:19:08.000 --> 00:19:15.000 Whether it's social behavior, sciences, economics, whoever, whatever researchers aren't quite yet taking full advantage of these systems. 00:19:15.000 --> 00:19:45.000 Proposal could conceivably help access to a See new ways to provide these services to more communities. So it's the interfaces and the interdependencies that we're looking for, need ideas on how to do it. 00:20:51.000 --> 00:20:59.000 And then institutional recognition, we'll keep trying to underscore that. The next is about the participation. 00:20:59.000 --> 00:21:08.000 Those other domains that we wanna connect with have be driven by a science need. Particularly engineering, geo-education. 00:21:08.000 --> 00:21:15.000 Myth physical sciences. Social behavior and economics and then the tip program has joined us this year. 00:21:15.000 --> 00:21:24.000 Where there's even more, broad. Array of opportunities to provide convergent. Connections. 00:21:24.000 --> 00:21:35.000 So you're welcome to talk to any of the program officers myself or others in the OEC office, but we also want you to talk to people in the directorate specifically so that we can make that. 00:21:35.000 --> 00:21:44.000 Per position that would help those domains not just make CI for the secrecy of needs CI. 00:21:44.000 --> 00:21:53.000 15 million dollars is what we have. Earmarked for this. It's not guaranteed, but that's the scale of what we hope to make available in awards this year. 00:21:53.000 --> 00:22:01.000 So it would be on the order of 4 awards, maybe less, maybe more depending on how much people can get done with available monies. 00:22:01.000 --> 00:22:08.000 From a numbers point of view, we don't have a specific salary range for a CIP person. 00:22:08.000 --> 00:22:16.000 That you can multiply by 4 and get the annual budget. We understand that there's differences in. Where this work will happen. 00:22:16.000 --> 00:22:23.000 And we also acknowledge that it's the budget isn't just to support the salaries or stipends to students who are doing this. 00:22:23.000 --> 00:22:32.000 It would also Your budget is allowed to include. Leadership and management and communications and travel and other things to make it happen. 00:22:32.000 --> 00:22:39.000 And 4 is full time equivalent. That doesn't mean 4. So security numbers. It can be 8 people. 00:22:39.000 --> 00:22:42.000 It can be, it can be a share of whatever you want, but that's the scale that we're looking for in the way of treaties on an annual basis. 00:22:42.000 --> 00:22:53.000 You've mentioned that director's already. Who are these CIP people who are these professionals? 00:22:53.000 --> 00:22:59.000 It can be a across the range. As long as we make the connection, you see as long as you make. 00:22:59.000 --> 00:23:09.000 A the connection to the domains or disciplines that you're serving. And so, diversity is an aspect of broadening that we do look forward to. 00:23:09.000 --> 00:23:22.000 We'll go into the details of that. Let me just do it. The access program is this connector facilitator enabler community of 5 different very large awards that are trying to find researchers with needs. 00:23:22.000 --> 00:23:30.000 Find professionals that can help them, bring them together, get an allocation, get on board, do monitoring up the performance to see how the software are running. 00:23:30.000 --> 00:23:36.000 So there's a wonderful community. But it's really driven by the middle layer. It's the research needs. 00:23:36.000 --> 00:23:40.000 That we're trying to. Take care of. So you have. 00:23:40.000 --> 00:23:47.000 People at the top who are ready or will be made ready. As groups, as individuals, however you see fit. 00:23:47.000 --> 00:23:55.000 For one institution, maybe they could hop to a different institution. And there are many different programs in OEC that do this. 00:23:55.000 --> 00:24:06.000 So we're training you've heard about. There are networks that we have cyber teams. And then as you mentioned, as Scott mentioned you before, Card Bank and other systems are available. 