WEBVTT 1 00:02:59.460 --> 00:03:03.120 Stefan Robila: Hello, thank you for joining us for today's webinar, we will start in few minutes 2 00:04:26.400 --> 00:04:28.200 Amy Walton: Very good, thank you. Stefan. 3 00:04:29.370 --> 00:04:39.630 Amy Walton: Good afternoon, everyone, and thank you for joining us. I am Amy Walton, and I am here with my colleagues from the office at it and cyber infrastructure, you just heard from Stefan robiola 4 00:04:40.290 --> 00:04:51.150 Amy Walton: Alan Sussman to fit co star and Rob Beverly are also from the Office of advanced cyber infrastructure, but I also noticed that many of our colleagues from around the foundation, such as 5 00:04:51.750 --> 00:04:58.950 Amy Walton: Darrell has Nigel sharp Joe culbertson and Joe Whitmire also joining us and we'll be part of for 6 00:04:59.370 --> 00:05:14.400 Amy Walton: A of this activity for the Q AMP. A that will have later in the session. So welcome, everyone. And in this webinar we're going to provide a brief overview of the CSI program. I'll do the first few charts on that and then 7 00:05:15.540 --> 00:05:23.910 Amy Walton: Stefan will be mentioning some of the most important things that you need to know about submitting a proposal. So if we may move to the next chart. 8 00:05:25.980 --> 00:05:33.180 Amy Walton: What you will see now is the again the purpose of this webinar today is to 9 00:05:34.890 --> 00:05:44.910 Amy Walton: orient the research community to this solicitation. To summarize the changes to the program and the review criteria to answer any questions that you may have. 10 00:05:45.360 --> 00:05:56.130 Amy Walton: And our goal is to help you improve your understanding of this program. And if it's appropriate. If you decide to participate to help you improve the quality of the proposals so 11 00:05:57.420 --> 00:06:03.630 Amy Walton: The last three bullets are the outline of the activity activities will discuss today. 12 00:06:04.170 --> 00:06:16.020 Amy Walton: First, for the first nine slides, I'll be doing an overview of the CSI program how it's changed. And what we focus upon then the majority of the slides. Stefan will speak to 13 00:06:16.830 --> 00:06:31.800 Amy Walton: It will be an overview of this year solicitation NSF 20 dash 9592. And then the second half of this hour long webinar we plan to take questions from all of you. The webinar participants. Now in this 14 00:06:32.370 --> 00:06:42.690 Amy Walton: zooms session. There's a couple of ways to to have questions. One is through the chat function, but there is a q&a function. And we might suggest that 15 00:06:44.250 --> 00:06:56.370 Amy Walton: Many of your questions are likely to be answered as we go through these these slides. So you might want to wait with questions. But if there's something that really was confusing to you. Certainly, feel free to 16 00:06:59.280 --> 00:07:09.000 Amy Walton: Put your questions on the Q AMP a feature in zoom. We'd also like to let you know that the recording of this webinar will be available on the program page of our 17 00:07:12.090 --> 00:07:16.170 Amy Walton: Key CSI program. So let's go to the next slide. 18 00:07:19.980 --> 00:07:24.540 Amy Walton: What I'm going to do now is to begin by talking about the CSI program. 19 00:07:25.470 --> 00:07:34.800 Amy Walton: Cyber Infrastructure for sustained scientific innovation focuses on supporting robust reliable and sustainable data and software cyber infrastructure. 20 00:07:35.460 --> 00:07:40.230 Amy Walton: That will support an advance sustained scientific innovation and discovery. 21 00:07:41.130 --> 00:07:58.590 Amy Walton: So bottom line, the proposals are strongly encouraged to describe their approach to data management and to quality software development through a defined software engineering process that includes software testing and the appropriate use and analysis of tools and capabilities. 22 00:08:00.210 --> 00:08:02.040 Amy Walton: Let's go ahead and move to the next slide. 23 00:08:03.540 --> 00:08:09.150 Amy Walton: What I'd like to do here is to talk briefly about the changes from prior solicitations 24 00:08:10.680 --> 00:08:19.350 Amy Walton: That here, first and foremost, you'll see that the program description has been updated to emphasize that this solicitation welcomes 25 00:08:19.770 --> 00:08:33.150 Amy Walton: To have the potential types of proposals elements and framework implementations. A second change is that general consideration a general consideration section has been added. 26 00:08:33.750 --> 00:08:47.700 Amy Walton: To help clarify what are the common characteristics of these CSI proposals and projects. What, what kinds of things are we looking for across the various disciplines. A third thing is that the CSI guiding principles. 27 00:08:49.710 --> 00:09:05.670 Amy Walton: Translate almost one for one into solicitation specific criteria, but in this year, what we've done is to group them into three seems to help you address them as well as to aid in the review process. 28 00:09:06.750 --> 00:09:16.380 Amy Walton: So the proposal preparation instructions and the nurse review principles and criteria have been revised to reflect these these changes and these these groupings. 29 00:09:17.760 --> 00:09:25.530 Amy Walton: Next, the section summarizing priorities for the collaborative NSF directorates and divisions has been updated for 2021 so 30 00:09:25.980 --> 00:09:36.480 Amy Walton: areas of emphasis in prior years maybe the same, but they also many of them have changed as well. So this is something that you'll need to be sure and and and and look at those those 31 00:09:37.560 --> 00:09:47.460 Amy Walton: Updates, and then finally if proposals. This is new. If proposals include requests for cloud computing resources through 32 00:09:49.590 --> 00:09:59.460 Amy Walton: Cloud bank. The details of how this be addressed in the proposals had been added to the solicitation and Stefan will speak about that a little bit, the end of his, his 33 00:10:00.720 --> 00:10:10.200 Amy Walton: So moving to the next slide, again, to reiterate, there are two types of awards that we will be seeking in this solicitation. 34 00:10:11.670 --> 00:10:24.600 Amy Walton: That elements projects basically support small groups that will develop and deploy robust software and data capabilities for which there's a demonstrated need and that will advance one or more significant areas of science and engineering. 35 00:10:25.860 --> 00:10:36.090 Amy Walton: The secondary is framework implementations. These are targeting larger interdisciplinary teams that are organized around the development and application of common software. 36 00:10:36.480 --> 00:10:52.110 Amy Walton: And data infrastructure that would be aimed at solving common research problems faced by NSF researchers and one or more areas of science and engineering. So then the final column on this page you'll see the sizes of the awards obviously elements are somewhat 37 00:10:53.280 --> 00:11:03.000 Amy Walton: More focused so smaller, they're not to exceed a total of $600,000 in three years, duration. So that's up to $200,000 per year. 38 00:11:03.870 --> 00:11:20.040 Amy Walton: Framework implementations are larger, they can range from 200,000 to 1 million per year and can be three to five years in duration. Note that these are total budget numbers for projects and that could include multiple collaborative proposals. 39 00:11:21.510 --> 00:11:31.200 Amy Walton: But I would emphasize here that projects in the upper portion of either of these ranges must be exceptional in terms of scientific impact. 40 00:11:31.590 --> 00:11:36.360 Amy Walton: And as with all proposals should be discussed with program officers from the divisions that fund. 41 00:11:36.810 --> 00:11:52.380 Amy Walton: The research that is being impacted so proposed funding amounts should be commensurate with the work that's being proposed, and the size of the community that will be affected, and the level of the impact it's anticipated. So again, it should reflect 42 00:11:53.790 --> 00:12:08.340 Amy Walton: A large budget should reflect large benefits. So moving to the next slide. We talked briefly about eligibility and limits on the number of proposals per PII or co i or senior personnel. 43 00:12:09.990 --> 00:12:16.050 Amy Walton: Only three kinds of organizations may submit proposals universities and colleges 44 00:12:18.270 --> 00:12:24.120 Amy Walton: Second category is the not not for profit, non academic organizations. And then finally, 45 00:12:25.170 --> 00:12:33.660 Amy Walton: Fit seas are federally funded research and development centers all the many different organizations government organizations have 46 00:12:34.710 --> 00:12:38.190 Amy Walton: Or support FF Rd sees we're looking 47 00:12:39.300 --> 00:12:47.190 Amy Walton: For NSF sponsored FF RTC participation. But again, they may apply, but they 48 00:12:48.390 --> 00:12:48.870 Amy Walton: Any 49 00:12:49.950 --> 00:12:50.940 Amy Walton: Activities that they 50 00:12:53.250 --> 00:13:03.480 Amy Walton: Apply for may not be included may not include costs for which the federal funds have already been awarded or expected to be awarded for other 51 00:13:04.530 --> 00:13:06.390 Amy Walton: FF or DC activities. 52 00:13:08.040 --> 00:13:14.190 Amy Walton: Moving to the other topic, how many proposals may PCI or a copia or a senior personnel. 53 00:13:15.480 --> 00:13:17.910 Amy Walton: Participate in one 54 00:13:19.080 --> 00:13:36.240 Amy Walton: And that that's across all categories of proposals for for this award deadline. So, in the event that any individual exceeds this one proposal in it any proposal that is submitted to the solicitation with this individual. 55 00:13:37.290 --> 00:13:54.930 Amy Walton: Listed as a PPI Oracle API or senior personnel after the first proposal is received NSF will return those later proposals without review, no exceptions will be made. And you can see the details in the solicitation. 56 00:13:56.100 --> 00:13:58.260 Amy Walton: So moving to the next topic. 57 00:13:59.820 --> 00:14:00.930 Amy Walton: Within NSF 58 00:14:02.400 --> 00:14:13.050 Amy Walton: The CSI program is a cross cutting program and it's enabled by collaborations of divisions and offices throughout the NSF and it's it's many directorates 59 00:14:13.500 --> 00:14:29.040 Amy Walton: On these are the organizations that are are listed as participants and although the Office of advanced cyber infrastructure from which Stefan, and I and traffic and Allen and Rob 60 00:14:30.120 --> 00:14:42.300 Amy Walton: Come on, is the place where solicitations will be sent. Each of the directorates divisions and offices have designated representatives that will be serving as points of contact for the solicitation. 61 00:14:42.750 --> 00:14:59.610 Amy Walton: And you can find a list of these representatives by accessing the program page or by looking for the solicitation document on the web link is listed at the bottom. But if you go on Google and and mentioned NSF 20 hyphen 592 62 00:15:01.020 --> 00:15:09.270 Amy Walton: Of the 4500 listings certainly everything on the first page is this solicitation. So it should be fairly easy to find. 63 00:15:10.590 --> 00:15:12.450 Amy Walton: Okay, moving to the next. 64 00:15:13.650 --> 00:15:22.560 Amy Walton: Slight change in topic, what kinds of things does the cyber infrastructure for sustained scientific innovation look for 65 00:15:23.910 --> 00:15:26.250 Amy Walton: There is a group of six different 66 00:15:29.730 --> 00:15:35.970 Amy Walton: Aspects or attributes that we look for in proposals and this is an 67 00:15:37.080 --> 00:15:42.450 Amy Walton: Area where your proposal will need to speak to each of these activities. 68 00:15:44.130 --> 00:16:02.460 Amy Walton: So obviously, first up the project has to be science driven it somehow needs to promote science excellence or enable fundamentally new scientific advances or benefit and or benefit science and engineering communities beyond the participating communities. 69 00:16:03.540 --> 00:16:12.660 Amy Walton: A second to attribute is that the project needs to be innovative, that can have a wide range of of definitions. 70 00:16:13.680 --> 00:16:24.840 Amy Walton: But emphasizing unique NSF contributions, whether you're building the capability or capacity or cohesiveness of a National Cyber Infrastructure ecosystem. 71 00:16:26.580 --> 00:16:31.770 Amy Walton: But basically, considering both the human and technical aspects of what you're developing in a way of cyber infrastructure. 