WEBVTT

00:01:16.000 --> 00:01:21.000
So are the attendees in.

00:01:21.000 --> 00:01:30.000
Yes. Yes, you can get started.

00:01:30.000 --> 00:01:38.000
Oh, welcome everyone to the webinar today on cyber training and Skype. Good afternoon. I'm Ashok Shrina.

00:01:38.000 --> 00:01:47.000
I run the fiber training panel along with my colleagues. Gen Lee, the cyber training panel along with my colleagues, Gen Lee, Shadmister Bak Chi Chen and, Sheikh Gafu.

00:01:47.000 --> 00:01:52.000
We will also have a presentation on the Skype program by my colleague Don Gulbransen.

00:01:52.000 --> 00:02:02.000
Our program has grown a lot since last year and we expect to get even more of you submitting proposals this year.

00:02:02.000 --> 00:02:23.000
So let me go to by discuss the cyber training program part of it first

00:02:23.000 --> 00:02:35.000
So, the webinar goals are to, first to orient the research community to the Rubai cyber training and Skype solicitations and summarize the program and review criteria.

00:02:35.000 --> 00:02:48.000
Then, we will, answer question. We hope that, these will improve your understanding of the solicitations and help better align your proposal with the program.

00:02:48.000 --> 00:02:55.000
So, we start the presentation with Ovi of fiber training program followed by Sky.

00:02:55.000 --> 00:03:02.000
We will highlight important aspects with the details left to the solicitation. We didn't take questions from the webinar participants.

00:03:02.000 --> 00:03:21.000
A recording of this webinar will be available on the program page. For the purpose of the solicitation, CI refers to advanced cyber infrastructure, which includes software, data, related methods and services for advanced computation, large-scale data handling, networking and security.

00:03:21.000 --> 00:03:34.000
To enable and transform science and engineering research. The target community is at various stages of their career pipelines comprise under Davage and Broadway students, researchers and educators as well as CI professionals.

00:03:34.000 --> 00:03:41.000
The cyber training as type program focus on 3 different sites big communities. Nope, first to see a contributors.

00:03:41.000 --> 00:03:50.000
They are computational and data scientists typically who research and develop new Ca capabilities, new approaches and new methods.

00:03:50.000 --> 00:03:54.000
See, I users.

00:03:54.000 --> 00:04:02.000
A domain scientists typically, a domain scientists are engineers who want to effectively exploit advanced CI capabilities and methods for that research.

00:04:02.000 --> 00:04:15.000
Finally, CI professionals constitute the community of research, CI and professional staff who deploy, manage and support the effective use of research.

00:04:15.000 --> 00:04:24.000
We don't discuss this. I am training solicitation and it's motivation. Under trying its motivation may help you align the proposal with a programs role.

00:04:24.000 --> 00:04:32.000
The cyber training program is motivated by the increasing role of advanced CI in a enabling science across a variety of domains.

00:04:32.000 --> 00:04:40.000
The research workforce would benefit from innovative training and curricular materials that are tailored for the target disciplines.

00:04:40.000 --> 00:04:51.000
There's also a need to foster broad adoption of existing CI resources and tools. And method by diverse research communities.

00:04:51.000 --> 00:04:55.000
Oh, is he has 7, program related to CI that may increase some overlapping goals.

00:04:55.000 --> 00:05:01.000
It doesn't somewhat idealized view that may enable you to choose the right program for your needs. Oh what?

00:05:01.000 --> 00:05:09.000
This is a simplified view and a solid station would provide more detail guidance. So please use this only as for a high level you.

00:05:09.000 --> 00:05:15.000
If you want to develop software or data repository then you may wish to look at the CSSI program.

00:05:15.000 --> 00:05:23.000
You'd produce a community sustained CI to enhance the CI ecosystem available for research or education.

00:05:23.000 --> 00:05:29.000
If you want to perform research that will enable future CI, you may want to look at the OEC code program.

00:05:29.000 --> 00:05:38.000
The deadline is past, but, if you want up, like, so next cycle, you would typically develop techniques and see a prototype that will yield the program knowledge.

00:05:38.000 --> 00:05:44.000
Needed for future production. Yeah. No, we come to the 2 Solid Stations, 11 to this webinar.

00:05:44.000 --> 00:05:51.000
If you want to deploy CI professionals and also foster their carriers, then the Skype program may suit you.

00:05:51.000 --> 00:06:03.000
Your CIP will support research that leverages CI and would establish carrier path for them. This they particularly benefit groups that are currently underserved with respect to the use of CI for research.

00:06:03.000 --> 00:06:09.000
If you want to provide training on CI for research purposes, then the cyber training program may interest you.

00:06:09.000 --> 00:06:17.000
You develop a scalable and sustainable training to help increase a research workforce that can leverage CI.

00:06:17.000 --> 00:06:21.000
Not that this is for a research workforce development rather than a general workforce and it should be for research and enabled by CI.

00:06:21.000 --> 00:06:28.000
And note that we have the CIA cyber training program targets all 3 communities training for all 3 communities including the cyber infrastructure professionals.

00:06:28.000 --> 00:06:41.000
The Skype program focus on deploying CIPs. Okay, so that's a distinguish factor that is are you providing training.

00:06:41.000 --> 00:06:42.000
The cyber training program is about providing training. So the text and highlighted in both phase are important.

00:06:42.000 --> 00:07:01.000
You have to provide training. It has be related to using CI for research purposes. So these are distinguishing factors of the CI of cyber training program.