00:24:06.000 --> 00:24:14.000 And then we wanna see Skype. Providing the connectivity and new ways of doing that. That's what we're looking for. 00:24:14.000 --> 00:24:20.000 And when it's done, We hope that the people who do this so well when the project is over. 00:24:20.000 --> 00:24:27.000 But there's a following forward a continuance and institutional commitment to make it happen in the future without necessarily being funded by. 00:24:27.000 --> 00:24:32.000 This program. So there was a question already raised and I want to try to do it verbally here. 00:24:32.000 --> 00:24:45.000 What does it mean to work with the access program? How do we collaborate? The best way to get the answer to that question is to go to this link to access program has a Skype link dedicated to show some of the examples of what. 00:24:45.000 --> 00:25:05.000 Services to access would mean. It can sound like helping the knowledge base to grow. Connecting with that content support network to actually go to a mentor mentee relationship to go serve a researcher with needs and there's testing available and there's other, outreach. 00:25:05.000 --> 00:25:13.000 It is not limited to those. Those are the obvious and sort of. Available right now. The access program launched in September of 20. 00:25:13.000 --> 00:25:19.000 2, so it's well into its second year. But there's evolution going on there. So if you have a new idea. 00:25:19.000 --> 00:25:25.000 Yeah, let's talk about that because we can evolve it if we can find a new way to make it work. 00:25:25.000 --> 00:25:32.000 So let's go to questions I don't know how to, I don't see them from my current mode, but. 00:25:32.000 --> 00:25:32.000 Okay. 00:25:32.000 --> 00:25:42.000 Certainly you're welcome to call over to myself, email otherwise, and, Please do remember you check with the directory to make those connection. 00:25:42.000 --> 00:25:48.000 Great. Thank you. Thank you. Schultz and Tom. 00:25:48.000 --> 00:25:56.000 Great presentations. You might still want to leave the slides on maybe the with the slides of the contact information. 00:25:56.000 --> 00:26:03.000 Yes. Hello, one of you, can you leave a slice of the contact information? 00:26:03.000 --> 00:26:11.000 Yes, and then let's get to the questions and answer. The first question we have. 00:26:11.000 --> 00:26:29.000 Here it's the difference between the Small and medium proposal, the expectation, the difference between like expectation of small and medium proposals for cyber training. 00:26:29.000 --> 00:26:28.000 Yes, please, a sure, yes. 00:26:28.000 --> 00:26:42.000 So do you want me to answer that? Okay, so the, important distinction between the small and the medium is the last criteria that is the foster in the community, right? 00:26:42.000 --> 00:26:57.000 So in both of the, you'll have scalability and collective impact. But in the foster in the community, you will actually take active steps to broaden the community who are actually involved in that type of. 00:26:57.000 --> 00:27:05.000 Training and research, you know, so that is the primary distinction, the last revenue criteria are fostering the community. 00:27:05.000 --> 00:27:09.000 That's the primary distinction. 00:27:09.000 --> 00:27:13.000 And much larger than scale. Of course. 00:27:13.000 --> 00:27:12.000 Okay. 00:27:12.000 --> 00:27:32.000 Okay, the next question is this attendee is saying in our review of funded projects we see very little mention of facilitation and facilitator training Do you see facilitator training of students applicable to the cyber training call? 00:27:32.000 --> 00:27:36.000 You want to say take the question? 00:27:36.000 --> 00:27:45.000 Oh, okay, right now we don't have a fairly facilitated training. Actually the several trainings are supposed to be for researchers. 00:27:45.000 --> 00:27:50.000 That's one thing we want to emphasize the difference between the cyber training and EDU programs or training. 00:27:50.000 --> 00:28:10.000 So, with the cyber training, it's for feature or current researchers. So train them to use the high performance computing to use a separate infrastructure to use anything you created for separate infrastructure that's our target audience of the training. 