72 00:16:33.180 --> 00:16:50.760 Amy Walton: Projects need to be collaborative it looking for partnerships and community and community development that actively engages both Cyber Infrastructure experts are specialists and scientists working in the fields with the domain scientists who will be the main users of this cyber infrastructure. 73 00:16:51.990 --> 00:17:01.170 Amy Walton: Another area is leveraging is that were these are don't start from scratch. They're building on existing or recognized capabilities. 74 00:17:02.430 --> 00:17:06.150 Amy Walton: The project has to be strategic. And what that means is that 75 00:17:07.560 --> 00:17:18.750 Amy Walton: This proposals will need to include management plans and metrics that show how they would encourage measurement of progress and how they would share the results. 76 00:17:19.500 --> 00:17:28.770 Amy Walton: So you'll see that there's an awful lot of quantitative and clear metrics that are needed in in this attribute 77 00:17:29.250 --> 00:17:39.270 Amy Walton: And then finally, the project. Some had to be sustained be off the light the awards, some would continue to provide benefits beyond 78 00:17:39.630 --> 00:17:58.770 Amy Walton: You disappointed in this award the lifetime of the award and would result in some widely accessible long term community cyber infrastructure or capability. And so then this is my final slide before I turn it over to Stefan. But again, let me reiterate that each of the directorates has 79 00:18:00.030 --> 00:18:08.700 Amy Walton: Looked at, and included a specific list of US priorities at the division or office level across the various directorates 80 00:18:09.570 --> 00:18:17.400 Amy Walton: And we're not going to read through those here, but please look at the solicitation, because while some of the areas may be similar to previous solicitations 81 00:18:17.700 --> 00:18:28.500 Amy Walton: Others have definitely changed. And so the brightly colored words at the bottom of this slide, we strongly recommend that you discuss your ideas with the appropriate directors. 82 00:18:29.460 --> 00:18:42.450 Amy Walton: After emailing them a one page summary of your idea that getting feedback now will save you 90 days of very hard work that may or may not be 83 00:18:43.410 --> 00:19:03.990 Amy Walton: Appropriate to the solicitation. So please look for your feedback as you are going through this process. So thank you for your time. But I will now turn the presentation over to my colleague Stefan robiola who will discuss the proposal preparation aspects Stefan. Thank you. 84 00:19:15.600 --> 00:19:23.040 Stefan Robila: I started talking. And of course, I forgot on mute. This is probably the number one zoom problem. So thank you very much, Amy, and thank you to everybody that joined us. 85 00:19:24.150 --> 00:19:35.640 Stefan Robila: What I plan to do for the next several slides is to talk about specifics related to the CSI proposals and what are the characteristics of CSI proposals in terms of the submission mechanism. 86 00:19:36.150 --> 00:19:51.720 Stefan Robila: I would mention that as with any NSF solicitation and any NSF funding opportunity. The guiding document for the proposal and the word process is the proposed and an award policies and procedures guide or PPP June short 87 00:19:52.230 --> 00:20:06.750 Stefan Robila: At this moment the 20 dash one is the current version and you have a link for it and what we are discussing is not how to submit a proposal to NSF, but what are the specific things. In addition to that information that apply to CSI. 88 00:20:10.560 --> 00:20:20.280 Stefan Robila: So when you prepare the proposal. One of the things that you will have to choose as a unit of consideration and after you select the opportunity 20 dash 592 89 00:20:20.640 --> 00:20:27.210 Stefan Robila: And after you select Boise, you will be asked for the division or for unit of consideration and in this case it will be software Institute's 90 00:20:27.960 --> 00:20:39.390 Stefan Robila: Then the other thing that we ask that you consider and we will we be expected in fact for the proposals is to start the title of the proposal with the elements or frameworks to allow us to 91 00:20:40.590 --> 00:20:58.080 Stefan Robila: Sort the among the, the proposals in the categories. So if you intend to submit a proposal that is under the elements category. In that case, your title should be elements column my project title. And if it's a frameworks frameworks, then whatever project title. You can choose 92 00:21:01.020 --> 00:21:01.920 Stefan Robila: The next thing. 93 00:21:02.220 --> 00:21:07.470 Stefan Robila: Relates to the project description. And if you're looking at BP PG or find specific guidance and then 94 00:21:07.590 --> 00:21:18.360 Stefan Robila: The length and nothing is changed in CSI, however, I would mention that as part of the project description you are asked to explicitly address several things. And these are related to the solicitation specific criteria. 95 00:21:18.870 --> 00:21:27.450 Stefan Robila: And we have an eight of them and we group them in three sub themes project motivation impact cyberinfrastructure plans and measurable outcomes. 96 00:21:27.750 --> 00:21:36.540 Stefan Robila: And you have the the criteria as listed in parent is is for each of these three themes and I will discuss them later when I'm discussing the CSI specific criteria. 97 00:21:37.080 --> 00:21:44.160 Stefan Robila: So you must explicitly discussed also what the director is what programs, what divisions or offices, the proposal is aligned 98 00:21:44.640 --> 00:21:55.650 Stefan Robila: This would allow us to understand which of our colleagues will participate in the evolution of the project or and also the allows the reviewers to ever rate if indeed this is a 99 00:21:56.700 --> 00:22:00.150 Stefan Robila: Responsive to a specific programmatic area of interest. 100 00:22:01.500 --> 00:22:12.180 Stefan Robila: Another important aspect that should be discussed as part of the project description and relates to your prior support and particularly if you have received prior CSI awards and 101 00:22:12.720 --> 00:22:25.410 Stefan Robila: This includes also awards under the the solicitations that came before CSI, such as si tu or Deb's softer innovation for scientific, you know, so the data and innovation building blocks. 102 00:22:26.520 --> 00:22:31.050 Stefan Robila: Then you should discuss the results in terms of community engagement in terms of 103 00:22:31.890 --> 00:22:43.350 Stefan Robila: The outcome of the CI building process. And those are things that the reviewers are looking carefully and those are things that we are also interested in learning because we're also trying to learn how to build the program for 104 00:22:44.850 --> 00:22:57.150 Stefan Robila: We do not suggest where to put this description, but you can obviously also put it as part of the results from prior NSF support with the note that in some cases this may not be aligned with the PPP g. So, in that case for VAP 105 00:22:59.700 --> 00:23:00.810 Stefan Robila: In addition to 106 00:23:01.890 --> 00:23:14.160 Stefan Robila: The project description CSS I includes a set of requirements for supplementary document. And the first one is the delivery mechanism and community usage metrics and this is a document that is limited to two pages. 107 00:23:15.780 --> 00:23:30.960 Stefan Robila: And this should include information about the deliverables and and in terms of what's particularly what specifically I trying to build out trying to deliver and how exactly what this be delivered to a community of scientists or researchers 108 00:23:31.980 --> 00:23:40.320 Stefan Robila: We do not prescribe a delivery mechanism, we do not prescribe a type of mechanism, except that we expect it to be a software or data cyber infrastructure or service. 109 00:23:40.770 --> 00:23:48.030 Stefan Robila: And we expected to to be able to reach out to the community and we expect this this process to be as diverse and as inclusive as possible. 110 00:23:48.570 --> 00:23:54.630 Stefan Robila: And the other aspect that should be discussed as part of this supplementary document is related to metrics. 111 00:23:55.050 --> 00:24:01.950 Stefan Robila: And the project must really articulate quantifiable metrics for development and delivery of the services and capabilities to be delivered by the project. 112 00:24:02.310 --> 00:24:19.020 Stefan Robila: And for the anticipated community adoption usage and I would emphasize here. It's the metrics should be focused on both development and delivery and they should be, again, accompanied by targets by clear things that would allow us and the reviewers to understand whether you are 113 00:24:20.100 --> 00:24:26.880 Stefan Robila: Whether you are will be successful in terms of the CI development and they will deliver in community engagement. 114 00:24:29.580 --> 00:24:40.230 Stefan Robila: A second supplementary document that relates to the management and the coordination plan and this is specific to frame or since it's not required, and we do not accept it for elements. 115 00:24:41.010 --> 00:24:47.010 Stefan Robila: And in this case, because this projects are much larger we expect to see a document that limited to three pages. 116 00:24:47.970 --> 00:24:58.830 Stefan Robila: That describes the specific roles of the bi copy as and other senior personnel and paid consultants and all the institutions involved and how the project would be managed across institutions and disciplines. 117 00:25:00.150 --> 00:25:14.070 Stefan Robila: We expect this document to identify the specific coordination mechanisms that will enable cross institution and cross discipline scientific integration and also pointers, where appropriate, to budget items that support the management and coordination mechanisms. 118 00:25:17.730 --> 00:25:30.930 Stefan Robila: Another document that you may include this the cloud computing resource and I say may include it, because it depends if your project includes cloud request locations and this is specific to what one type of allocation. The one that goes through Cloud bank. 119 00:25:31.950 --> 00:25:39.270 Stefan Robila: And if you are looking at the solicitation, you would see that NSF obviously allows it to to include cloud services as part of your request, but 120 00:25:39.750 --> 00:25:45.990 Stefan Robila: Cloud bank is a mechanism that makes it a little bit streamline compared to just go into your institution. 121 00:25:46.380 --> 00:25:53.250 Stefan Robila: And if you use cloud bank then you would have to provide this document that includes the title of the proposal, the institution name. 122 00:25:53.760 --> 00:26:02.820 Stefan Robila: The anticipated total cost of the computing resources which public cloud providers will be used and a technical description and justification of the request, along with how the cost will be estimated 123 00:26:04.230 --> 00:26:11.790 Stefan Robila: I would like to emphasize the fact that the NSA budgets are not include any such costs for accessing public cloud computing resources via cloud bank that work. 124 00:26:12.330 --> 00:26:14.670 Stefan Robila: In the budget right so the budget should not be 125 00:26:15.090 --> 00:26:23.520 Stefan Robila: Including this part. This part is separate and this part will be processed separately, the total cost of the project, including this cloud computing resource request from cloud bank. 126 00:26:23.850 --> 00:26:36.420 Stefan Robila: may not exceed the budget limits for the project class of the proposal and just avoid confusion, we put a separate slide on this and it pretty much says the same thing, right, that if, let's say, 127 00:26:37.020 --> 00:26:43.710 Stefan Robila: If you go to cloud bank that work and you look at the frequently asked questions you'll get an explanation how this can be used. And you also 128 00:26:44.580 --> 00:26:53.670 Stefan Robila: Get an explanation how the estimated the costs are that but those costs are not again to be included in your budget in the NSF budget request. 129 00:26:54.000 --> 00:27:04.290 Stefan Robila: However, those costs should be subtracted from the total project cost. So, for example, consider a proposal submitted the elements class, which has a total proposal budgets limits of 600,000 130 00:27:04.710 --> 00:27:10.680 Stefan Robila: If Vi wishes to request $20,000 in cloud computing resources to cloud then then the proposal. 