00:07:01.000 --> 00:07:26.000
So cyber training programs. to prepare nurture and Google a national scientific research workforce for creating utilizing and supporting advanced cyber infrastructure work force by creating utilizing and supporting advanced cyber infrastructure to enable and potentially transform fundamental science and engineering research and contribute to the nation's and supporting advanced cyber infrastructure to enable and potentially transform fundamental science and engineering research and contribute to the nation's overall economic competitiveness and the project should aim to contribute to larger goal of

00:07:26.000 --> 00:07:34.000
an education ecosystem enabling computational and data driven signs for all scientists and engineers.

00:07:34.000 --> 00:07:39.000
This embrace is computation as a third below and data given signs are the fourth pillow of scientific discovery.

00:07:39.000 --> 00:07:55.000
In addition to the traditional first and second pillow of theory and experimentation. The specific consolidation goals are to ensure broad adoption of CI tools, methods and resources by the research community in order to catalyze major research advances.

00:07:55.000 --> 00:08:10.000
And to integrate core literacy and site discipline appropriate advanced skills in advanced CI as well as computational and data-driven science and engineering into the nation's educational curriculum and instructional fabric.

00:08:10.000 --> 00:08:14.000
But, in both undergraduate and graduate courses to add on fundamental research. We are personally 3, keen on broadening Ca access to groups that are coming.

00:08:14.000 --> 00:08:36.000
Under served in its use. Okay, so the broadening could be by a variety of. Criteria it could be by institution it could be by scientific community it could be by institution it could be by scientific community it could be by under receptor groups and so on.

00:08:36.000 --> 00:08:44.000
The cyber training program is led by the Office of Advanced Siber Infrastructure in the directive for computing and information science.

00:08:44.000 --> 00:09:02.000
However, it includes participation across the national science foundation from all the other 3 divisions in size, the education division, the geosciences division, the geosciences directory, the NPS directory, the geosciences directory, the NPS direct rate, SBI direct rate and so on the direct rate, SBI direct rate and so on.

00:09:02.000 --> 00:09:06.000
The direct rates and divisions have specific programmatic areas of interest that are described in the solicitation.

00:09:06.000 --> 00:09:16.000
So, let me highlight that one in total cyber training program is to stimulate co-funding between OEC and one or more science or engineering domains or direct trades.

00:09:16.000 --> 00:09:34.000
So, Positive Pi is a strongly encouraged to contact the, program officers in OEC but also in the participating directory or divisions relevant to the proposals to a certain whether the focus and budget of the proposed activities are appropriate to the solidification.

00:09:34.000 --> 00:09:46.000
If you send me or the other PD a one page summary and I identify other divisions of interest, you will share it with the other division PDs and get back to you.

00:09:46.000 --> 00:09:54.000
So, we'll, now, have you 3 provisions of the current Solar Association. The 3, project classes.

00:09:54.000 --> 00:10:04.000
The pilot projects have total budget of up to 300,000 and it's a duration up to 2 years under exploratory activities that may lead to implementation projects.

00:10:04.000 --> 00:10:14.000
Implementation, and 8 or small, with total budgets up to 500,000 or medium with total budget up to 1 million dollar with duration up to 4 years.

00:10:14.000 --> 00:10:26.000
Implementation projects make CI training and educational activities are curricular and instructional materials broadly accessible to a significant portion of a community for one or more.

00:10:26.000 --> 00:10:36.000
Medium information projects also foster a community to catalyze the adoption of advanced Ca methods or to incorporate training resources and materials into the curriculum.

00:10:36.000 --> 00:10:50.000
All proposals should have well identified proposal elements that clearly address the solo situation specific review criteria listed here. In addition to addressing the standard NSF intellectual merit and broader impact.

00:10:50.000 --> 00:10:52.000
Review also be asked to address the following questions. That is, do you have a rationale for challenges?

00:10:52.000 --> 00:11:05.000
Identified for research workforce development? Proposal should address at least one of these 2, criteria.

00:11:05.000 --> 00:11:14.000
That is, the strength of the project, are you broaden your use of CI methods and resources by the research community?

00:11:14.000 --> 00:11:17.000
Or are you integrating CI skills into the institutional and disciplinary, and instructional fabric fabric.

00:11:17.000 --> 00:11:33.000
Okay. At least one of the criteria has be addressed strong proposals will address both these criteria. And we also expect you to coordinate with the access program as mentioned in the solves the patient.

00:11:33.000 --> 00:11:43.000
Small programs will also address a scalably and sustainability of the training program beyond the scope of the funding period.

00:11:43.000 --> 00:12:00.000
And we'll also, as a, as a evaluate based on the recurrent, evaluation plans and collective impact strategy, including evaluation plans and collective impact strategy, including, are you having some organizational backbone to support a collective impact strategy, including, are you having some organizational backbone to support a collective impact across many institutions, for instance?

00:12:00.000 --> 00:12:07.000
Right. And medium proposals in addition will also foster a collective impact across many institutions for instance. A collective impact across many institutions for instance. Right.

00:12:07.000 --> 00:12:13.000
And medium proposals in addition, we'll also foster a suitable community by

00:12:13.000 --> 00:12:29.000
So note that the access coordination, can be along 2 directions. You may actually share material and access to knowledge based or you and you may also share your expertise by that just ring through access.

00:12:29.000 --> 00:12:37.000
Sort of programmatic areas of interest are mentioned in the solicitation. The common theme is to provide the solicitation.

00:12:37.000 --> 00:12:47.000
The common theme is to provide discipline appropriate training on one on one or more topics, a common theme is to provide discipline, appropriate training on one or more topics or related training on one on one or more topics or related training on one on one or more topics or related training on one on one or more topics or relate to the CI for research purposes.

00:12:47.000 --> 00:12:51.000
Okay, so please see this solicitation for details each division will have their own priorities on. So please see this solicitation for details.