00:28:10.000 --> 00:28:18.000 No, thank you. This another question. Yes, yes. 00:28:18.000 --> 00:28:12.000 The Kobe go to CIP, yes. 00:28:12.000 --> 00:28:24.000 If I could add to that. With regard to the facilitator. Training. There have been awards which you can find from past. 00:28:24.000 --> 00:28:36.000 Award search is at NSF. There have been awards in Skype. Which included Some Skype trainees dedicated to a facilitation role. 00:28:36.000 --> 00:28:39.000 So it is. Conceivable that form of interaction is pertinent. It might not be the only thing done, but it is. 00:28:39.000 --> 00:28:53.000 Sort of in play, if you will. It can be part of a mix that enables you to achieve the objectives of the Skype. 00:28:53.000 --> 00:28:54.000 So station. 00:28:54.000 --> 00:29:03.000 Right, so this reminding me another question on the Skype of a violent interaction with us. So I know you answer it. 00:29:03.000 --> 00:29:12.000 In the online and selling can you also use it all in a The video? I the question? 00:29:12.000 --> 00:29:13.000 The interface between the SS and Skype. Yes. 00:29:13.000 --> 00:29:23.000 Yeah. You're right. The, access program home page is accessed. Dash CI. 00:29:23.000 --> 00:29:33.000 Dot org. If you add a Skype. To that address. They actually now have a web page. 00:29:33.000 --> 00:29:41.000 That is a live set of links to a multiple ways that people who are CI professionals. Can collaborate or can participate with. 00:29:41.000 --> 00:29:48.000 Access program. And I didn't note before, but let me do it now. So what there are different ways to interact. 00:29:48.000 --> 00:29:59.000 The Stacks as team has tools and has online presence. Sometimes it needs to be tested. Oh, that's an interaction that would be very helpful. 00:29:59.000 --> 00:30:04.000 Sometimes there's knowledge-based content. Ask CI is a platform that you use quite a bit. 00:30:04.000 --> 00:30:17.000 Answering and building the CI content is another helpful contribution. But, I didn't mention because I skipped them unfortunately was that the solicitation calls for 20%. 00:30:17.000 --> 00:30:25.000 At least, 20%. Of the Skype trainees time is to be dedicated to this. 00:30:25.000 --> 00:30:36.000 Collaboration with access. Well, 20% of what? The first week, 20% of the first month, there's clearly an expectation that for a while The teams awarded will take some time to figure out what's going on. 00:30:36.000 --> 00:30:42.000 So You can think of that 20% as kinda like a, you know, a rolling. Average if you will. 00:30:42.000 --> 00:30:51.000 And also the access program is. Open to figuring out how to best to connect. So. 00:30:51.000 --> 00:31:03.000 You can, look forward to talking with Dr. Shelley Kinuth. Alana, and others on the support team who are, making these connections with you. 00:31:03.000 --> 00:31:08.000 Okay, I'll Tom while you're on there are a couple more questions on Skype. 00:31:08.000 --> 00:31:18.000 So one is Oh will there be additional funding available from related to Skype proposals within Epsore jurisdictions. 00:31:18.000 --> 00:31:30.000 That's a heads up question. It's, was not included. Explicitly in the Skype solicitation wording. 00:31:30.000 --> 00:31:44.000 But that doesn't preclude us from benefiting. From this investments available towards app score goal. So somewhat of a securitous answer. 00:31:44.000 --> 00:32:02.000 Yes, if you see. Apps opportunities to help app score targeted. Constituents or stakeholders. Let's talk to that office and let's see because perhaps there's co-funding which would augment or supplement. 00:32:02.000 --> 00:32:02.000 The monies that we have initially earmarked for this program, which would be wonderful for all involved. 00:32:02.000 --> 00:32:09.000 Thank you for the idea. 00:32:09.000 --> 00:32:21.000 Oh good, the other one is canon FTE in Skype. Award be split across multiple institutions or is the expectation that an institute wholly employ that person? 00:32:21.000 --> 00:32:25.000 Yeah, thanks. Good question. And it lets me cover yet another area that I probably could have spent more time on. 00:32:25.000 --> 00:32:40.000 There is a. There are 6 criteria. Called out in the solicitation that people ought to write their project descriptions towards. 00:32:40.000 --> 00:32:50.000 But they're broadening overall. Recognizing challenges to this strengthening the system. Recruiting and evaluation. 