131 00:27:11.250 --> 00:27:19.950 Stefan Robila: Should request as part of the proposal budget, no more than 580,000 and the remaining 20,000 should be specified in the supplementary document. 132 00:27:20.460 --> 00:27:27.060 Stefan Robila: And this applies to collaborative projects also right so that when we are looking at budgets for an elements project proposal. 133 00:27:27.330 --> 00:27:31.980 Stefan Robila: We're looking at the overall budget for the entire project across all collaboratively. So again, 134 00:27:32.340 --> 00:27:45.360 Stefan Robila: The HP. I'm a request cloud computing resources separately to independent supplemental documents as long as the total budget on the project pages plus in the supplemental documents does not exceed 600,000 please read the solicitation carefully. 135 00:27:49.320 --> 00:28:01.620 Stefan Robila: Other supplementary documents as we expect in many, many NSF proposals letters of collaboration should follow this specific language, the one that is listed mpg and 136 00:28:02.700 --> 00:28:11.760 Stefan Robila: More importantly, and the project personnel and partner institutions document is unique to CSI, or at least this is not part of the regular PPP requirements. 137 00:28:12.240 --> 00:28:22.920 Stefan Robila: And we asked that as a PA you provide current accurate information for all personnel and institutions involved in the project. And this is important for all personnel, whether they are paid or unpaid 138 00:28:23.310 --> 00:28:32.790 Stefan Robila: And whether they have simply provided the collaboration letter writing should include all P is copy is senior personnel consultants collaborators Saba what these postdocs 139 00:28:33.120 --> 00:28:36.390 Stefan Robila: Advisory Committee members and writers have letters of collaboration. 140 00:28:37.170 --> 00:28:44.310 Stefan Robila: So I think that the only thing missing here are the undergraduate and graduate students, but everybody else that is on the project or is planned to be on the project. 141 00:28:44.910 --> 00:28:54.690 Stefan Robila: paid or unpaid should be on this list. And why do we need this information. We use this information in the medical review process to manage conflicts of interest. Again, please see the solicitation. 142 00:28:57.600 --> 00:29:10.560 Stefan Robila: So in terms of the review process. As for all proposals received received by NSF CSS it viewers and panelists will be asked to consider the intellectual merit and broader impact for each proposal for the reviews panel discussions and panel summaries. 143 00:29:10.950 --> 00:29:18.720 Stefan Robila: In addition to the standard criteria CSI reviewers and panelists will also be asked to consider additional review criteria that are unique to the CSI program. 144 00:29:19.500 --> 00:29:31.680 Stefan Robila: Now we will not go over the intellectual merit and broader impacts because there are ample opportunities provided by NSF to to explain what a how these are evaluated as part of the review process. I will focus on the CSI specific criteria. 145 00:29:33.300 --> 00:29:35.400 Stefan Robila: In terms of these criteria has 146 00:29:37.410 --> 00:29:44.400 Stefan Robila: The proposals will be evaluated on eight criteria as and they are grouped under three themes 147 00:29:45.660 --> 00:29:56.460 Stefan Robila: Project motivation and impact cyberinfrastructure plans and measurable outcomes and the reviewers will be asked to explicitly evaluates the proposal from the point of view of these three teams and 148 00:29:56.940 --> 00:30:08.340 Stefan Robila: Individual criteria and, more importantly, as you remember, in the project description as as big as you are asked and as proposals, you are asked to explicitly address these aspects. 149 00:30:09.360 --> 00:30:10.380 Stefan Robila: Of these a criteria. 150 00:30:12.090 --> 00:30:20.340 Stefan Robila: In terms of the project motivation impact we ask that you consider two aspects, the we expect each project to be science driven 151 00:30:21.570 --> 00:30:35.100 Stefan Robila: We expect the project outcomes to feel well recognized science and engineering needs of the research community and advanced research capability with a significant area of San within a significant area of science and engineering. We expect the proposals to be able to 152 00:30:36.690 --> 00:30:43.230 Stefan Robila: provide answers to what are the broader impacts of the projects such as benefits to the science and engineering communities beyond the initial targets. 153 00:30:43.530 --> 00:30:55.200 Stefan Robila: How would the underrepresented communities be involved. What is the impact on education and workforce development. What will recognize science outcomes will be accomplished by the research community sort of the leveraging of the new cyber infrastructure. 154 00:30:55.530 --> 00:31:06.450 Stefan Robila: So this is one aspect. The other aspect is innovation and and that relates to two things, right. So how does the project achieve innovation in the cyber infrastructure development in us as well as enable research, innovation. 155 00:31:06.780 --> 00:31:17.280 Stefan Robila: So this is one of my favorite parts in which we say that the CSI looks at innovation from two points of view, from the point of view of innovation within the scientific areas that the cyber infrastructure. 156 00:31:17.880 --> 00:31:25.140 Stefan Robila: Will serve and also from the point of view of how you build a new cyber infrastructure, what new capabilities, what the transformational approaches. 157 00:31:25.500 --> 00:31:33.420 Stefan Robila: Or will the project bring to the target communities and how will integrate these I will integrate the innovation and discovering the project activities. 158 00:31:33.930 --> 00:31:45.120 Stefan Robila: So this is the first theme. The second theme is measurable outcomes and with respect. So cyber infrastructure plans and with respect to the cyber infrastructure plans were looking at three criteria project plans. 159 00:31:45.510 --> 00:31:52.200 Stefan Robila: Building an existing recognized capabilities and close collaboration among stakeholders in terms of the project plans and system and process architecture. 160 00:31:52.620 --> 00:31:59.760 Stefan Robila: The questions that we would ask the viewers to consider. And the question is that we would expect the proposals to include in their 161 00:32:00.540 --> 00:32:09.690 Stefan Robila: Project Description are things such as what is the proposed architecture and what engineering process will be used for its design, development documentation testing validation and release. 162 00:32:10.050 --> 00:32:15.780 Stefan Robila: How will security trustworthiness provenance reproducibility and usability be addressed by the project in integrated 163 00:32:17.160 --> 00:32:24.030 Stefan Robila: Into the proposed system in the engineering processes. How are the CI be adaptable to new technologies and changing requirements. 164 00:32:24.810 --> 00:32:36.930 Stefan Robila: In terms of building on existing recognized capabilities. If you are looking at NSF and, in particular, if you're looking at the way. See, you see that we have a large number of projects and we are supporting a large and diverse ecosystem. 165 00:32:37.620 --> 00:32:46.020 Stefan Robila: That Cyber Infrastructure ecosystem. So we are always interested in how the new cyber infrastructure integrates into the larger 166 00:32:46.800 --> 00:32:56.820 Stefan Robila: System, how will the project activities build on leverage build on and leverage existing NSF and national cyber infrastructure investments as appropriate. So you don't have to do it, but 167 00:32:57.120 --> 00:33:01.470 Stefan Robila: You have to discuss how this is connected to the state of the art and to the state of the systems. 168 00:33:02.130 --> 00:33:05.970 Stefan Robila: And close collaboration among stakeholders is an important aspect because 169 00:33:06.330 --> 00:33:14.940 Stefan Robila: How will the project activities engaged cyberinfrastructure experts specialist scientists and engineers working together, working in concert with the relevant domains scientists 170 00:33:15.150 --> 00:33:22.740 Stefan Robila: And engineers are users of CI. Right. So you'd have to have projects that combine both CI expertise and scientific expertise. 171 00:33:23.310 --> 00:33:31.620 Stefan Robila: And as part of this simply putting people together is not sufficient, you have to discuss also how the project, including the collaboration will be managed. 172 00:33:31.920 --> 00:33:40.470 Stefan Robila: And what are the community engagement mechanism beyond the core team of people in the project. How would this be expanded to a larger community. 173 00:33:41.400 --> 00:33:54.360 Stefan Robila: And finally, the 30th, the measurable outcomes is focused on deliverables. Right. So is it a clear plan to how to deliver the services and capabilities. How will they be delivered 174 00:33:55.020 --> 00:34:06.120 Stefan Robila: Are these plans are compassionate by clear metrics right how this CI would be built and other targets and the build process and also targets and metrics for the delivery process. 175 00:34:06.690 --> 00:34:15.600 Stefan Robila: For the services and capabilities and for the anticipated community adoption and usage or quantitative metrics with targets identified for each year of the award. 176 00:34:16.170 --> 00:34:26.130 Stefan Robila: And finally, the last criteria relates to sustainable sustainable impact and we acknowledge that there might be different levels of sustainable sustainability for, you know, when you're looking at elements versus frameworks. 177 00:34:26.400 --> 00:34:38.850 Stefan Robila: You know, appropriate, but the budget sizes and the length of the projects, but we are interested, and we expect proposals to discuss how will the projects outcomes and its activities have long term impact. That's one and 178 00:34:39.570 --> 00:34:46.200 Stefan Robila: I will they be sustained beyond the lifetime of the award as appropriate. Other sustainability approaches forming well established models. 179 00:34:46.590 --> 00:34:59.040 Stefan Robila: And those with every of these criteria as I know that many of you may have questions of how do I do one thing that hardware do the other thing and we go back and noted that we do not prescribe mechanism. When we refer to community practices in each of these categories. 180 00:35:01.620 --> 00:35:12.540 Stefan Robila: I think this is the last slide before we focus on the questions and answers, but I would like to point out that the deadline for this solicitation is October 28 2020 and 181 00:35:13.320 --> 00:35:24.660 Stefan Robila: As I remember as a TI before joining NSF, one of the questions that I had was, when, after I submit a proposal, when do I find out the outcome. So what we plan to do is after we receive and close the 182 00:35:25.680 --> 00:35:37.890 Stefan Robila: Submission window is to process the proposals and review them in early 2021 and also expect maybe by the end of the spring to have an outcome in terms of the awards. 183 00:35:39.450 --> 00:35:44.580 Stefan Robila: And so most of the proposals probably will have an outcome. By the end of the spring. 184 00:35:45.960 --> 00:35:59.190 Stefan Robila: And I think that this concludes the formal portion of the webinar presentation and probably the most important thing now is the fact that we continue and I noticed that we have a vibrant 185 00:36:00.300 --> 00:36:08.100 Stefan Robila: Engagement with the with the with the attendees through Q and A's and we urge you to continue doing that via zoom question and answers. 186 00:36:08.790 --> 00:36:15.630 Stefan Robila: If you had the chance to look at the solicitation. You might have noticed an email address that. That is posted several places and that's 187 00:36:16.200 --> 00:36:28.140 Stefan Robila: CSI queries@nsf.gov we encourage you to use the zoom Q AMP. A for the webinar and we continue to monitor the CSI queries after the webinar and will respond as appropriate. 188 00:36:29.520 --> 00:36:38.640 Amy Walton: Great job, Stefan. Thank you very much. One of the things as we start to speak to questions. There are a pair of questions in the Q AMP a 189 00:36:38.970 --> 00:36:45.090 Amy Walton: That are seem to be related. And they're, they're probably the one of the toughest questions will have to answer. Can we, so can I. 190 00:36:45.540 --> 00:36:51.690 Amy Walton: Read them out. And then, have we can we start there. So here's the first of the two questions. 