00:12:51.000 --> 00:12:53.000
Each division will have their own priorities on, what

00:12:53.000 --> 00:13:04.000
I also meant I want to mention that there's opportunity for you to use leverage resources provided by NSF supported the research provider for your in your training program.

00:13:04.000 --> 00:13:16.000
Okay, so the SPC is resources can be opting through an access allocation. High supercomputing resources can be out in through path and cloud computing resource can can be opted through cloud back.

00:13:16.000 --> 00:13:22.000
See the solicitation for further details.

00:13:22.000 --> 00:13:34.000
So, with this, I will, pass on, the podium to my colleague Tom Gull Branson who can talk about the Skype program.

00:13:34.000 --> 00:13:37.000
Before you pass on, should I start with the beginning slides again?

00:13:37.000 --> 00:13:39.000
We covered it.

00:13:39.000 --> 00:13:41.000
You cover that.

00:13:41.000 --> 00:13:45.000
Ashok, I think you have to stop sharing so that I can start.

00:13:45.000 --> 00:13:53.000
Yes, I stop sharing. Oh, sorry, I didn't. Okay.

00:13:53.000 --> 00:14:08.000
So, that will be the end of the cyber training. Section if you have questions please note them in the QA so that we can address them at the end of the whole handful of slides that I'm gonna put up here.

00:14:08.000 --> 00:14:14.000
We'll take all the questions back and forth. I think some of them might be common to both solicitations.

00:14:14.000 --> 00:14:17.000
So if I share.

00:14:17.000 --> 00:14:27.000
This screen you should see. Computing resource opportunities. That's the, the way that people can.

00:14:27.000 --> 00:14:28.000
Okay.

00:14:28.000 --> 00:14:38.000
Get at the advanced cyber infrastructure. That the access program provides at very easy quick levels with explore level and discovery level.

00:14:38.000 --> 00:14:46.000
This would be suitable for training and for letting people letting trainees get to the programs without very much.

00:14:46.000 --> 00:14:53.000
Burden of trying to get an allocation and then the larger accelerated maximize those are more formal.

00:14:53.000 --> 00:15:03.000
Larger deployments that will go through review process. So what I'd like to do is Switch gears now to the Sky program strengthening CI professionals ecosystem.

00:15:03.000 --> 00:15:09.000
And, as a show pointed out, for a moment, I'll reinforce it again and again here.

00:15:09.000 --> 00:15:31.000
The distinction, well there are some things in common between cyber training and Skype. The largest distinction is that when when a Skype program is is implemented is executed, the outcome will be that research has advanced, that people have been deployed to help research move ahead.

00:15:31.000 --> 00:15:38.000
Along the way, there might be some training materials that are by product. And they might even be added to the knowledge base that was mentioned before.

00:15:38.000 --> 00:15:46.000
But primarily it's about. Helping people become ready to, serve and making some connections to enable those.

00:15:46.000 --> 00:15:53.000
Service. Inagements to happen. And also the strengthening of the ecosystem.

00:15:53.000 --> 00:16:15.000
Skype looks for change to occur. Had institutional levels. Not only do we want some people to become further skilled or you know skilled in new ways that are different than what they had but we hope that the places where they work or that they work from.

00:16:15.000 --> 00:16:30.000
Are altered in a way that allows their service the CI professional to be recognized, to be seen as a position to be seen as a position that has a a sequence, a path, a career path.

00:16:30.000 --> 00:16:40.000
We very often hear, from folks who do phenomenal work, but when the soft money is over is a challenge to find the next one.

00:16:40.000 --> 00:16:53.000
And so we look forward to hearing proposals about how to make those career paths. Clearer to recruit people and clearer for institutions to hire 2 and to keep people.

00:16:53.000 --> 00:16:58.000
So that's what the Skype program is trying to do as, go to some of the motivating factors.

00:16:58.000 --> 00:17:08.000
Another major factor in this strengthening is that democratizing. Verb, right? We're trying to bring these methods to more types of science.

00:17:08.000 --> 00:17:19.000
We're trying to bring these methods to people who haven't perfected it or become. Excellent providers yet.

00:17:19.000 --> 00:17:32.000
So. Great proposals are seen as very, very good or excellent because more people are enabled to be involved with the CF system as contrasted to.

00:17:32.000 --> 00:17:40.000
Another proposal which might, recognize somewhere number of people who are great at what they're doing and this would give them money to do it more.

00:17:40.000 --> 00:17:50.000
That's really not broadening. That broadening impact is about furthering the, breadth of people are involved and ways that people can get involved.

00:17:50.000 --> 00:17:53.000
This CI part of this solicitation isn't just software it can be about data can be about networking to do the transport needed.

00:17:53.000 --> 00:18:06.000
So it is very inclusive in in the definition of what's available and to who whom can we.

00:18:06.000 --> 00:18:15.000
Make these services available or who can we make connections with? It can be to the computational scientists. Who very often have some of these, advanced skills, but other times maybe they need some optimization.

00:18:15.000 --> 00:18:29.000
So it's a connection to other skills. That might not even be in the same institution. In fact, it's that crossover that Skype.

00:18:29.000 --> 00:18:39.000
Looks for, when you read through the PI. Expectations and the domain expertise that's called for.

00:18:39.000 --> 00:18:46.000
Proposals are expected to have a PI in the cyber infrastructure and a PI from a domain or specific discipline.

00:18:46.000 --> 00:18:54.000
Why? Because that's that connectivity that we're trying to see done in new ways to new places.

00:18:54.000 --> 00:18:56.000
In fact, the whole access program is dedicated to that same kind of wreaking across to new disciplines.

00:18:56.000 --> 00:19:08.000
So a Skype awardee that does it well. Could perhaps in some cases teach access program how to serve.

00:19:08.000 --> 00:19:15.000
Whether it's social behavior, sciences, economics, whoever, whatever researchers aren't quite yet taking full advantage of these systems.