00:32:50.000 --> 00:32:54.000 Where are you gonna find folks? How are you gonna find people and how you're gonna know that's working well? 00:32:54.000 --> 00:33:04.000 And the last one is collective impact. So the collective impact part. Is it would be interpreted as you see fit doesn't have to be to the actual. 00:33:04.000 --> 00:33:14.000 Citation listed, but the concept is make a difference institutionally. And making a difference in multiple institutions. 00:33:14.000 --> 00:33:17.000 Is a good thing too, right? FTs don't have to be one person. 00:33:17.000 --> 00:33:30.000 FDEs can be spread and split as you see. So. Yes, you're, option of dividing the. 00:33:30.000 --> 00:33:41.000 Full time equivalence across institutions is. Consistent with, the principles or the construct. Go for it. 00:33:41.000 --> 00:33:48.000 Yeah, next question is. Absolutely, related to bio division. So there are 2 questions. 00:33:48.000 --> 00:33:56.000 Yeah, one is for the cyber training program. In particular with regard to broadening use of CI resources. 00:33:56.000 --> 00:34:05.000 What the questioner is asking, would I be able to include a CI resource from a directorate that was not listed on your slide. 00:34:05.000 --> 00:34:13.000 Eg division of biological infrastructure. And. The are really there's a related question also so 00:34:13.000 --> 00:34:17.000 Okay. 00:34:17.000 --> 00:34:23.000 So the another person is commenting do not see bio in division. So is that executed. So Jen. 00:34:23.000 --> 00:34:26.000 You want to respond? 00:34:26.000 --> 00:34:43.000 Okay, for the ones the bios not included so it just means that you we might not be able to co-funded that but if it's by out it's important cyber training for by all researchers, we might still fund it. 00:34:43.000 --> 00:34:43.000 Oh, so, 00:34:43.000 --> 00:34:44.000 Okay. 00:34:44.000 --> 00:34:48.000 That's for cyber training, yes. A shot, yes. 00:34:48.000 --> 00:35:05.000 Yeah, that's so let me add. So the first question had. I'm not sure how to interpret it because of saying can I use bio include CI resources from the direct rate right so if you're saying you're introducing a resource provided by some direct rate right so if you're saying you're introducing a resource provided by some directory to provide training you're a resource provided by some directory to provide training you know you're welcome to use any kind 00:35:05.000 --> 00:35:06.000 Yes. 00:35:06.000 --> 00:35:17.000 of And, or, if you mean that, should I be targeting this particular division if that division is not, should I be targeting this particular division if that division is not, included. 00:35:17.000 --> 00:35:39.000 In this particular division, if that division is not, included, you know, typically what we do is, we would get co-funding from divisions that division is not, included, you know, typically what we do is, we would get co-funding from divisions is not, included. 00:35:39.000 --> 00:36:08.000 You know, typically what we do is, we would get co-funding from divisions that, you are targeting and, the division we are included in the solicitation are ones that have actually expressed interest in participating. So typically divisions, that are not participating have their own programs, right? 00:36:08.000 --> 00:36:01.000 Yeah. 00:36:01.000 --> 00:36:05.000 So the Solidarization mentions prospect that is the clarification. Yeah. 00:36:05.000 --> 00:36:12.000 Yes. Right Tom, for Skype, how about for Skype? We are 2 programs. Yes. 00:36:12.000 --> 00:36:11.000 Yes. 00:36:11.000 --> 00:36:18.000 I fully support the way I show up described it. We don't preclude. Work in those areas. 00:36:18.000 --> 00:36:30.000 But it is fair to note that when the office of the mass lab infrastructure developed the solicitation we invited all the directorates to join some weren't interested. 00:36:30.000 --> 00:36:38.000 Some might not have joined because they had their own programs and I won't be able to remember off top of my head but I'm sure that I saw something in the last month of a doctorate that actually had a cyber training oriented program launched or was announced to be launched. 