191 00:36:52.110 --> 00:37:01.260 Amy Walton: What is considered innovative in the CSI context. Can this be in contrast to what size, meaning that the site. 192 00:37:01.680 --> 00:37:08.550 Amy Walton: Computer Science Directorate reviewers would be think would be innovative, as opposed to incremental. So that's the first 193 00:37:09.000 --> 00:37:20.250 Amy Walton: Question. And the second one little later, is how much will computer science innovation count in addition to science discovery enable it and enablement or magnification. 194 00:37:20.670 --> 00:37:30.750 Amy Walton: And Cyber Infrastructure innovation. So in summary, it's the whole issue of what is innovation and what is the balance between science innovation and 195 00:37:32.520 --> 00:37:38.610 Amy Walton: Cyber Infrastructure or computer science innovation, do you want to start that. Question Set Stefan. 196 00:37:39.390 --> 00:37:41.970 Stefan Robila: I would like to pick up one of my colleagues to answer the question. 197 00:37:44.940 --> 00:37:52.770 Stefan Robila: Well, I would first say that there's a computer scientist that is innovation in computer science, right, you have to be very careful in defining computer science innovation. If you are defining 198 00:37:53.400 --> 00:38:05.730 Stefan Robila: Research innovation in computer science, then size as a director at participants as any other directory. I know that because always see as part of the computer information science and engineering or size. 199 00:38:06.150 --> 00:38:11.100 Stefan Robila: We seem to play a dual role we play that the central role in the solicitation or the management role. 200 00:38:11.400 --> 00:38:21.480 Stefan Robila: But we also play the role of enabling development of cyber infrastructure for size of research for computer science research. Right. So I would not say that we are looking for. I mean, 201 00:38:21.990 --> 00:38:26.460 Stefan Robila: As with any other discipline, we are looking for innovation in sciences and in computer sciences. 202 00:38:26.730 --> 00:38:34.470 Stefan Robila: But I think that may be the question that relates to innovation in cyber infrastructure right in cyber infrastructure development compared to simply computer science innovation. 203 00:38:34.920 --> 00:38:43.740 Stefan Robila: And in those cases, it may not be exactly the same thing. It might be focused more on software engineering, specifically, my focus more on data engineering than simply saying computer science. 204 00:38:44.280 --> 00:38:52.260 Stefan Robila: And as I mentioned in the slides, there is a balance between innovation into aspects. What does it mean innovation from the point of view of science. 205 00:38:52.560 --> 00:38:59.010 Stefan Robila: But if there is a problem that is currently faced by the scientists it within a specific scientific community and development. 206 00:38:59.460 --> 00:39:06.510 Stefan Robila: And availability of the cyber infrastructure would allow the Community to overcome that challenge to to to solve that problem. 207 00:39:06.840 --> 00:39:12.150 Stefan Robila: Then this is innovation from the point of view of science, right. So, so it will enable innovation in sciences. 208 00:39:12.660 --> 00:39:22.050 Stefan Robila: Similarly, we are the Office of advanced cyber infrastructure. We are looking for ways in which cyber infrastructure can serve better communities. 209 00:39:22.410 --> 00:39:34.320 Stefan Robila: In which it can be developed in more innovative ways and we are looking at innovation and community engagement, also in the way in which we engage the scientific community, but also in terms of 210 00:39:35.910 --> 00:39:44.070 Stefan Robila: Engaging the future scientists. So training is not the focus of the solicitation, but it could partially be part of it. If it, if it is aligned with 211 00:39:45.000 --> 00:39:54.000 Stefan Robila: Appropriate to the main program. So I'm not sure if I answered the question very well. But the idea is to remember that you are discussing it from from both aspects. 212 00:39:55.530 --> 00:40:04.800 Amy Walton: Very, very nice defined. Thank you for that. There's another sort of organizational question that came up. How does your office and I assume that means the Office of 213 00:40:05.310 --> 00:40:18.960 Amy Walton: Advanced Cyber Infrastructure interact with the other NSF divisions and what do they do and so Darryl come off mute you might be asked to answer some of that as well but maybe I'll start by taking a little of the 214 00:40:21.540 --> 00:40:34.620 Amy Walton: The start is that the Office of advanced cyber infrastructure works with all the various directorates, and the divisions within those directorates to try and identify 215 00:40:35.880 --> 00:40:37.050 Amy Walton: Important 216 00:40:38.130 --> 00:40:52.080 Amy Walton: Investments in advanced cyber infrastructure that will help those communities answer their scientific and engineering questions. And so if you go and take a look at the solicitation again NSF 217 00:40:53.760 --> 00:41:08.130 Amy Walton: Hyphen 592 you click on that and you will get a full electronic copy of the solicitation, you will see that there. There's a section that is talks about a responsible program officers and 218 00:41:08.700 --> 00:41:15.330 Amy Walton: Several of us are in the office of advance cyber infrastructure, but many of them. There's a couple dozen 219 00:41:16.830 --> 00:41:28.560 Amy Walton: program officers and there throughout the the foundation are working with us because they know what kinds of problems they have an advanced materials or advanced manufacturing or 220 00:41:29.580 --> 00:41:39.900 Amy Walton: New computer science techniques or geosciences or social sciences, and so we work with all of the different communities. 221 00:41:40.710 --> 00:41:54.000 Amy Walton: And so if you are coming from one of those communities. Be sure and take a look at that list of people that that are points of contact throughout the foundation we meet with them regularly. They helped us develop the solicitation. 222 00:41:54.810 --> 00:42:03.930 Amy Walton: And helped prepare the list of key topics that they are interested in seeing from those various directorates and 223 00:42:05.190 --> 00:42:08.970 Amy Walton: Again, as you start to try and put something together. That would be 224 00:42:10.200 --> 00:42:31.320 Amy Walton: measurable improvements to cyber infrastructure in those areas put together your one page thoughts on that process and speak to and interact with various organizations that your technique or capability would benefit and so 225 00:42:32.400 --> 00:42:49.890 Amy Walton: Again, those people are on those two dozen people are on that list of shown in the solicitation. Let me ask either Darrell, because I think you're you. You're, you're on or any of my colleagues, if there's more that you'd like to add to that answer. 226 00:42:52.140 --> 00:43:00.480 Daryl Hess: I'll get a little bit into the weeds and that we work pretty closely together we develop the review panels so that there is appropriate expertise from 227 00:43:01.140 --> 00:43:13.170 Daryl Hess: Science or domain science point of view as well as a cyber infrastructure point of view, computer science, and so forth, well represented and while able to to evaluate proposals. 228 00:43:14.850 --> 00:43:19.710 Daryl Hess: And we also work together to figure out how to fund the things that come to the top and 229 00:43:23.880 --> 00:43:29.010 Daryl Hess: Great. So it's more of a process oriented answer, but it gets to some of the nitty gritty. 230 00:43:30.540 --> 00:43:35.970 Daryl Hess: We want to make sure that right. People look at things. So you can appreciate what's going on. 231 00:43:37.170 --> 00:43:38.100 Stefan Robila: Thank you very much. There 232 00:43:39.120 --> 00:43:47.910 Stefan Robila: I'll pick up a me on a question that I noticed and I'm, you know, I'm happy to see it because it points to one of the questions that we have prepared on the side. 233 00:43:48.720 --> 00:43:57.030 Stefan Robila: So I'll read the question and then I will quickly flip through my slide deck. So the deliverables and metrics are part of the CSI specific criteria. 234 00:43:57.420 --> 00:44:10.200 Stefan Robila: But there is also a supplement document for this, can these be listed only in the supplemental document or the must be part of the main project description. So I will flip through some slides that I had after this current slide and 235 00:44:11.460 --> 00:44:18.120 Stefan Robila: These slides will be available and there will be posted on the program page in case we do not see each of them throughout this webinar, but I will 236 00:44:19.980 --> 00:44:28.440 Stefan Robila: Point to this particular thing that we had prepared and then that's why I think it is reflective of the same thing that was asked in the question. 237 00:44:29.310 --> 00:44:41.130 Stefan Robila: My short answer is, you must discuss it in the project description and how exactly do discuss it is your choice. You can simply point two parts from the supplementary documents, but you have to explicitly include 238 00:44:42.990 --> 00:44:59.910 Stefan Robila: You know the sections in the end the project description that point deliverables and metrics. So that's why we gave additional pages or supplemental documents for you to expand and discuss that. But still, you cannot miss the headings. For example, in the in the project description. 239 00:45:04.980 --> 00:45:05.250 Alan Sussman : Okay. 240 00:45:05.280 --> 00:45:06.840 Amy Walton: Do you want to take a moment and 241 00:45:08.760 --> 00:45:12.750 Stefan Robila: Because I think that my first prepared. Question and Answer is 242 00:45:14.100 --> 00:45:28.650 Stefan Robila: Very simple, right. It's basically re emphasizing a very important aspect that you really have to remember that you can't be part of two proposals if you are serving SPI copy or senior personnel and if you do that, then 243 00:45:30.630 --> 00:45:36.240 Stefan Robila: Beyond the first proposal received the other proposals will be returned without review and that will be 244 00:45:36.660 --> 00:45:45.960 Stefan Robila: Obviously a sad situation for you for your colleagues for all the work here put already and and there is a mechanism in which we are overweight, which proposals was received first 245 00:45:46.770 --> 00:45:51.660 Stefan Robila: Obviously, if it's a single proposal with no co-operatives it's easy, whichever in terms of the timing. 246 00:45:52.050 --> 00:46:02.520 Stefan Robila: If it is a collaborative proposal, we look at the last proposal that that made the project whole and that is the date in which at the time stamp for which the entire project was received so 247 00:46:06.930 --> 00:46:09.240 Amy Walton: Another live 248 00:46:10.560 --> 00:46:28.260 Amy Walton: probably makes sense to answer live. Do you recommend discussing proposal ideas with both domain NSF program officers and always see program officers, we can identify appropriate domain program officers, but how do we identify the appropriate Alessi program officers. 249 00:46:30.570 --> 00:46:30.810 Amy Walton: Well, 250 00:46:30.900 --> 00:46:41.220 Stefan Robila: There are two questions right so we we urge you to discuss the projects with the domain specific program officers and as Darrell has mentioned, we work very closely and 251 00:46:41.640 --> 00:46:49.530 Stefan Robila: From a list. My personal point of view, I think that the vast majority of questions that have reached one of our colleagues outside of Boise. 252 00:46:49.800 --> 00:46:55.050 Stefan Robila: Eventually what also shared with us. So we are aware of queries that were sent or colleagues. 253 00:46:55.440 --> 00:47:05.010 Stefan Robila: We also have that common humanitarian CSI queries that if you send an email to us and you indicated, you want to talk, let's say, two to a colleague in another division or director at we will 254 00:47:05.610 --> 00:47:08.910 Stefan Robila: route it to them and will continue being connected to the conversation. 