00:19:15.000 --> 00:19:45.000
Proposal could conceivably help access to a See new ways to provide these services to more communities. So it's the interfaces and the interdependencies that we're looking for, need ideas on how to do it.

00:20:51.000 --> 00:20:59.000
And then institutional recognition, we'll keep trying to underscore that. The next is about the participation.

00:20:59.000 --> 00:21:08.000
Those other domains that we wanna connect with have be driven by a science need. Particularly engineering, geo-education.

00:21:08.000 --> 00:21:15.000
Myth physical sciences. Social behavior and economics and then the tip program has joined us this year.

00:21:15.000 --> 00:21:24.000
Where there's even more, broad. Array of opportunities to provide convergent. Connections.

00:21:24.000 --> 00:21:35.000
So you're welcome to talk to any of the program officers myself or others in the OEC office, but we also want you to talk to people in the directorate specifically so that we can make that.

00:21:35.000 --> 00:21:44.000
Per position that would help those domains not just make CI for the secrecy of needs CI.

00:21:44.000 --> 00:21:53.000
15 million dollars is what we have. Earmarked for this. It's not guaranteed, but that's the scale of what we hope to make available in awards this year.

00:21:53.000 --> 00:22:01.000
So it would be on the order of 4 awards, maybe less, maybe more depending on how much people can get done with available monies.

00:22:01.000 --> 00:22:08.000
From a numbers point of view, we don't have a specific salary range for a CIP person.

00:22:08.000 --> 00:22:16.000
That you can multiply by 4 and get the annual budget. We understand that there's differences in. Where this work will happen.

00:22:16.000 --> 00:22:23.000
And we also acknowledge that it's the budget isn't just to support the salaries or stipends to students who are doing this.

00:22:23.000 --> 00:22:32.000
It would also Your budget is allowed to include. Leadership and management and communications and travel and other things to make it happen.

00:22:32.000 --> 00:22:39.000
And 4 is full time equivalent. That doesn't mean 4. So security numbers. It can be 8 people.

00:22:39.000 --> 00:22:42.000
It can be, it can be a share of whatever you want, but that's the scale that we're looking for in the way of treaties on an annual basis.

00:22:42.000 --> 00:22:53.000
You've mentioned that director's already. Who are these CIP people who are these professionals?

00:22:53.000 --> 00:22:59.000
It can be a across the range. As long as we make the connection, you see as long as you make.

00:22:59.000 --> 00:23:09.000
A the connection to the domains or disciplines that you're serving. And so, diversity is an aspect of broadening that we do look forward to.

00:23:09.000 --> 00:23:22.000
We'll go into the details of that. Let me just do it. The access program is this connector facilitator enabler community of 5 different very large awards that are trying to find researchers with needs.

00:23:22.000 --> 00:23:30.000
Find professionals that can help them, bring them together, get an allocation, get on board, do monitoring up the performance to see how the software are running.

00:23:30.000 --> 00:23:36.000
So there's a wonderful community. But it's really driven by the middle layer. It's the research needs.

00:23:36.000 --> 00:23:40.000
That we're trying to. Take care of. So you have.

00:23:40.000 --> 00:23:47.000
People at the top who are ready or will be made ready. As groups, as individuals, however you see fit.

00:23:47.000 --> 00:23:55.000
For one institution, maybe they could hop to a different institution. And there are many different programs in OEC that do this.

00:23:55.000 --> 00:24:06.000
So we're training you've heard about. There are networks that we have cyber teams. And then as you mentioned, as Scott mentioned you before, Card Bank and other systems are available.

00:24:06.000 --> 00:24:14.000
And then we wanna see Skype. Providing the connectivity and new ways of doing that. That's what we're looking for.

00:24:14.000 --> 00:24:20.000
And when it's done, We hope that the people who do this so well when the project is over.

00:24:20.000 --> 00:24:27.000
But there's a following forward a continuance and institutional commitment to make it happen in the future without necessarily being funded by.

00:24:27.000 --> 00:24:32.000
This program. So there was a question already raised and I want to try to do it verbally here.

00:24:32.000 --> 00:24:45.000
What does it mean to work with the access program? How do we collaborate? The best way to get the answer to that question is to go to this link to access program has a Skype link dedicated to show some of the examples of what.

00:24:45.000 --> 00:25:05.000
Services to access would mean. It can sound like helping the knowledge base to grow. Connecting with that content support network to actually go to a mentor mentee relationship to go serve a researcher with needs and there's testing available and there's other, outreach.

00:25:05.000 --> 00:25:13.000
It is not limited to those. Those are the obvious and sort of. Available right now. The access program launched in September of 20.

00:25:13.000 --> 00:25:19.000
2, so it's well into its second year. But there's evolution going on there. So if you have a new idea.

00:25:19.000 --> 00:25:25.000
Yeah, let's talk about that because we can evolve it if we can find a new way to make it work.

00:25:25.000 --> 00:25:32.000
So let's go to questions I don't know how to, I don't see them from my current mode, but.

00:25:32.000 --> 00:25:32.000
Okay.

00:25:32.000 --> 00:25:42.000
Certainly you're welcome to call over to myself, email otherwise, and, Please do remember you check with the directory to make those connection.

00:25:42.000 --> 00:25:48.000
Great. Thank you. Thank you. Schultz and Tom.

00:25:48.000 --> 00:25:56.000
Great presentations. You might still want to leave the slides on maybe the with the slides of the contact information.

00:25:56.000 --> 00:26:03.000
Yes. Hello, one of you, can you leave a slice of the contact information?

00:26:03.000 --> 00:26:11.000
Yes, and then let's get to the questions and answer. The first question we have.