00:36:38.000 --> 00:36:53.000 So sometimes you might do well to look at the Directory that we're not listed and make sure that they don't have something on the ready. We don't know them all. 00:36:53.000 --> 00:37:05.000 We, will try to help you refer across as well, but. You can serve them through us. Just won't be co-funded. 00:37:05.000 --> 00:37:17.000 Okay, I see. A couple of questions on cyber training. So one is what would constitute an ideal pilot focus and affiliated success criteria? 00:37:17.000 --> 00:37:29.000 Would it be appropriate to have already created some basic curriculum? And pilot it out in an institution then roll it out to a wider community. 00:37:29.000 --> 00:37:39.000 Okay, so. So our exportation for the pilot is that to use the opportunity to create the collect curriculum and then try it out. 00:37:39.000 --> 00:37:47.000 If you have a done that already, then you might want to apply for implementation, which is to have you scaling up. 00:37:47.000 --> 00:37:58.000 And in terms of the first question we have, this question has many questions. For the first one in terms of the, what we're looking for, you look at the first one in terms of the, what we're looking for, a look at the solid station. 00:37:58.000 --> 00:38:01.000 We have a list of the criteria. We have a list of the criteria. We have a 6 or 7 of them. 00:38:01.000 --> 00:38:07.000 A sure has that slides, we have a list of the criteria. We have a list of the criteria. We have a 6 or 7 of them. 00:38:07.000 --> 00:38:12.000 A sure has that slides. You wanna go back to the slides. But the number one, it's the most important to me, it's that we' That's the number one. 00:38:12.000 --> 00:38:19.000 That's why it's the number one in the list. Right, we have a slide on that. 00:38:19.000 --> 00:38:16.000 Okay. 00:38:16.000 --> 00:38:26.000 How do we evaluate? Bye. So we can move back to last slides. I, who's showing the slides? 00:38:26.000 --> 00:38:26.000 Right now, it's Tom or 00:38:26.000 --> 00:38:29.000 I haven't here, but I don't know which slide you wanna go to. 00:38:29.000 --> 00:38:31.000 On the, cyber training. 00:38:31.000 --> 00:38:34.000 The revenue criteria for, cyber training. 00:38:34.000 --> 00:38:34.000 Why? 00:38:34.000 --> 00:38:36.000 Let me see if I can hop over to. 00:38:36.000 --> 00:38:40.000 The list of pilot. 00:38:40.000 --> 00:38:45.000 No, I for the pilot we have a 00:38:45.000 --> 00:38:47.000 Yeah, that one. Yeah. 00:38:47.000 --> 00:38:43.000 Let me see. 00:38:43.000 --> 00:38:54.000 The first. 5. Yes, that, like, for, the first 2, a number of small, first 5 and then for the medium for 6. 00:38:54.000 --> 00:38:57.000 Yes. 00:38:57.000 --> 00:38:57.000 Good. 00:38:57.000 --> 00:39:15.000 Okay, so yeah, one additional question is is training undergraduate and graduate with developing curriculum materials for preparing them to be future CI within the program scope of sub-training. 00:39:15.000 --> 00:39:12.000 Yeah. 00:39:12.000 --> 00:39:18.000 You probably meant, CI professionals, right? So that is what you meant. Yes, training Ca professional is very much a topic of interest to us. 00:39:18.000 --> 00:39:31.000 Yes. 00:39:31.000 --> 00:39:25.000 Yeah. 00:39:25.000 --> 00:39:47.000 And I think the following question says. How does that question apply to Skype? With regard to Scott, there could certainly be occasions where curriculum materials and content to help train some SAID professionals might be made available to others and recycled. 00:39:47.000 --> 00:39:53.000 That's a wonderful thing. It's a it's a side of benefit. It's a secondary benefit, but is certainly. 00:39:53.000 --> 00:40:05.000 Something that we'd like to see and it allows for that scalability, which is an important consideration to make when you're doing this we Love the idea of 4 FTDs joining the world but Seeing that success be able to multiply would be. 00:40:05.000 --> 00:40:17.000 Valued highly. 00:40:17.000 --> 00:40:30.000 I think that's all the questions. I can see we have. Any more questions? 00:40:30.000 --> 00:40:40.000 Thanks for attending the webinar then. Yeah. And please feel free to email us. If you have any further. 00:40:40.000 --> 00:40:55.000 Right, do we have a slides about the this is the criteria for reviewing a server training? Do we have a slides for review or Skype? 