In October 2018, NSF implemented the Domain-based Message Authentication, Reporting & Conformance (DMARC) email changes required by the Department of Homeland Security (DHS) to improve email security. Some email routing practices (such as auto-forwarding to personal email accounts and sending messages through third-party providers) may cause messages to be flagged as potentially fraudulent by DMARC security checks and blocked. If your email is auto-forwarded to another account, such as a personal email account, you may not receive emails from NSF in that forwarded account. More information about DMARC and email delivery from NSF.
This program has been archived.
Environmental Cyberinfrastructure Crosscutting Programs
|Elizabeth R. Blood||BIO/DEB||Patrick L. Brezonik|
|Alexandra Isern||GEO/OPP||Stephen Meacham||OD/OIA|
|Kevin L. Thompson||CISE/OAC|
Important Information for Proposers
A revised version of the NSF Proposal & Award Policies & Procedures Guide (PAPPG) (NSF 19-1), is effective for proposals submitted, or due, on or after February 25, 2019. Please be advised that, depending on the specified due date, the guidelines contained in NSF 19-1 may apply to proposals submitted in response to this funding opportunity.
Spatially extensive observing systems for environmental research, together with the increasingly interdisciplinary nature of research on the dynamics of complex environmental systems, create the need for a sophisticated information infrastructure to support these observing systems and to facilitate the integrated use of data from them. There are a number of questions about how to best construct such a cyberinfrastructure. To help answer these questions and to promote planning for Cyberinfrastructure for Environmental Observatories (CEO), this solicitation requests proposals for the development of practical environmental cyberinfrastructure prototypes along with a demonstration of their capability to answer significant environmental research questions. Proposals should be for projects that pursue an end-to-end approach to an information infrastructure prototype. Proposals should identify the types of data involved and the ways in which users might wish to use such data. The proposed projects should include the careful exploration of use cases followed by deployment of a prototype that implements these use cases.