skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Northeast Cyberteam: Workforce Development for Research Computing at Small and Mid-sized Institutions
Computing has become an essential component of research and education for nearly every scientific discipline. Meeting the need for support staff who can help faculty make the best use of available computing resources is a significant challenge for small and mid-sized institutions. The NSF-sponsored Northeast Cyberteam is addressing this challenge by building a pool of research computing facilitators that can be shared across institutional boundaries while also developing self-service tools that reduce the support burden.  more » « less
Award ID(s):
1659377
PAR ID:
10225097
Author(s) / Creator(s):
; ; ; ; ; ;
Date Published:
Journal Name:
Practice and Experience in Advanced Research Computing (PEARC ’20)
Page Range / eLocation ID:
402 to 406
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    Computing has become an essential component of research and education for nearly every scientific discipline. Meeting the need for support staff who can help faculty make the best use of available computing resources is a significant challenge for small and mid-sized institutions. The NSF-sponsored Northeast Cyberteam is addressing this challenge by building a pool of research computing facilitators that can be shared across institutional boundaries while also developing self-service tools that reduce the support burden. The Cyberteam Portal, developed to support the Northeast Cyberteam has enabled adoption of program methods by other communities of practice and collaboration with the broader research computing community. 
    more » « less
  2. In any research computing (RC) environment, the role of the user support group is a combination of education, consulting, and outreach. As this role is the most public-facing of a research computing group's team, it is important to ensure an excellent level of support is provided to users. The Research Computing group at the University of Colorado (CURC) Boulder maintains a large-scale computing cluster with several hundred active users, among other services, and has done so since 2011. The user support group at CURC provides a variety of services intended to support these users. This paper describes those services the CURC group provides, as well as explores the various ways that these services have been improved in 2018-19. The impact on users is also assessed. 
    more » « less
  3. This paper offers a synthesis on computing identity and the experiences of women and minoritized populations in computing and computer science in higher education. Examining computing identity and its role in the computing experiences of minoritized undergraduates can help us better understand ways to engage and support women and minoritized individuals in the computing field thus increasing participation and persistence of these groups in computing. In this article, we present a review of research literature on computing identity within the experiences of women and minoritized undergraduate students in computing. The research questions guiding this work are: (1) What research literature exists about computing identity?, (2) According to existing literature, what are the experiences of women and racially minoritized undergraduates in computing (e.g., persons who identify as Black, Hispanic/Latinx, Indigenous people)?, and (3) What theoretical frameworks are used to guide existing computing identity literature? Emergent themes include the need to focus on exposure to computing, persistence, career expectations, and engagement. While there is no consensus on a computer identity framework, there is research guided by social cognitive career theory, social identity theory, and practice theory. We conclude that computing identity, including its multiple conceptualizations, offers multiple opportunities for informing and broadening participation of minoritized populations in computing. Future research should include further conceptual exploration of computing identity. 
    more » « less
  4. null (Ed.)
    The necessity and benefits of broadening participation in computing and the roles that computing programs must play in addressing this challenge have been well documented. Elevating the social value of computing has been advocated as an approach to increasing the appeal of computing to both women and other underrepresented groups. This poster adds empirical support for that approach. It reports on the analysis of projects selected by students over four years of a two-semester senior capstone. In this capstone students select Free and Open Source Software (FOSS) communities with which to engage. The students learned about FOSS principles and processes and were introduced to humanitarian FOSS (HFOSS). They completed pre-semester surveys and engaged in a three-stage project selection process. The types of projects that students considered (FOSS or HFOSS) support the assertion that computing with social value is appealing to both females and students in underrepresented groups. Analysis of pre-semester attitude surveys adds additional insight and suggests further avenues for investigation. 
    more » « less
  5. This paper discusses the benefits that can be enjoyed from the possible applications of quantum computing to the aerospace sector. It discusses these benefits for various tasks and applications such as artificial intelligence, key distribution and simulation. The challenge of determining what aerospace applications will be best allocated to quantum devices is also discussed. The method for best utilizing quantum computing for aerospace applications is also considered and the benefits of a grid-based implementation of computational resources are discussed. A collection of network-connected heterogenous devices could be used to support the effective use of computational resources. It could be used for the operations and development of simulations as well as machine learning and other software applications. This paper also presents a summary of potential use-cases, as well as a discussion of the work necessary to expedite the process of quantum computing development. 
    more » « less