00:26:11.000 --> 00:26:29.000
Here it's the difference between the Small and medium proposal, the expectation, the difference between like expectation of small and medium proposals for cyber training.

00:26:29.000 --> 00:26:28.000
Yes, please, a sure, yes.

00:26:28.000 --> 00:26:42.000
So do you want me to answer that? Okay, so the, important distinction between the small and the medium is the last criteria that is the foster in the community, right?

00:26:42.000 --> 00:26:57.000
So in both of the, you'll have scalability and collective impact. But in the foster in the community, you will actually take active steps to broaden the community who are actually involved in that type of.

00:26:57.000 --> 00:27:05.000
Training and research, you know, so that is the primary distinction, the last revenue criteria are fostering the community.

00:27:05.000 --> 00:27:09.000
That's the primary distinction.

00:27:09.000 --> 00:27:13.000
And much larger than scale. Of course.

00:27:13.000 --> 00:27:12.000
Okay.

00:27:12.000 --> 00:27:32.000
Okay, the next question is this attendee is saying in our review of funded projects we see very little mention of facilitation and facilitator training Do you see facilitator training of students applicable to the cyber training call?

00:27:32.000 --> 00:27:36.000
You want to say take the question?

00:27:36.000 --> 00:27:45.000
Oh, okay, right now we don't have a fairly facilitated training. Actually the several trainings are supposed to be for researchers.

00:27:45.000 --> 00:27:50.000
That's one thing we want to emphasize the difference between the cyber training and EDU programs or training.

00:27:50.000 --> 00:28:10.000
So, with the cyber training, it's for feature or current researchers. So train them to use the high performance computing to use a separate infrastructure to use anything you created for separate infrastructure that's our target audience of the training.

00:28:10.000 --> 00:28:18.000
No, thank you. This another question. Yes, yes.

00:28:18.000 --> 00:28:12.000
The Kobe go to CIP, yes.

00:28:12.000 --> 00:28:24.000
If I could add to that. With regard to the facilitator. Training. There have been awards which you can find from past.

00:28:24.000 --> 00:28:36.000
Award search is at NSF. There have been awards in Skype. Which included Some Skype trainees dedicated to a facilitation role.

00:28:36.000 --> 00:28:39.000
So it is. Conceivable that form of interaction is pertinent. It might not be the only thing done, but it is.

00:28:39.000 --> 00:28:53.000
Sort of in play, if you will. It can be part of a mix that enables you to achieve the objectives of the Skype.

00:28:53.000 --> 00:28:54.000
So station.

00:28:54.000 --> 00:29:03.000
Right, so this reminding me another question on the Skype of a violent interaction with us. So I know you answer it.

00:29:03.000 --> 00:29:12.000
In the online and selling can you also use it all in a The video? I the question?

00:29:12.000 --> 00:29:13.000
The interface between the SS and Skype. Yes.

00:29:13.000 --> 00:29:23.000
Yeah. You're right. The, access program home page is accessed. Dash CI.

00:29:23.000 --> 00:29:33.000
Dot org. If you add a Skype. To that address. They actually now have a web page.

00:29:33.000 --> 00:29:41.000
That is a live set of links to a multiple ways that people who are CI professionals. Can collaborate or can participate with.

00:29:41.000 --> 00:29:48.000
Access program. And I didn't note before, but let me do it now. So what there are different ways to interact.

00:29:48.000 --> 00:29:59.000
The Stacks as team has tools and has online presence. Sometimes it needs to be tested. Oh, that's an interaction that would be very helpful.

00:29:59.000 --> 00:30:04.000
Sometimes there's knowledge-based content. Ask CI is a platform that you use quite a bit.

00:30:04.000 --> 00:30:17.000
Answering and building the CI content is another helpful contribution. But, I didn't mention because I skipped them unfortunately was that the solicitation calls for 20%.

00:30:17.000 --> 00:30:25.000
At least, 20%. Of the Skype trainees time is to be dedicated to this.

00:30:25.000 --> 00:30:36.000
Collaboration with access. Well, 20% of what? The first week, 20% of the first month, there's clearly an expectation that for a while The teams awarded will take some time to figure out what's going on.

00:30:36.000 --> 00:30:42.000
So You can think of that 20% as kinda like a, you know, a rolling. Average if you will.

00:30:42.000 --> 00:30:51.000
And also the access program is. Open to figuring out how to best to connect. So.

00:30:51.000 --> 00:31:03.000
You can, look forward to talking with Dr. Shelley Kinuth. Alana, and others on the support team who are, making these connections with you.

00:31:03.000 --> 00:31:08.000
Okay, I'll Tom while you're on there are a couple more questions on Skype.

00:31:08.000 --> 00:31:18.000
So one is Oh will there be additional funding available from related to Skype proposals within Epsore jurisdictions.

00:31:18.000 --> 00:31:30.000
That's a heads up question. It's, was not included. Explicitly in the Skype solicitation wording.

00:31:30.000 --> 00:31:44.000
But that doesn't preclude us from benefiting. From this investments available towards app score goal. So somewhat of a securitous answer.

00:31:44.000 --> 00:32:02.000
Yes, if you see. Apps opportunities to help app score targeted. Constituents or stakeholders. Let's talk to that office and let's see because perhaps there's co-funding which would augment or supplement.

00:32:02.000 --> 00:32:02.000
The monies that we have initially earmarked for this program, which would be wonderful for all involved.

00:32:02.000 --> 00:32:09.000
Thank you for the idea.

00:32:09.000 --> 00:32:21.000
Oh good, the other one is canon FTE in Skype. Award be split across multiple institutions or is the expectation that an institute wholly employ that person?

00:32:21.000 --> 00:32:25.000
Yeah, thanks. Good question. And it lets me cover yet another area that I probably could have spent more time on.