00:40:55.000 --> 00:40:58.000 The criteria for. 00:40:58.000 --> 00:41:10.000 The Skype criteria and instructions for the proposal writing are more than can fit onto a slide and I would Direct folks back to the because it is fairly detailed. 00:41:10.000 --> 00:41:15.000 Maybe it's. Extra detailed and let's best to go there and then to try to. 00:41:15.000 --> 00:41:20.000 Okay. 00:41:20.000 --> 00:41:15.000 Bye. 00:41:15.000 --> 00:41:23.000 Stuff in a couple of bullets. I Chuck, is there a slide from your deck that you wanted to present? 00:41:23.000 --> 00:41:28.000 No, I don't have anything further. 00:41:28.000 --> 00:41:36.000 One thing I'll show coming if you we sometimes noted that the independent evaluator issue was not. The early covered. 00:41:36.000 --> 00:41:39.000 Do you wanna just mention that? 00:41:39.000 --> 00:41:46.000 Sure. So, we need an independent evaluator, the independent evaluator. May not necessarily be an external evaluator. 00:41:46.000 --> 00:41:54.000 That that is the person could be an independent evaluator from your institution, right? So that is also possible, but it has to be independent. 00:41:54.000 --> 00:42:00.000 They cannot be part of the team. That is actually providing the training or creating the training material. 00:42:00.000 --> 00:42:08.000 No, and also usually no good. In the same department, you know, your friend, someone outside of your college, will be great. 00:42:08.000 --> 00:42:15.000 Bye. The same university is okay, but probably not the same department. Bye. 00:42:15.000 --> 00:42:21.000 And before people go, I would offer another question that we have received in the past. Didn't come up yet today, but I bet you it will before the. 00:42:21.000 --> 00:42:29.000 Due date and that pertains to the section for eligibility information. Who may serve as a PI? 00:42:29.000 --> 00:42:37.000 A limit on the number of proposals for organization and that is one Skype proposal per organization. But let's be clear. 00:42:37.000 --> 00:42:49.000 That pertains to the to the lead organization or the lead institution, the prime institution. If it institution appears in another proposal. 00:42:49.000 --> 00:42:59.000 As a sub awardee. That second appearance. Is allowed. It's just that we can only handle one lead. 00:42:59.000 --> 00:43:03.000 Recipient, to be given an award to that. We can't see 2 of those. 00:43:03.000 --> 00:43:13.000 If the second one comes in, it will be return without review. And, the same applies to Pi's and Koi's there to appear. 00:43:13.000 --> 00:43:26.000 Any given PI can only be a PI in one. Proposal per cycle. And any KPI can only be a proposal per cycle. 00:43:26.000 --> 00:43:38.000 If those same names show up as a letter of collaboration. Or as key personnel. Those secondary appearances are allowable 00:43:38.000 --> 00:43:55.000 Tom, could you, give a little bit more clarification on the. So, as you mentioned, if they, if they are submitting a, if that a, if they are submitting a, if they're a lead institution, they're a lead institution, they account, if they get a, if they're a lead institution, they're a lead institution, they 00:43:55.000 --> 00:43:54.000 Right. 00:43:54.000 --> 00:43:58.000 account, if they get a sub award, they don't count. But sometimes they get a suburb what they don't count. 00:43:58.000 --> 00:44:00.000 But sometimes they can also have a collaborative proposal in which you are not the lead 00:44:00.000 --> 00:44:04.000 As I understand it. There is still a lead or a prime in the collaborative proposal submittal scenario. 00:44:04.000 --> 00:44:17.000 The collaborative proposal submittal scenario. So the collaborating institutions. Behind that one or underneath that one. 00:44:17.000 --> 00:44:25.000 They structurally appear as collaborators. And, if you will. Little awards, but they are not. 00:44:25.000 --> 00:44:36.000 Counted as the prime so they could conceivably show up. As a collaborator on another proposal or as a a prime on another proposal. 00:44:36.000 --> 00:44:43.000 Might be tough to get out of your program office twice, but that's for you all to figure out. 00:44:43.000 --> 00:44:42.000 Thanks, Tom. 00:44:42.000 --> 00:44:54.000 . Great. No, so for Skype, something I really would like to emphasize is that you need to contact program directors before you submit, program directors before you submit because this is a large project. 