255 00:47:09.780 --> 00:47:25.980 Stefan Robila: In terms of who we noisy, should you contact you have the people on this call you have Amy wardens therefore Obama Ellen assessment F equals R and Robert Beverly. And in case you forget our names you simply send us an email to CSS equity certain sf.gov 256 00:47:32.880 --> 00:47:42.420 Amy Walton: Another question is just, sort of, where can I find a list of existing or recognized infrastructures already supported by NSF to build from 257 00:47:44.880 --> 00:47:57.510 Amy Walton: That most of the links. This person had looked up just sent to general program solicitation sites. And then there's an I think a related question, are there open source repository, such as GitHub. 258 00:47:58.710 --> 00:48:06.840 Amy Walton: Made prior by prior CSS. So are these are those considered to be NSF supported infrastructure must we leverage 259 00:48:08.640 --> 00:48:19.590 Amy Walton: CSI infrastructure, instead of building something new from scratch, those are sort of three interlinked questions, is that it's the whole what's what. What do we leverage 260 00:48:21.030 --> 00:48:28.920 Stefan Robila: So if I would provide a general answer for the first part of the of the of the first question. 261 00:48:29.250 --> 00:48:36.120 Stefan Robila: I would say that if you go to NSF and you search for anything on the awards. You can find more information about what was supported by NSF so 262 00:48:36.420 --> 00:48:40.770 Stefan Robila: While we talk about the assign this webinar. I would mention that NSF has many programs. 263 00:48:41.280 --> 00:48:48.780 Stefan Robila: That ended up supporting cyber infrastructure. Many of them are managed by. Oh, I see. But many of some of them are managed by other divisions, so 264 00:48:49.110 --> 00:48:56.490 Stefan Robila: And something that maybe I went to all too fast. We're not talking only about cyber infrastructure that was supported or enabled by NSF 265 00:48:56.790 --> 00:49:04.830 Stefan Robila: We're talking about cyber infrastructure that supports that enables science and this could be even done by other government agencies or by other 266 00:49:05.400 --> 00:49:11.550 Stefan Robila: Organizations so and so, you know, we are not narrowing ourselves to only always supported cyber infrastructure. 267 00:49:12.300 --> 00:49:20.850 Stefan Robila: In terms of specific cyber infrastructure that is enabled by CSI, or it's a prior or the programs that preceded CSI. 268 00:49:21.270 --> 00:49:25.980 Stefan Robila: If you go to the program page, there is a search that is a link that says what was funded before 269 00:49:26.370 --> 00:49:36.900 Stefan Robila: I acknowledge that that link currently doesn't provide you with the right information and we are aware of that and we will hopefully corrected soon is just that right now it shows every possible award. 270 00:49:38.460 --> 00:49:40.380 Stefan Robila: I'm sorry, what was the second part of the question. 271 00:49:41.490 --> 00:49:59.670 Amy Walton: That just is do they need to build ons prior CSI. What about GitHub where that has been a repository for priors activities must we leverage these particular things instead of building something new. If there was a new component that they'd like to suggest 272 00:50:02.610 --> 00:50:03.270 Stefan Robila: Go ahead, though. 273 00:50:05.280 --> 00:50:07.950 Daryl Hess: Um, well I what I'd like to say is that 274 00:50:08.970 --> 00:50:21.210 Daryl Hess: We expect to leverage existing cyber infrastructure to help you get the word out and connect to the community so other people can find the thing that you just made. And to be able to utilize the 275 00:50:22.530 --> 00:50:38.130 Daryl Hess: The Cyber Infrastructure you're working on. So it's not compacted to just ones one narrow area of people who have created them. So get hub works and it's, you know, as you need some common sense of what your community looks at what it 276 00:50:39.180 --> 00:50:40.890 Daryl Hess: Where it expects to find things 277 00:50:43.320 --> 00:50:51.870 Stefan Robila: And and I would say that you don't have to build on other Simon infrastructure. It really depends on the project right if it makes sense if it is appropriate. 278 00:50:52.080 --> 00:51:00.060 Stefan Robila: But as you know, in any scientific endeavor. The question is, you have to be aware of what is out there and what is the state of the art right so so 279 00:51:00.420 --> 00:51:12.570 Stefan Robila: And what can you leverage in order to go further, you don't have to always start from scratch, but in some cases you may have to start from scratch. And as long as the argument is made appropriately, then that's that's absolutely fine. 280 00:51:13.830 --> 00:51:18.300 Daryl Hess: And of course you have to show why you're why you're building this 281 00:51:19.350 --> 00:51:25.350 Daryl Hess: Yes, how it fits in the broader context, is it better than a something that already exists, how, why 282 00:51:27.750 --> 00:51:30.750 Stefan Robila: Bill, if you can hear us. Maybe that would be a good time for for 283 00:51:30.780 --> 00:51:31.560 Stefan Robila: For us to take 284 00:51:31.650 --> 00:51:42.690 Stefan Robila: One minute break, not to disconnect. But I noticed my colleague Bill Miller has joined us. And it gives me great pleasure to introduce him he's 285 00:51:44.160 --> 00:51:52.140 Stefan Robila: The deputy office director for the Office of advanced cyber infrastructure. And I think that would be great if you could say a few words. 286 00:51:53.520 --> 00:51:57.600 William Miller: Thank you. Stefan actually my first words should be to introduce 287 00:51:57.960 --> 00:52:00.960 William Miller: The weather, who's the acting OFFICE DIRECTOR 288 00:52:02.250 --> 00:52:05.280 William Miller: And I can't see from my screen and she's yes she's 289 00:52:05.700 --> 00:52:06.960 Amy Walton: Just now signing on 290 00:52:07.290 --> 00:52:23.640 William Miller: I will execute protocol to allow me to say a few words first. And anyway, I'm very happy I was able to follow a little bit of the previous question. I know everybody's very interested in understanding the program. So let me, let me say a few words. 291 00:52:24.660 --> 00:52:32.250 Amy Friedlander : So good afternoon and I see we have 500 participants on this song delighted to see a robust response. 292 00:52:33.450 --> 00:52:39.450 Amy Friedlander : And I hope that means a robust response and not that are solicitation was perhaps less than crystal clear. 293 00:52:40.740 --> 00:52:41.310 Amy Friedlander : So, 294 00:52:42.810 --> 00:52:50.850 Amy Friedlander : What many thanks to all of it all of the program officers who bring on the CSS I solicitation to you. 295 00:52:51.240 --> 00:53:07.680 Amy Friedlander : I'm sure you're aware that this is an NSF wide effort that is led by Alessi and it reflects both the role of our AC within the foundation and more largely in the unclassified research community, but also I think the breadth of the 296 00:53:08.820 --> 00:53:20.760 Amy Friedlander : Of software and data, and in particular the integrated vision that always he is trying to advance. So it's a great pleasure to welcome you all 10 minutes before the end of your hour 297 00:53:21.870 --> 00:53:37.770 Amy Friedlander : And if there are any questions for me either. As the acting director of the office or in a role I share with Bill as the conflicts officer, please. Let's see, what is your protocol Amy are you putting them in a chat or how is that being 298 00:53:37.800 --> 00:53:45.450 Stefan Robila: So that is a question and answer. And you hear you, as a co presenter. You can see the questions and answers they keep coming and 299 00:53:46.290 --> 00:53:47.610 Stefan Robila: We all right. 300 00:53:47.910 --> 00:53:57.990 Stefan Robila: So I basically saying a lot of them have been answered. But I basically have not answered any of them directly. Our colleagues have done an excellent job continue to keep the queue as as manageable as it can be. 301 00:54:00.300 --> 00:54:03.270 Amy Friedlander : scanning through them. Um, 302 00:54:04.110 --> 00:54:17.550 Stefan Robila: And I will answer a question related to the availability of the materials. Yes, the recording of this webinar will be available. Yes, the slides will be made available on the program page, I expect few days after this event. 303 00:54:25.080 --> 00:54:29.760 Amy Friedlander : I'm delighted to see there seem to be no questions about conflict of interest. So 304 00:54:31.320 --> 00:54:39.900 Amy Walton: There was one about industry involvement are there limitations imposed by the program in the way the cyber infrastructure developed can be subsequently funded 305 00:54:40.320 --> 00:54:50.340 Amy Walton: For example, commercial and also, for example, the CIA generates revenue through software as a service that is reinvested in the maintenance and additional development of the cyber infrastructure. 306 00:54:50.790 --> 00:54:58.470 Amy Walton: So looking for innovative ways to sustain and maintain any developments under CSI. I think it's a question. 307 00:54:59.550 --> 00:55:09.570 Amy Friedlander : So the matter of policy NSF does not require open access, we do encourage broad data sharing and sharing of software, however. 308 00:55:10.050 --> 00:55:20.610 Amy Friedlander : And I think that answers your question. That is not prohibited. I believe at the solicitation level. Is that correct, Stefan, you have not instituted and serve on any topic. 309 00:55:21.120 --> 00:55:25.770 Amy Friedlander : So there's no specific prohibition and it's certainly not prohibited at the NSF level. 310 00:55:26.580 --> 00:55:42.690 Amy Friedlander : That said, You do know that we have a policy on sharing results are particularly in pre competitive basic research. I think that any plans for use of data that carry or software that carries restrictions and this is not uncommon should be disclosed either in 311 00:55:43.770 --> 00:55:57.330 Amy Friedlander : Your data management plan or in your research plan in so far as this affects the disposition, the way you will go about your research and the disposition. Are any products of that research. Does that answer the question. 312 00:55:58.200 --> 00:56:07.860 Stefan Robila: Thank you Amy and the suspected to be clear on the CSI side on this program side. Now, we do not have any restrictions beyond the NSF policy. 313 00:56:18.270 --> 00:56:25.740 Amy Walton: And one person had also because new I'm sure that it's, you know, you're, you're asking 314 00:56:26.580 --> 00:56:35.550 Amy Walton: How does it fit in there seems to be a bias in the community about using cloud based computing resources versus succeed super computing resources with respect to innovation. 315 00:56:35.940 --> 00:56:49.080 Amy Walton: Will these expert expectations be explicitly discussed with the panel in the review process. So just the use of cloud based computing versus other resources, Stefan. Do you want to take that up again. 316 00:56:51.570 --> 00:56:55.890 Stefan Robila: I would push back and say, I don't think there is a bias between one versus the other. 317 00:56:57.000 --> 00:57:06.660 Stefan Robila: I would, however, caution you to look at the proposal and whether you need cloud resources or you expect to have a location through one of the leadership class. 318 00:57:07.170 --> 00:57:19.920 Stefan Robila: Computing mechanisms. This really depends on the type of project that you propose whether it makes sense to have those resources or not. And that is part of the methods review process so 319 00:57:21.660 --> 00:57:29.280 Stefan Robila: I we discussed bias in our review process we discuss it with our panelists and we discuss bias in many aspects, including 320 00:57:29.820 --> 00:57:40.920 Stefan Robila: The type of proposals, the types of institutions that type of research at this proposal type of development that is report. So, be assured that we do that in a very thorough fashion but in my perspective. 321 00:57:41.700 --> 00:57:47.010 Stefan Robila: There is not such a bad we at least I have not observed such bias in the review process being discussed. 322 00:57:47.640 --> 00:57:52.890 Stefan Robila: The opinion, the evolution of the panelists may be different than your opinion about the process. 323 00:57:53.880 --> 00:57:58.380 Stefan Robila: You have to be very careful. However, when you propose the development of cyber infrastructure to look how 324 00:57:58.710 --> 00:58:07.800 Stefan Robila: To understand and explain how the cyber infrastructure would remain sustainable or has the potential of becoming sustainable or will survive the funding. 325 00:58:08.790 --> 00:58:17.730 Stefan Robila: And and if you have enough mechanism to do that. And if you rely on specific locations, then you have to be careful how those locations will be sustained. At the end of the project. 