00:32:25.000 --> 00:32:40.000
There is a. There are 6 criteria. Called out in the solicitation that people ought to write their project descriptions towards.

00:32:40.000 --> 00:32:50.000
But they're broadening overall. Recognizing challenges to this strengthening the system. Recruiting and evaluation.

00:32:50.000 --> 00:32:54.000
Where are you gonna find folks? How are you gonna find people and how you're gonna know that's working well?

00:32:54.000 --> 00:33:04.000
And the last one is collective impact. So the collective impact part. Is it would be interpreted as you see fit doesn't have to be to the actual.

00:33:04.000 --> 00:33:14.000
Citation listed, but the concept is make a difference institutionally. And making a difference in multiple institutions.

00:33:14.000 --> 00:33:17.000
Is a good thing too, right? FTs don't have to be one person.

00:33:17.000 --> 00:33:30.000
FDEs can be spread and split as you see. So. Yes, you're, option of dividing the.

00:33:30.000 --> 00:33:41.000
Full time equivalence across institutions is. Consistent with, the principles or the construct. Go for it.

00:33:41.000 --> 00:33:48.000
Yeah, next question is. Absolutely, related to bio division. So there are 2 questions.

00:33:48.000 --> 00:33:56.000
Yeah, one is for the cyber training program. In particular with regard to broadening use of CI resources.

00:33:56.000 --> 00:34:05.000
What the questioner is asking, would I be able to include a CI resource from a directorate that was not listed on your slide.

00:34:05.000 --> 00:34:13.000
Eg division of biological infrastructure. And. The are really there's a related question also so

00:34:13.000 --> 00:34:17.000
Okay.

00:34:17.000 --> 00:34:23.000
So the another person is commenting do not see bio in division. So is that executed. So Jen.

00:34:23.000 --> 00:34:26.000
You want to respond?

00:34:26.000 --> 00:34:43.000
Okay, for the ones the bios not included so it just means that you we might not be able to co-funded that but if it's by out it's important cyber training for by all researchers, we might still fund it.

00:34:43.000 --> 00:34:43.000
Oh, so,

00:34:43.000 --> 00:34:44.000
Okay.

00:34:44.000 --> 00:34:48.000
That's for cyber training, yes. A shot, yes.

00:34:48.000 --> 00:35:05.000
Yeah, that's so let me add. So the first question had. I'm not sure how to interpret it because of saying can I use bio include CI resources from the direct rate right so if you're saying you're introducing a resource provided by some direct rate right so if you're saying you're introducing a resource provided by some directory to provide training you're a resource provided by some directory to provide training you know you're welcome to use any kind

00:35:05.000 --> 00:35:06.000
Yes.

00:35:06.000 --> 00:35:17.000
of And, or, if you mean that, should I be targeting this particular division if that division is not, should I be targeting this particular division if that division is not, included.

00:35:17.000 --> 00:35:39.000
In this particular division, if that division is not, included, you know, typically what we do is, we would get co-funding from divisions that division is not, included, you know, typically what we do is, we would get co-funding from divisions is not, included.

00:35:39.000 --> 00:36:08.000
You know, typically what we do is, we would get co-funding from divisions that, you are targeting and, the division we are included in the solicitation are ones that have actually expressed interest in participating. So typically divisions, that are not participating have their own programs, right?

00:36:08.000 --> 00:36:01.000
Yeah.

00:36:01.000 --> 00:36:05.000
So the Solidarization mentions prospect that is the clarification. Yeah.

00:36:05.000 --> 00:36:12.000
Yes. Right Tom, for Skype, how about for Skype? We are 2 programs. Yes.

00:36:12.000 --> 00:36:11.000
Yes.

00:36:11.000 --> 00:36:18.000
I fully support the way I show up described it. We don't preclude. Work in those areas.

00:36:18.000 --> 00:36:30.000
But it is fair to note that when the office of the mass lab infrastructure developed the solicitation we invited all the directorates to join some weren't interested.

00:36:30.000 --> 00:36:38.000
Some might not have joined because they had their own programs and I won't be able to remember off top of my head but I'm sure that I saw something in the last month of a doctorate that actually had a cyber training oriented program launched or was announced to be launched.

00:36:38.000 --> 00:36:53.000
So sometimes you might do well to look at the Directory that we're not listed and make sure that they don't have something on the ready. We don't know them all.

00:36:53.000 --> 00:37:05.000
We, will try to help you refer across as well, but. You can serve them through us. Just won't be co-funded.

00:37:05.000 --> 00:37:17.000
Okay, I see. A couple of questions on cyber training. So one is what would constitute an ideal pilot focus and affiliated success criteria?

00:37:17.000 --> 00:37:29.000
Would it be appropriate to have already created some basic curriculum? And pilot it out in an institution then roll it out to a wider community.

00:37:29.000 --> 00:37:39.000
Okay, so. So our exportation for the pilot is that to use the opportunity to create the collect curriculum and then try it out.

00:37:39.000 --> 00:37:47.000
If you have a done that already, then you might want to apply for implementation, which is to have you scaling up.

00:37:47.000 --> 00:37:58.000
And in terms of the first question we have, this question has many questions. For the first one in terms of the, what we're looking for, you look at the first one in terms of the, what we're looking for, a look at the solid station.

00:37:58.000 --> 00:38:01.000
We have a list of the criteria. We have a list of the criteria. We have a 6 or 7 of them.

00:38:01.000 --> 00:38:07.000
A sure has that slides, we have a list of the criteria. We have a list of the criteria. We have a 6 or 7 of them.

00:38:07.000 --> 00:38:12.000
A sure has that slides. You wanna go back to the slides. But the number one, it's the most important to me, it's that we' That's the number one.