00:44:54.000 --> 00:44:59.000 You need to write, that you need to contact program directors before you submit, program directors before you submit because this is a large project. 00:44:59.000 --> 00:45:11.000 You need to write a one page summary, contact Tom, Tom, you have an email address somewhere, contact Tom, Tom, you have an email address somewhere, so please let Tom know you want to submit and, contact Tom, Tom, you have an email address somewhere, because this is a large project. 00:45:11.000 --> 00:45:15.000 You need to write a one-page summary, contact Tom, Tom, you have an email address somewhere along 00:45:15.000 --> 00:45:22.000 Yeah, we those comments and feedback will not be thumbs up thumbs down. There was nothing about, oh, that's a great idea. 00:45:22.000 --> 00:45:22.000 Bye. 00:45:22.000 --> 00:45:29.000 Just we allowed to ensure that you understand the solicitation and that. Anything that's unclear is made clear. 00:45:29.000 --> 00:45:35.000 And that you're compliant with the the allowables. 00:45:35.000 --> 00:45:33.000 Oh, good with you. 00:45:33.000 --> 00:45:39.000 Bye. But yes, and for several training, yeah, yes, you want to go about this. 00:45:39.000 --> 00:45:49.000 So, the question was Shadmister, you clarify about, what we mean by domain specific training and cyber training. 00:45:49.000 --> 00:45:57.000 Yeah, what, I think, comes up a lot of time in the, you know, in the reviews and in discussions is. 00:45:57.000 --> 00:46:20.000 That if you're coming from a specific domain let's say in geological sciences or material sciences or whatever the justifying the need for cyber training in the domain the rationale that that you are using that means giving us evidence of the Contest that your innovation is a true innovation. 00:46:20.000 --> 00:46:30.000 That you're offering to do something very new. Oh in that domain so that really really helps the reviewers. 00:46:30.000 --> 00:46:42.000 To get a context of the literature. Oh, of what has been done. So we get a clear understanding of where your contribution, scientific contribution, will be fitting in. 00:46:42.000 --> 00:46:46.000 So that's what I meant. 00:46:46.000 --> 00:46:52.000 Thanks. 00:46:52.000 --> 00:46:56.000 Okay. 00:46:56.000 --> 00:47:06.000 So again, the deadline January eighteenth, you're all welcome to submit. I think we can stay here a couple more minutes to answer questions. 00:47:06.000 --> 00:47:12.000 And. 00:47:12.000 --> 00:47:20.000 If you have any questions, we're here. Otherwise we can. Finish, we can finish earlier. 00:47:20.000 --> 00:47:20.000 Yes. 00:47:20.000 --> 00:47:24.000 And the recording and the slides will dangle off for the same. 00:47:24.000 --> 00:47:31.000 Yes, within a week, the recording and slice, yes. 00:47:31.000 --> 00:47:37.000 The solicitation calls for. Contact with the program officers, at least a month in advance. 00:47:37.000 --> 00:47:45.000 But we answered the phone. Beyond that point, it just would probably help you to get the feedback sooner. 00:47:45.000 --> 00:47:48.000 Given the holidays. We will do everything we can. Some of us are. 00:47:48.000 --> 00:47:51.000 Bye. 00:47:51.000 --> 00:47:53.000 Expect to be pretty available. 00:47:53.000 --> 00:47:56.000 Why, I usually ask for within 2 months. Will be nice. Some people are asking questions too early and then I forgot about it. 00:47:56.000 --> 00:48:06.000 They're asking me like so within 2 months is the best time. That we can still remember you. 00:48:06.000 --> 00:48:26.000 You contacted us. So we remember you when we review your proposal. Bye. Yes. 00:48:26.000 --> 00:48:27.000 All right, I think that's all I see. 00:48:27.000 --> 00:48:35.000 Yes. Yes. 00:48:35.000 --> 00:48:48.000 One more minute. Going once. So. 00:48:48.000 --> 00:48:47.000 Thank you all for your interest. 00:48:47.000 --> 00:48:57.000 Thank you. Thank you too. Okay, so thank you all for joining us. Let's, we are at 2 20 now. 00:48:57.000 --> 00:48:54.000 Thank you. 00:48:54.000 --> 00:49:06.000 So that's the time for our presentation. It can still email us if you any questions.