skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Northeast Cyberteam: Workforce Development for Research Computing at Small and Mid-sized Institutions
Computing has become an essential component of research and education for nearly every scientific discipline. Meeting the need for support staff who can help faculty make the best use of available computing resources is a significant challenge for small and mid-sized institutions. The NSF-sponsored Northeast Cyberteam is addressing this challenge by building a pool of research computing facilitators that can be shared across institutional boundaries while also developing self-service tools that reduce the support burden.  more » « less
Award ID(s):
1659377
PAR ID:
10225097
Author(s) / Creator(s):
; ; ; ; ; ;
Date Published:
Journal Name:
Practice and Experience in Advanced Research Computing (PEARC ’20)
Page Range / eLocation ID:
402 to 406
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    Computing has become an essential component of research and education for nearly every scientific discipline. Meeting the need for support staff who can help faculty make the best use of available computing resources is a significant challenge for small and mid-sized institutions. The NSF-sponsored Northeast Cyberteam is addressing this challenge by building a pool of research computing facilitators that can be shared across institutional boundaries while also developing self-service tools that reduce the support burden. The Cyberteam Portal, developed to support the Northeast Cyberteam has enabled adoption of program methods by other communities of practice and collaboration with the broader research computing community. 
    more » « less
  2. In any research computing (RC) environment, the role of the user support group is a combination of education, consulting, and outreach. As this role is the most public-facing of a research computing group's team, it is important to ensure an excellent level of support is provided to users. The Research Computing group at the University of Colorado (CURC) Boulder maintains a large-scale computing cluster with several hundred active users, among other services, and has done so since 2011. The user support group at CURC provides a variety of services intended to support these users. This paper describes those services the CURC group provides, as well as explores the various ways that these services have been improved in 2018-19. The impact on users is also assessed. 
    more » « less
  3. This paper offers a synthesis on computing identity and the experiences of women and minoritized populations in computing and computer science in higher education. Examining computing identity and its role in the computing experiences of minoritized undergraduates can help us better understand ways to engage and support women and minoritized individuals in the computing field thus increasing participation and persistence of these groups in computing. In this article, we present a review of research literature on computing identity within the experiences of women and minoritized undergraduate students in computing. The research questions guiding this work are: (1) What research literature exists about computing identity?, (2) According to existing literature, what are the experiences of women and racially minoritized undergraduates in computing (e.g., persons who identify as Black, Hispanic/Latinx, Indigenous people)?, and (3) What theoretical frameworks are used to guide existing computing identity literature? Emergent themes include the need to focus on exposure to computing, persistence, career expectations, and engagement. While there is no consensus on a computer identity framework, there is research guided by social cognitive career theory, social identity theory, and practice theory. We conclude that computing identity, including its multiple conceptualizations, offers multiple opportunities for informing and broadening participation of minoritized populations in computing. Future research should include further conceptual exploration of computing identity. 
    more » « less
  4. null (Ed.)
    The necessity and benefits of broadening participation in computing and the roles that computing programs must play in addressing this challenge have been well documented. Elevating the social value of computing has been advocated as an approach to increasing the appeal of computing to both women and other underrepresented groups. This poster adds empirical support for that approach. It reports on the analysis of projects selected by students over four years of a two-semester senior capstone. In this capstone students select Free and Open Source Software (FOSS) communities with which to engage. The students learned about FOSS principles and processes and were introduced to humanitarian FOSS (HFOSS). They completed pre-semester surveys and engaged in a three-stage project selection process. The types of projects that students considered (FOSS or HFOSS) support the assertion that computing with social value is appealing to both females and students in underrepresented groups. Analysis of pre-semester attitude surveys adds additional insight and suggests further avenues for investigation. 
    more » « less
  5. As research projects grow more complex and researchers use a mix of tools - command-line scripts, science gateways, and Jupyter notebooks - it becomes increasingly difficult to track exactly how a final result was produced. Each tool often keeps its own logs, making it hard to reconstruct the full sequence of computational steps. This lack of end-to-end visibility poses a serious challenge for scientific reproducibility. Yet advanced computing remains a critical part of nearly every field of academic research, and researchers continue to rely on a wide range of interfaces to run their scientific software. To address this challenge, the Advanced Computing Interfaces group at the Texas Advanced Computing Center (TACC) created a system that collates logs from multiple sources - science gateways, Jupyter notebooks, and the Tapis platform - into one unified “audit trail.” The TACC Research Audit and Integration of Logs (TRAIL) system allows researchers and staff to follow the complete path a dataset or file took: from the moment it was first uploaded to TACC, through every step of computation, to the final result. This kind of tracking helps ensure scientific results can be reproduced and gives advanced computing services better insight into how data and resources are being used. 
    more » « less