00:38:12.000 --> 00:38:19.000
That's why it's the number one in the list. Right, we have a slide on that.

00:38:19.000 --> 00:38:16.000
Okay.

00:38:16.000 --> 00:38:26.000
How do we evaluate? Bye. So we can move back to last slides. I, who's showing the slides?

00:38:26.000 --> 00:38:26.000
Right now, it's Tom or

00:38:26.000 --> 00:38:29.000
I haven't here, but I don't know which slide you wanna go to.

00:38:29.000 --> 00:38:31.000
On the, cyber training.

00:38:31.000 --> 00:38:34.000
The revenue criteria for, cyber training.

00:38:34.000 --> 00:38:34.000
Why?

00:38:34.000 --> 00:38:36.000
Let me see if I can hop over to.

00:38:36.000 --> 00:38:40.000
The list of pilot.

00:38:40.000 --> 00:38:45.000
No, I for the pilot we have a

00:38:45.000 --> 00:38:47.000
Yeah, that one. Yeah.

00:38:47.000 --> 00:38:43.000
Let me see.

00:38:43.000 --> 00:38:54.000
The first. 5. Yes, that, like, for, the first 2, a number of small, first 5 and then for the medium for 6.

00:38:54.000 --> 00:38:57.000
Yes.

00:38:57.000 --> 00:38:57.000
Good.

00:38:57.000 --> 00:39:15.000
Okay, so yeah, one additional question is is training undergraduate and graduate with developing curriculum materials for preparing them to be future CI within the program scope of sub-training.

00:39:15.000 --> 00:39:12.000
Yeah.

00:39:12.000 --> 00:39:18.000
You probably meant, CI professionals, right? So that is what you meant. Yes, training Ca professional is very much a topic of interest to us.

00:39:18.000 --> 00:39:31.000
Yes.

00:39:31.000 --> 00:39:25.000
Yeah.

00:39:25.000 --> 00:39:47.000
And I think the following question says. How does that question apply to Skype? With regard to Scott, there could certainly be occasions where curriculum materials and content to help train some SAID professionals might be made available to others and recycled.

00:39:47.000 --> 00:39:53.000
That's a wonderful thing. It's a it's a side of benefit. It's a secondary benefit, but is certainly.

00:39:53.000 --> 00:40:05.000
Something that we'd like to see and it allows for that scalability, which is an important consideration to make when you're doing this we Love the idea of 4 FTDs joining the world but Seeing that success be able to multiply would be.

00:40:05.000 --> 00:40:17.000
Valued highly.

00:40:17.000 --> 00:40:30.000
I think that's all the questions. I can see we have. Any more questions?

00:40:30.000 --> 00:40:40.000
Thanks for attending the webinar then. Yeah. And please feel free to email us. If you have any further.

00:40:40.000 --> 00:40:55.000
Right, do we have a slides about the this is the criteria for reviewing a server training? Do we have a slides for review or Skype?

00:40:55.000 --> 00:40:58.000
The criteria for.

00:40:58.000 --> 00:41:10.000
The Skype criteria and instructions for the proposal writing are more than can fit onto a slide and I would Direct folks back to the because it is fairly detailed.

00:41:10.000 --> 00:41:15.000
Maybe it's. Extra detailed and let's best to go there and then to try to.

00:41:15.000 --> 00:41:20.000
Okay.

00:41:20.000 --> 00:41:15.000
Bye.

00:41:15.000 --> 00:41:23.000
Stuff in a couple of bullets. I Chuck, is there a slide from your deck that you wanted to present?

00:41:23.000 --> 00:41:28.000
No, I don't have anything further.

00:41:28.000 --> 00:41:36.000
One thing I'll show coming if you we sometimes noted that the independent evaluator issue was not. The early covered.

00:41:36.000 --> 00:41:39.000
Do you wanna just mention that?

00:41:39.000 --> 00:41:46.000
Sure. So, we need an independent evaluator, the independent evaluator. May not necessarily be an external evaluator.

00:41:46.000 --> 00:41:54.000
That that is the person could be an independent evaluator from your institution, right? So that is also possible, but it has to be independent.

00:41:54.000 --> 00:42:00.000
They cannot be part of the team. That is actually providing the training or creating the training material.

00:42:00.000 --> 00:42:08.000
No, and also usually no good. In the same department, you know, your friend, someone outside of your college, will be great.

00:42:08.000 --> 00:42:15.000
Bye. The same university is okay, but probably not the same department. Bye.

00:42:15.000 --> 00:42:21.000
And before people go, I would offer another question that we have received in the past. Didn't come up yet today, but I bet you it will before the.

00:42:21.000 --> 00:42:29.000
Due date and that pertains to the section for eligibility information. Who may serve as a PI?

00:42:29.000 --> 00:42:37.000
A limit on the number of proposals for organization and that is one Skype proposal per organization. But let's be clear.

00:42:37.000 --> 00:42:49.000
That pertains to the to the lead organization or the lead institution, the prime institution. If it institution appears in another proposal.

00:42:49.000 --> 00:42:59.000
As a sub awardee. That second appearance. Is allowed. It's just that we can only handle one lead.

00:42:59.000 --> 00:43:03.000
Recipient, to be given an award to that. We can't see 2 of those.

00:43:03.000 --> 00:43:13.000
If the second one comes in, it will be return without review. And, the same applies to Pi's and Koi's there to appear.

00:43:13.000 --> 00:43:26.000
Any given PI can only be a PI in one. Proposal per cycle. And any KPI can only be a proposal per cycle.