326 00:58:19.800 --> 00:58:26.220 Amy Friedlander : So I just like to reinforce this question of Cloud versus other platforms we are actually 327 00:58:27.300 --> 00:58:46.710 Amy Friedlander : Encouraging um I heterogeneous set of resources to enable computationally intensive research. So just let me underline the point that Stefan was making at the policy level for the office is that we are interested in, if you will. 328 00:58:48.120 --> 00:58:59.610 Amy Friedlander : The research ending up at the right place and understanding what that is so different kinds of problems require different kinds of computational resources, different kinds of data sources, different kinds of software. 329 00:59:00.060 --> 00:59:06.810 Amy Friedlander : And that is what we look for at the office level and not speaking for the program officers here, but I'm making 330 00:59:07.200 --> 00:59:19.890 Amy Friedlander : I would just like to reinforce Stefan's point is that we do not have a bias toward or away from cloud, it is another set of services that we're interested in seeing how they can be utilized to advance recent 331 00:59:29.460 --> 00:59:29.970 Let's see. 332 00:59:32.130 --> 00:59:34.620 Stefan Robila: Helen perfect he other questions. 333 00:59:35.700 --> 00:59:36.450 Stefan Robila: We can pick up 334 00:59:42.660 --> 00:59:51.150 Stefan Robila: So I see a question related to, is it possible to include the available computer resources BI has under exceed or with summer at the agency as part of the proposal. 335 00:59:52.110 --> 01:00:06.150 Stefan Robila: I'm not sure you can include anything you want, as part of the proposal, but the question is what you are requesting NSF to do in terms of, you know, the what to fund you can request that allocation as part of that. Am I right, Amy, who doesn't have to be after 336 01:00:06.870 --> 01:00:12.720 Amy Friedlander : I'm actually depends on which system generally, I believe. 337 01:00:13.800 --> 01:00:15.150 Amy Friedlander : I think I'm authority here. 338 01:00:17.340 --> 01:00:26.700 Amy Friedlander : If you have if you're requesting an allocation on exceed we do I believe expect you to have a research project funded research project and 339 01:00:26.700 --> 01:00:27.060 Getting 340 01:00:28.110 --> 01:00:34.320 Amy Friedlander : So we separate the request for an allocation from the evaluation of the research that you choose to do 341 01:00:35.760 --> 01:00:36.090 Thank you. 342 01:00:38.880 --> 01:00:51.150 Alan Sussman : Stuff on this. There's a good question here about CSI supporting development of CI that has translational applications clinical environment may be sustained to utilize my clinical researchers or clinicians, so I think 343 01:00:52.710 --> 01:01:03.840 Alan Sussman : The key here is that, for that is that NSF and dental doesn't support clinical research right that's what this is not a CSI specific thing. But that's typically supported by NIH. 344 01:01:04.980 --> 01:01:12.810 Alan Sussman : But translational research that's something that we definitely that CSI supports. It's just the clinical part is not an S. 345 01:01:14.340 --> 01:01:27.510 Stefan Robila: Right. And I would say that you are asking us a question that is also better answered by our colleagues in specific divisions and directors to evaluate whether the research that will be enabled by this new cyber infrastructure will be 346 01:01:30.150 --> 01:01:32.670 Stefan Robila: valuable to the research community in that area. 347 01:01:33.480 --> 01:01:45.120 Stefan Robila: And that's why that I totally agree on it. So the question is, what type of research is supported by NSF and that's why we are relying on our colleagues and other divisions to provide a specific answer. 348 01:01:45.540 --> 01:01:51.900 Stefan Robila: And if you have a specific question, just send it to us and describe it and you'll get a very specific answer. 349 01:01:54.270 --> 01:01:54.570 Yeah. 350 01:01:58.650 --> 01:02:09.480 Stefan Robila: I see a question related to a proposal that was submitted to another program, I believe, CDs any and the funding is not enough to cover the CIA development. Can I submitted updated version to CSI. 351 01:02:11.280 --> 01:02:14.910 Stefan Robila: This is particularly for the support of a high level post have to work on the CI. 352 01:02:17.160 --> 01:02:23.250 Stefan Robila: Yeah, I still can't submit a proposal twice, and you have to be careful with being paid twice to do the same work. 353 01:02:24.090 --> 01:02:29.460 Stefan Robila: If you please remember that this is not simply just building something in addition to your current research. 354 01:02:29.970 --> 01:02:36.570 Stefan Robila: CSI, as many of our colleagues that have been awarded this awards in CSI in the previous programs. 355 01:02:36.870 --> 01:02:45.600 Stefan Robila: Requires you to dedicate a significant amount of time in developing a tool and then supporting the tool and bringing it to the community engaging it with the community. 356 01:02:46.140 --> 01:02:58.260 Stefan Robila: So I would be very careful in simply saying, Can I do something else. Yes, you can do something else. But this is not simply just updating a previous proposal to do something else that CSI focuses on development and rather than 357 01:02:59.400 --> 01:03:00.420 Stefan Robila: In research. 358 01:03:01.980 --> 01:03:11.880 Alan Sussman : And there's a follow up. There's another question that has a similar flavor about is there a restriction and timeline for recent missionary for first submissions reviews are out if a proposals on successful 359 01:03:12.390 --> 01:03:28.710 Alan Sussman : Unsuccessful need, you need to wait for one year. And here again, that you cannot resubmit the same proposal second time, even if it's rejected it has to be a new proposal substantially has to have substantial differences from the original proposal, that's a general NSF rule right 360 01:03:29.190 --> 01:03:33.360 Stefan Robila: With respect to, you know, you'll see the deadline on October 28 361 01:03:34.620 --> 01:03:42.510 Stefan Robila: If you have submitted to the previous solicitation, you're welcome to submit to the solicitation. There is no restriction from one day to another. 362 01:03:53.940 --> 01:04:04.890 Alan Sussman : There's another one here on about data collection. So would intelligent data collection sampling and sensing systems be considered cyber infrastructures that are interesting to the program so CSI program. 363 01:04:05.820 --> 01:04:11.100 Alan Sussman : So we've had questions like we've had things like that come up before. So Stephen, maybe you find interesting. 364 01:04:12.390 --> 01:04:14.100 Stefan Robila: Like to pass if somebody else but 365 01:04:15.660 --> 01:04:23.100 Stefan Robila: I would say we had significant discussions among our colleagues. And the short answer is simply data collection is not the focus of CSI. 366 01:04:23.940 --> 01:04:29.010 Stefan Robila: However, if data collection is part of the development of the cyber infrastructure and again 367 01:04:29.340 --> 01:04:41.460 Stefan Robila: I realized that in some cases data Cyber Infrastructure could be seen like a database that's not what we're looking at here, we are looking at ways in which we provide services for accessing the data in which this services would enable for the 368 01:04:41.970 --> 01:04:49.380 Stefan Robila: scientific advances right if in the process of developing the cyber infrastructure. You are also building up a data. 369 01:04:50.280 --> 01:05:09.570 Stefan Robila: Again, if that is not the main focus and that may be aligned with CSI so simply just, you know, you have to be very clear on what exactly you're doing and this may also be split discipline specific or unscientific areas specific from one director to another. 370 01:05:10.650 --> 01:05:20.040 Tevfik Kosar: I think the best answer to such questions is, you can send us a one page white paper and we can give you more specific advice regarding your proposal idea. 371 01:05:22.080 --> 01:05:25.740 Tevfik Kosar: There are a couple of questions about when the video will be available and how 372 01:05:26.220 --> 01:05:30.480 Tevfik Kosar: I mean, should we be notified about that stuff. What's the timeline on that. Yeah. 373 01:05:32.190 --> 01:05:34.950 Stefan Robila: So we are trying to do these things as quickly as possible. 374 01:05:36.540 --> 01:05:51.510 Stefan Robila: If we do have a list. And if you provided the correct email addresses. We can certainly send you an email, but we cannot promise that if you if you discovered that two weeks later, the video is not available, just let us know and we'll continue to do the inquiries. 375 01:05:52.860 --> 01:05:55.230 Stefan Robila: But we hope to do this as soon as possible. 376 01:05:59.580 --> 01:06:08.640 Tevfik Kosar: And this is a question about vendor and industrial partners can get a subcontract I can answer is just as strong as it is justified. 377 01:06:09.720 --> 01:06:11.160 Stefan Robila: Thank you. Terrific. So that 378 01:06:11.220 --> 01:06:15.300 Stefan Robila: Gives me the chance to go through one of my one more of our pre 379 01:06:16.440 --> 01:06:18.120 Stefan Robila: Designed frequently asked questions. 380 01:06:18.480 --> 01:06:22.260 Stefan Robila: Yeah, right. So yes, rightfully so we encourage partnerships we 381 01:06:22.260 --> 01:06:28.800 Stefan Robila: encourage collaboration across academia, but from academia and between academia and other 382 01:06:31.080 --> 01:06:37.560 Stefan Robila: Partner with other partners, but please note that industrial partners cannot submit proposals. 383 01:06:38.100 --> 01:06:45.840 Stefan Robila: They can participate in various mechanisms, they can be P eyes and copy is if if the institution allows them right they can 384 01:06:46.830 --> 01:06:55.830 Stefan Robila: Get a sample word if that's appropriate. But again, that the goal here is if it's appropriate to the project, you have mechanism to do that and you have some options listed here. 385 01:07:05.250 --> 01:07:14.070 Stefan Robila: I see an interesting question. Let me pick it up. I see a question that is asking how many stakeholders is a project and elements project expected to have for it to be impactful. 386 01:07:15.450 --> 01:07:19.680 Stefan Robila: I started to be blunt, I have no idea how many stakeholders, because this is extremely 387 01:07:20.700 --> 01:07:24.660 Stefan Robila: Dependent on the community that your cyber infrastructure will serve 388 01:07:25.290 --> 01:07:37.950 Stefan Robila: If it's a large cyber community, then you may talk about thousands if it's a small one. You may be talking about 100 if you are talking about all the laboratories that focus their research on a specific area that may be a handful. You may count them. If you're talking about 389 01:07:39.210 --> 01:07:47.520 Stefan Robila: The NSF funded supercomputers by developing a news software library, then you're probably talking. I don't know. Between one and 10 at most. So 390 01:07:47.790 --> 01:07:57.900 Stefan Robila: The number is not important. If the question is, is the other stakeholders representative and engaged enough with the community that you are trying to target. And that's, that's, again, 391 01:07:59.460 --> 01:08:06.600 Stefan Robila: That that's that if you question also in terms of the panelists, I agree with your estimated you are engaging the representative community. 392 01:08:29.670 --> 01:08:30.510 Stefan Robila: So let's see. 393 01:08:34.920 --> 01:08:43.740 Stefan Robila: I see another question. I think it's a logistics questions related to elements versus framers in comparing elements to frame or. So what is a small group. How many people typically 394 01:08:45.750 --> 01:08:59.100 Stefan Robila: You have to look at the budgets first right and realize how many people can you support with the annual budget for an elements versus how many people can you support for the budget for the framers, but it is again, up to the project that you're trying to develop 395 01:09:00.960 --> 01:09:12.360 Stefan Robila: If, however, you have a framework that has a single API and no other career collaborators and that would be a questionable frame or because it's not clear if a single person can develop a large project and also engage with the community. 