00:43:26.000 --> 00:43:38.000
If those same names show up as a letter of collaboration. Or as key personnel. Those secondary appearances are allowable

00:43:38.000 --> 00:43:55.000
Tom, could you, give a little bit more clarification on the. So, as you mentioned, if they, if they are submitting a, if that a, if they are submitting a, if they're a lead institution, they're a lead institution, they account, if they get a, if they're a lead institution, they're a lead institution, they

00:43:55.000 --> 00:43:54.000
Right.

00:43:54.000 --> 00:43:58.000
account, if they get a sub award, they don't count. But sometimes they get a suburb what they don't count.

00:43:58.000 --> 00:44:00.000
But sometimes they can also have a collaborative proposal in which you are not the lead

00:44:00.000 --> 00:44:04.000
As I understand it. There is still a lead or a prime in the collaborative proposal submittal scenario.

00:44:04.000 --> 00:44:17.000
The collaborative proposal submittal scenario. So the collaborating institutions. Behind that one or underneath that one.

00:44:17.000 --> 00:44:25.000
They structurally appear as collaborators. And, if you will. Little awards, but they are not.

00:44:25.000 --> 00:44:36.000
Counted as the prime so they could conceivably show up. As a collaborator on another proposal or as a a prime on another proposal.

00:44:36.000 --> 00:44:43.000
Might be tough to get out of your program office twice, but that's for you all to figure out.

00:44:43.000 --> 00:44:42.000
Thanks, Tom.

00:44:42.000 --> 00:44:54.000
. Great. No, so for Skype, something I really would like to emphasize is that you need to contact program directors before you submit, program directors before you submit because this is a large project.

00:44:54.000 --> 00:44:59.000
You need to write, that you need to contact program directors before you submit, program directors before you submit because this is a large project.

00:44:59.000 --> 00:45:11.000
You need to write a one page summary, contact Tom, Tom, you have an email address somewhere, contact Tom, Tom, you have an email address somewhere, so please let Tom know you want to submit and, contact Tom, Tom, you have an email address somewhere, because this is a large project.

00:45:11.000 --> 00:45:15.000
You need to write a one-page summary, contact Tom, Tom, you have an email address somewhere along

00:45:15.000 --> 00:45:22.000
Yeah, we those comments and feedback will not be thumbs up thumbs down. There was nothing about, oh, that's a great idea.

00:45:22.000 --> 00:45:22.000
Bye.

00:45:22.000 --> 00:45:29.000
Just we allowed to ensure that you understand the solicitation and that. Anything that's unclear is made clear.

00:45:29.000 --> 00:45:35.000
And that you're compliant with the the allowables.

00:45:35.000 --> 00:45:33.000
Oh, good with you.

00:45:33.000 --> 00:45:39.000
Bye. But yes, and for several training, yeah, yes, you want to go about this.

00:45:39.000 --> 00:45:49.000
So, the question was Shadmister, you clarify about, what we mean by domain specific training and cyber training.

00:45:49.000 --> 00:45:57.000
Yeah, what, I think, comes up a lot of time in the, you know, in the reviews and in discussions is.

00:45:57.000 --> 00:46:20.000
That if you're coming from a specific domain let's say in geological sciences or material sciences or whatever the justifying the need for cyber training in the domain the rationale that that you are using that means giving us evidence of the Contest that your innovation is a true innovation.

00:46:20.000 --> 00:46:30.000
That you're offering to do something very new. Oh in that domain so that really really helps the reviewers.

00:46:30.000 --> 00:46:42.000
To get a context of the literature. Oh, of what has been done. So we get a clear understanding of where your contribution, scientific contribution, will be fitting in.

00:46:42.000 --> 00:46:46.000
So that's what I meant.

00:46:46.000 --> 00:46:52.000
Thanks.

00:46:52.000 --> 00:46:56.000
Okay.

00:46:56.000 --> 00:47:06.000
So again, the deadline January eighteenth, you're all welcome to submit. I think we can stay here a couple more minutes to answer questions.

00:47:06.000 --> 00:47:12.000
And.

00:47:12.000 --> 00:47:20.000
If you have any questions, we're here. Otherwise we can. Finish, we can finish earlier.

00:47:20.000 --> 00:47:20.000
Yes.

00:47:20.000 --> 00:47:24.000
And the recording and the slides will dangle off for the same.

00:47:24.000 --> 00:47:31.000
Yes, within a week, the recording and slice, yes.

00:47:31.000 --> 00:47:37.000
The solicitation calls for. Contact with the program officers, at least a month in advance.

00:47:37.000 --> 00:47:45.000
But we answered the phone. Beyond that point, it just would probably help you to get the feedback sooner.

00:47:45.000 --> 00:47:48.000
Given the holidays. We will do everything we can. Some of us are.

00:47:48.000 --> 00:47:51.000
Bye.

00:47:51.000 --> 00:47:53.000
Expect to be pretty available.

00:47:53.000 --> 00:47:56.000
Why, I usually ask for within 2 months. Will be nice. Some people are asking questions too early and then I forgot about it.

00:47:56.000 --> 00:48:06.000
They're asking me like so within 2 months is the best time. That we can still remember you.

00:48:06.000 --> 00:48:26.000
You contacted us. So we remember you when we review your proposal. Bye. Yes.

00:48:26.000 --> 00:48:27.000
All right, I think that's all I see.

00:48:27.000 --> 00:48:35.000
Yes. Yes.

00:48:35.000 --> 00:48:48.000
One more minute. Going once. So.

00:48:48.000 --> 00:48:47.000
Thank you all for your interest.

00:48:47.000 --> 00:48:57.000
Thank you. Thank you too. Okay, so thank you all for joining us. Let's, we are at 2 20 now.

00:48:57.000 --> 00:48:54.000
Thank you.

00:48:54.000 --> 00:49:06.000
So that's the time for our presentation. It can still email us if you any questions.