396 01:09:12.840 --> 01:09:22.350 Stefan Robila: And similarly, even for an elements, even if it's a single PR, you would expect to have very strong collaborators paid or unpaid with with clear ways to collaborate, that would bring it up to fruition. 397 01:09:49.110 --> 01:09:55.530 Stefan Robila: I see a question that is aligned perfectly with what I display on the screen again consulting funds go to an international partner. 398 01:09:56.610 --> 01:10:12.810 Stefan Robila: My short answer is, please go and read the paper RPG somewhere there you will see in terms of who can receive NSF funding a very clear statement that says that NSF rarely provides funding support for 14 organizations or individuals and 399 01:10:14.340 --> 01:10:25.020 Stefan Robila: NSF will consider proposals for capacity projects involving us and for organizations as long as the support for the 14 organizations is provided by some other parts and not by NSF 400 01:10:25.710 --> 01:10:39.450 Stefan Robila: If you have a very specific idea what a very specific plan on why the international partners should be involved and then support it, please send us again as as our colleagues already said description and we'll try to provide a more detailed as 401 01:10:45.510 --> 01:10:59.460 Alan Sussman : Oh I see, I see. I spent a couple places people asking about this idea of building on existing recognized capabilities and then people are asking, Where, where can you find a find a list of previous cyberinfrastructure supported by NSF 402 01:11:01.350 --> 01:11:13.590 Alan Sussman : And and for that really we point people at the word search capabilities on the NSF website where you can look at all existing words by keyword by program, all sorts of different ways. 403 01:11:15.210 --> 01:11:23.220 Alan Sussman : current and past awards. It goes back, I think pretty far. So that's the best way to find out what sort of what NSF has supported in the past. 404 01:11:23.580 --> 01:11:29.760 Alan Sussman : But it doesn't have to be in SF supported cyber infrastructure. So it could be capabilities that are developed elsewhere that you're building on 405 01:11:30.090 --> 01:11:44.820 Alan Sussman : So that's why it's hard to say, but really just talks about not starting from scratch, right, that is existing research the existing maybe software and tools data infrastructure. So that's really the key when we talk about building on existing recognize capabilities. 406 01:11:45.690 --> 01:11:53.250 Stefan Robila: And I think this is also where it is important to have a clear understanding from both sides from the cyber infrastructure point of view of things. 407 01:11:53.460 --> 01:11:59.490 Stefan Robila: You know, in terms of what type of software libraries are available, even if not necessarily within your scientific domain but 408 01:11:59.790 --> 01:12:09.300 Stefan Robila: What other types of data environments are available, but also what exactly is being is used currently within the specific scientific domain that your 409 01:12:09.630 --> 01:12:19.230 Stefan Robila: New cyber infrastructure of your proposed cyber infrastructure will target and again he had it's important to have expertise, both from the domain, also from the cyber infrastructure. 410 01:12:19.620 --> 01:12:30.780 Stefan Robila: You may have a very good understanding of what you have in your domain and then you may not realize that the solution you're proposing is very similar to what may be available in a closely related domain. 411 01:12:54.000 --> 01:13:03.870 Stefan Robila: I see a question about a percentage. Are there any constraints on the percentage of budget allows for procuring the software and hardware to build cyberinfrastructure 412 01:13:06.810 --> 01:13:19.170 Stefan Robila: We do not have a hard percentage, but I would like to emphasize that, that the focus of this solicitation is the development of data and softer Cyber Infrastructure not acquisition of hardware and again 413 01:13:20.370 --> 01:13:26.190 Stefan Robila: If, let's imagine that the proposal would mostly request support for acquisition of hardware. 414 01:13:26.850 --> 01:13:41.670 Stefan Robila: The reviewers with question, what exactly you're trying to develop one to how exactly what this be sustained. When the hardware is obsolete. So you have to enter to to consider the implications of of requesting hardware and the level of requests as part of the solicitation. 415 01:13:45.720 --> 01:13:55.230 Tevfik Kosar: There are a couple of questions regarding the compute resources to be using the proposals and especially readily. They can use exceed or not. 416 01:13:56.280 --> 01:13:57.390 Tevfik Kosar: And the answer is yes. 417 01:13:58.410 --> 01:14:19.920 Tevfik Kosar: The proposals can use national resources such as exceed or a sky, but the application process for those resources are different. Basically, you cannot assume you will have access to those resources you need to go and apply for cycles in those resources as a separate process. 418 01:14:34.770 --> 01:14:42.450 Stefan Robila: So I see a question that I think it's very relevant to me many of the participants our proposed Cyber Infrastructure could benefit multiple domains. 419 01:14:42.780 --> 01:14:53.040 Stefan Robila: And the question is, is contacting specific stakeholder science program directors is one page abstract to make sure they're interested encouraged if they're not interested should really consider the stakeholders. 420 01:14:53.610 --> 01:14:57.150 Stefan Robila: So the first part of the question is should you take multiple stakeholders. 421 01:14:57.600 --> 01:15:06.210 Stefan Robila: Yes, but you have a better solution. You can just send the one page of straight to CSI queries and suggest, who should be contacted, and we can coordinate that for you. 422 01:15:06.750 --> 01:15:13.920 Stefan Robila: Second, if the answer from some of the stakeholders from our colleagues in some areas of interest is that they are not interested in that. 423 01:15:14.190 --> 01:15:24.510 Stefan Robila: Then you have to consider while you're trying to target those communities because most likely there is no interest within those communities or at least the the feedback that you receive is that there may be limited interest. 424 01:15:26.190 --> 01:15:34.080 Stefan Robila: So you have to consider again how to structure or projects or that it is responsive to programmatic areas of interest. 425 01:16:12.420 --> 01:16:23.580 Stefan Robila: There's also logistics questions in terms of should frame or proposals have a steering committee to ensure that the project is meeting goals for the domain scientists, can you give us examples of ways to show strong connections. 426 01:16:26.550 --> 01:16:37.290 Stefan Robila: I personally do not provide guidance on how to write the proposals and then suggesting that you should include or not include it. If it's not listening to the station is a guidance on how to write the proposal. 427 01:16:37.950 --> 01:16:47.040 Stefan Robila: My simple answer. And I would invite colleagues, maybe if they want to provide more refinement is that if you think it's appropriate to have a senior committee, then you have to have a steering committee. If not, not 428 01:16:47.580 --> 01:16:51.570 Stefan Robila: But really it's not my place to comment, whether that would improve your proposal or not. 429 01:16:59.760 --> 01:17:13.530 Stefan Robila: And then I see another one related to how important the management skills of the p eyes are to this proposal, we have a very accomplished bi, but not known for management skills, should we have a manager be the API instead of the genius, we have here. 430 01:17:15.360 --> 01:17:16.290 Stefan Robila: It is again. 431 01:17:17.700 --> 01:17:23.580 Stefan Robila: A team related question and you will have to figure out how to form your team. If I assume it's a team because you're talking 432 01:17:24.180 --> 01:17:43.560 Stefan Robila: About two people and how will this be successful. Yes, coordinating multiple groups across multiple institutions, as it is often the case for our frameworks or even some of the elements is a difficult task and and requires effort that requires time and patience so 433 01:17:44.700 --> 01:17:58.620 Stefan Robila: You you point to an important aspect of project management. But that's, again, another thing that that we all discover as p is at one point, as, as many of us have been researchers and faculty before joining us 434 01:18:12.690 --> 01:18:14.040 Alan Sussman : We're at 315 435 01:18:14.550 --> 01:18:20.010 Stefan Robila: So we will take 10 more minutes for questions and then we'll wrap up, I was assured by our colleagues that that 436 01:18:20.310 --> 01:18:28.590 Stefan Robila: Provided XML support for this webinar that we will not be cut off. So we'll try to answer as many questions as possible. Knowing that whatever is left will have to answer them by email. 437 01:18:29.250 --> 01:18:29.850 Stefan Robila: And 438 01:18:30.720 --> 01:18:33.090 Stefan Robila: I would rather do that my life. 439 01:18:37.980 --> 01:18:51.390 Tevfik Kosar: There's a question asking whether the resources or the CIA created by these projects need to be provided free to anyone in the public domain or can they be offered only to the institutions that they are serving 440 01:18:52.290 --> 01:18:59.520 Tevfik Kosar: Of course, if we create a CI can be offered to anyone by free, that would be great. But there's not really a requirement. 441 01:19:01.080 --> 01:19:08.460 Tevfik Kosar: So the expectation is whatever community, the proposal is proposing to serve the resources should be 442 01:19:09.690 --> 01:19:15.450 Tevfik Kosar: Pi, Pi, Pi prior to available to those communities, mostly 443 01:19:17.310 --> 01:19:17.670 Thank you. 444 01:19:22.290 --> 01:19:28.380 Stefan Robila: I see a question that is relatively short it's asking about what type of artificial intelligence, machine learning work fits in. 445 01:19:33.720 --> 01:19:41.460 Stefan Robila: Is whatever it is appropriate for the specific cyber infrastructure and for the specific programmatic areas that your project will target. 446 01:19:51.060 --> 01:20:00.930 Stefan Robila: I see a very interesting question related to software sustainability and the connection to the evolving hardware. So sorta sustainability is intrinsically linked to the evolution in and proliferation of hardware. 447 01:20:01.530 --> 01:20:08.280 Stefan Robila: Does the review process place emphasis emphasis on projections of hardware trends and the factoring of these in discussing sustainability. 448 01:20:10.050 --> 01:20:17.190 Stefan Robila: sustainability of the software sustainability data Cyber Infrastructure is connected. I agree to to the to the evolution of hardware. 449 01:20:18.360 --> 01:20:25.200 Stefan Robila: Is this place an emphasis, it is discussed as part of that. Right. So the idea is that if if if your Cyber Infrastructure targets a 450 01:20:25.470 --> 01:20:39.570 Stefan Robila: Specific configuration that we know it has become obsolete. Clearly the reviewers are pointed to it, but they do not necessarily make speculative assumptions for the future, unless it is based on known evolutions or known facts. 451 01:20:54.060 --> 01:21:04.710 Stefan Robila: Is the development of software for integrating data models and analysis tools for a specific science using standard CIA approach is appropriate for CSI call 452 01:21:06.240 --> 01:21:08.070 Stefan Robila: What do you think, Ellen are terrific. 453 01:21:10.050 --> 01:21:10.410 Robert 454 01:21:17.220 --> 01:21:19.980 To 57 455 01:21:23.130 --> 01:21:35.610 Stefan Robila: So you don't have to innovate Cyber Infrastructure Development for Cyber Infrastructure Development sake, if you know you have to use proven software development techniques proven data engineering techniques or and as part of this. So, 456 01:21:36.690 --> 01:21:50.970 Stefan Robila: As long as that enables discovery. Again, there are multiple ways to discuss innovation in terms of the CI and that could be even engagement of the communities engage in terms of delivery and not just by building new CI for the CIC 457 01:21:52.080 --> 01:21:55.410 Alan Sussman : Right. And it can be for a specific scientific for engineering Wyoming. 458 01:21:55.470 --> 01:22:02.010 Alan Sussman : Right, but that that's okay as long as there's a reason your community of users that cares 459 01:22:02.250 --> 01:22:06.810 Stefan Robila: And if I mean, many of our words and our beings for very specific domains. 460 01:22:08.310 --> 01:22:15.540 Alan Sussman : Right it both ways. It can be for single domain or can be for multiple domains legitimate legitimate targets. 461 01:22:17.550 --> 01:22:25.710 Tevfik Kosar: That also complimented programs at NSF for data integration, for example, we have a Caesar program, which focuses on 462 01:22:27.600 --> 01:22:42.900 Tevfik Kosar: integration. Integration of existing CI components. It is called Data Set pilots sees a program. So we can recommend and the potential proposals to consider such complimentary programs first 463 01:22:57.420 --> 01:22:57.930 So, 464 01:22:58.980 --> 01:23:08.700 Alan Sussman : stuff on there was question here about whether view toward broader impact and sustainability community building. Is it appropriate to include training and outreach as part of our CSI project. 465 01:23:09.750 --> 01:23:22.620 Alan Sussman : Yes. And the answer there. That's a pretty straightforward test that's part of community outreach and broader impacts that that would be definitely showing broader impacts and also sustainability for sure, but that 466 01:23:22.650 --> 01:23:27.000 Stefan Robila: Again, I would like to point out that this is part of the review process, you have to 467 01:23:28.650 --> 01:23:45.390 Stefan Robila: articulate how you will do it. And you have to have realistic plans and then if this requires budgetary support that has to be included. So people not believe that you'll travel around not in this times, but in other times and and and and engage the community. If you have no money. 468 01:23:46.800 --> 01:23:50.820 Alan Sussman : That's right. So the budget has to be commensurate with the proposed activities. That's 469 01:23:57.270 --> 01:24:07.140 Stefan Robila: I also see some questions related to a specific programmatic area of interest and I will point to one related the HR in which there is a very specific question. If the HR would support something or not. 470 01:24:07.620 --> 01:24:16.980 Stefan Robila: I would encourage you if you have that specific question to contact the representative from that specific director or division and you will get a more nuanced answer. 471 01:24:17.790 --> 01:24:24.810 Stefan Robila: Or if you cannot identify the person then just send us an email to CSI queries and we will route it to the, to the right colleague 472 01:24:25.440 --> 01:24:37.110 Stefan Robila: But we would not be able to provide a very nuanced answer, because again, most of the banner, the participants in the current call may not necessarily be interested in that specific so 473 01:24:37.590 --> 01:24:41.010 Alan Sussman : Great. There's a geoscience question that's also requires somehow 474 01:24:41.490 --> 01:24:41.760 Stefan Robila: Right. 475 01:24:42.420 --> 01:24:57.240 Stefan Robila: Right, so, so we acknowledge those questions, the answer. That's always the question is basic thing, contact us to CSI point us to the right, division, and you can contact the person directly on. So, but we can route it for you if necessary. 476 01:25:05.610 --> 01:25:13.740 Stefan Robila: So we will stay up to five more minutes and we'll try to go to some of the questions as we scroll up and down as a reminder, if 477 01:25:14.520 --> 01:25:25.320 Stefan Robila: You have not had the chance to go through the slides, they will be posted our recording will also be posted. You have our email address CSI queries@nsf.gov 478 01:25:25.950 --> 01:25:38.910 Stefan Robila: And we will continue to monitor that email address, we're doing that data and we try to provide answers as quickly as possible. In some cases, the answer is not coming immediately what as soon as you expect because we are out in the traditional colleagues to provide feedback. 479 01:25:53.280 --> 01:26:01.050 Stefan Robila: I see a question about software testing how software testing emphasized in the proposed cyber infrastructure. We need to have innovative waste in software testing. 480 01:26:01.590 --> 01:26:13.350 Stefan Robila: You and I would I would note that you don't have to innovate any not any. You do not have to innovate in every possible aspect right is wherever it is appropriate. You do not have to change the way software is being developed. 481 01:26:14.850 --> 01:26:25.290 Stefan Robila: Just because you think that they should be innovative. This is not a software engineering research program, you have to focus on using established practices for the specific development effort. 482 01:26:27.270 --> 01:26:34.920 Stefan Robila: So yes, we expect software testing to be part of the process, because it is a standard software engineering component 483 01:26:49.170 --> 01:26:54.120 Stefan Robila: Must we show preliminary results are proven capabilities of our software to be considered for an award. 484 01:26:55.890 --> 01:27:00.240 Stefan Robila: There is a secondary question of what does increase the chances of an award. That's the second part that I will not answer. 485 01:27:01.890 --> 01:27:17.550 Stefan Robila: It is again dependent on the project. If you are, you have to use. You have to propose development based on methods and based on algorithms are based on previous results right so you cannot simply do the research. 486 01:27:18.480 --> 01:27:24.720 Stefan Robila: That will lead to the algorithm and then implement the algorithm as part of CSI, the research on the algorithm should have taken place somewhere else. 487 01:27:25.350 --> 01:27:32.520 Stefan Robila: So, so that's the part of preliminary says you have to have the software already built. The answer is no. It depends on what exactly you're doing 488 01:27:32.910 --> 01:27:43.920 Stefan Robila: You can have a model you can have a prototype, but it's not a requirement as you go to frameworks asking for a substantial amount of money for engagement of growth community, it becomes 489 01:27:45.030 --> 01:27:51.480 Stefan Robila: I would say a more important question. If something was done before. And how do you know that this particular tool would be valuable and 490 01:27:51.840 --> 01:28:02.040 Stefan Robila: Adopted by the community because we know that in some cases available to may not be adopted, so that's that's where the community engagement and mechanism to convince the users as it comes into place. 491 01:28:17.250 --> 01:28:21.540 Stefan Robila: If I send a one page summary, what kind of feedback I can get. I can expect typically 492 01:28:23.040 --> 01:28:31.740 Stefan Robila: In short, you can expect to get an answer that suggests that the type of for day to propose would be aligned or not aligned with CSI. 493 01:28:32.250 --> 01:28:38.880 Stefan Robila: And in some cases you may get additional feedback from colleagues that may state whether it is aligned with a specific 494 01:28:39.300 --> 01:28:52.320 Stefan Robila: Discipline or programmatic areas of interest. You may also get additional advice in terms of emphasizing specific things we would not provide feedback on the merits of the proposal, because that is a reserve to the review process. 495 01:29:01.740 --> 01:29:09.720 Stefan Robila: I see one related to education and training components for the project. Again, this has to be appropriate for the community to be engaged and 496 01:29:10.200 --> 01:29:13.470 Stefan Robila: If you are looking at the previous awards, you may see examples and then 497 01:29:14.130 --> 01:29:21.480 Stefan Robila: If you are a scientist, then you have to consider how did you learn to use a specific tool. And how did you switch from one environment to another. 498 01:29:21.900 --> 01:29:29.520 Stefan Robila: And consider how successful the those mechanisms war and then translate them in ways in which you ensure that your Cyber Infrastructure would be adopted. 499 01:29:38.010 --> 01:29:53.790 Stefan Robila: So we are three minutes before 330 and we have been live for an hour and 27 minutes we'll probably wrap up in two minutes and acknowledging that we still have a handful of questions, if we can answer them. We will answer them by email. And once we get the list. 500 01:29:56.820 --> 01:30:01.560 Stefan Robila: So if you have submitted an anonymous question. We can't answer it, because we don't know how to replied. 501 01:30:12.180 --> 01:30:17.550 Stefan Robila: So terrific Ellen or Robert, do you support any additional questions that we can quickly answer or 502 01:30:18.600 --> 01:30:22.830 Alan Sussman : So what about cyber physical infrastructure, there's one. He has very short questions. 503 01:30:22.860 --> 01:30:23.310 Stefan Robila: Is 504 01:30:23.400 --> 01:30:25.890 Stefan Robila: I saw it. It's just not clear to me how to answer. 505 01:30:26.670 --> 01:30:39.810 Alan Sussman : So I think here. The key is, is that you know that the hardware any hardware components to the project that this is not a hardware program. Right. It's a software and data program really so that you know definitely limited hardware. 506 01:30:41.550 --> 01:30:48.150 Alan Sussman : As part of the project that it shouldn't be really focused very heavily on certainly paying for hardware as part of the project. 507 01:30:49.710 --> 01:30:50.670 Alan Sussman : That fair enough. 508 01:31:05.370 --> 01:31:14.850 Stefan Robila: So I see questions again related to a specific domain such a CNS or is. And those are within a computer information science and engineering or other disciplines. And the question is, 509 01:31:15.720 --> 01:31:22.410 Stefan Robila: Can I seek support for development of cyber infrastructure that results from research in these areas. And the answer is yes, but the 510 01:31:23.790 --> 01:31:36.570 Stefan Robila: emphasis here is make sure that you understand they're not simply building it, but you are building it for a community, right. So, so you have to make sure that that the Community will be there to embrace it to adopt it, and you have mechanisms to reach out to them so simply just 511 01:31:36.990 --> 01:31:51.030 Stefan Robila: Do not consider the solicitation as a way to promote your research further because the our expert reviewers will see through this approach right there has to be clear and clearly anchored in a need for specific scientific problems. 512 01:31:59.070 --> 01:32:04.140 Stefan Robila: So I think with that, I think that we have answered everything that we could, if we missed one. 513 01:32:06.960 --> 01:32:11.310 Stefan Robila: Well, probably will reply directly by email. Yeah. 514 01:32:11.430 --> 01:32:15.330 Alan Sussman : There's only a small number of questions that would be difficult to answer. 515 01:32:15.780 --> 01:32:22.170 Stefan Robila: I do see the last one that came in, I will review give special considerations to the NSF and the representative regions. 516 01:32:23.640 --> 01:32:26.280 Stefan Robila: The review reviews the merits of the proposals. 517 01:32:28.230 --> 01:32:40.110 Stefan Robila: NSF considers all aspects of the proposal of the PR team of the institution of the region and it tries to have a balanced portfolio of four words and then support. 518 01:32:40.650 --> 01:32:50.010 Stefan Robila: There are initiatives within NSF, such as the program that emphasis is emphasizes specific states in terms of the balancing the funding. 519 01:32:51.240 --> 01:33:06.600 Stefan Robila: To the States and those are avenues that we are always and also working with, but the review process itself focuses on the merits and that includes also the broader impact in terms of engagement of of various communities. 520 01:33:16.230 --> 01:33:17.430 Alan Sussman : 330 Stefan. 521 01:33:17.610 --> 01:33:29.850 Stefan Robila: I think we are. Yes. I think we will wrap up. And again, as Amy noted, we have had over 500 attendees in the in the audience, and thank you for your patience and thank you for 522 01:33:30.210 --> 01:33:43.920 Stefan Robila: Putting up with us for an hour and a half. If you have additional questions, please send us to CSI queries@nsf.gov with a note that if tomorrow morning, we see if I find it questions, it will not be possible for us to respond very quickly. 523 01:33:44.940 --> 01:33:46.230 Stefan Robila: So then, bear with us. 524 01:33:47.430 --> 01:33:56.910 Stefan Robila: Thank you very much, everybody. Thank you very much, Amy and Bill and Robert and terrific. And I think Derek, we are ready to to close the webinar, do I close it or 525 01:33:59.880 --> 01:34:01.110 MEM AV TECH Derrick Hampton: I can take care of that for you. 526 01:34:01.320 --> 01:34:02.310 Stefan Robila: I thank you very much. 527 01:34:04.260 --> 01:34:04.650 MEM AV TECH Derrick Hampton: Thank you.