- IDEALS Home
- →
- National Center for Supercomputing Applications (NCSA)
- →
- Browse National Center for Supercomputing Applications (NCSA) by Title
Browse National Center for Supercomputing Applications (NCSA) by Title
Now showing items 176-195 of 195
-
(2019-03-25)Cyberinfrastructure is undergoing a radical transformation as traditional data centers are replaced by cloud computing. Cloud hosted applications tend to have a poorly defined network perimeter, large attack surfaces, and ...
application/pdf
PDF (42MB)
-
Trusted CI Webinar: The Trusted CI Framework; Toward Practical, Comprehensive Cybersecurity Programs (2019-06-24)In this presentation, we will present the motivations behind and structure for the Trusted CI Framework and related implementation guidance for research. We’ll field questions, as well as discuss opportunities for the ...
application/pdf
PDF (3MB)
-
(2018-04-23)Data-intensive science collaborations increasingly provision dedicated network circuits to share and exchange datasets securely at high speed, leveraging national-footprint research fabrics such as ESnet or I2/AL2S. This ...
application/vnd.openxmlformats-officedocument.presentationml.presentation
Microsoft PowerPoint 2007 (9MB)
-
(2020-08-11)"Transition to practice is really a passion of mine. It is wonderful to write papers and have great ideas. But it is even cooler to get a million people using it." – Professor Patrick Traynor. Join us to hear exciting ...
application/pdf
PDF (11MB)
-
(2019-10-28)The past few years have seen a resurgence of privacy laws around the globe, starting with the European Union’s General Data Protection Regulation (GDPR), but leading to proposed laws in South Korea, Brazil, and the United ...
application/pdf
PDF (2MB)
-
(2018-07-23)There has been an unprecedented increase in the quantity of research data available in digital form. Combining these information sources within analyses that leverage cloud computing frameworks and big data analytics ...
application/pdf
PDF (7MB)
-
(2020-12-07)The Trustworthy Data Working Group (TDWG) is a collaborative effort of Trusted CI, the four NSF Big Data Innovation Hubs, the NSF CI CoE Pilot, the Ostrom Workshop on Data Management and Information Governance, the NSF ...
application/pdf
PDF (8MB)
-
(2020-04-27)Algorithms and computers have been used for a long time in supporting decision making in various fields of human endeavors. Examples include optimization techniques in engineering, statistics in experiment design, modeling ...
application/pdf
PDF (4MB)
-
(2018-10-22)We're at an important stage in the history of science. The internet has dramatically accelerated the pace and scale of communication and collaboration. We have the computational resources to mine and discover complex ...
application/pdf
PDF (20MB)
-
(2020-07-20)Today’s collaborative science often utilizes massive datasets shared across great distances. With better access to data we ask harder questions: interactive data sources change the very science we do. These factors have ...
application/pdf
PDF (3MB)
-
(2019-02-11)Presentation at the 13th FIM4R Workshop: Federated Identity Management for Research Collaborations.
application/pdf
PDF (3MB)
-
(2019-07-30)The Trusted CI Workshop on Trustworthy Scientific Cyberinfrastructure provides an opportunity for sharing experiences, recommendations, and available resources for addressing cybersecurity challenges in research computing. ...
application/pdf
PDF (2MB)
-
(2019-06-18)The final report for the Trusted CI engagement with American Museum of Natural History (AMNH).
application/pdf
PDF (2MB)
-
(2018-11-21)Trusted CI final report of the 2018 engagement with the Environmental Data Initiative.
application/pdf
PDF (12MB)
-
(2020-07-21)Trusted CI First Principles vulnerability assessment with Open XDMoD.
application/pdf
PDF (126kB)
-
(2019-06-04)Final report of Trusted CI engagement with Open OnDemand
application/pdf
PDF (11kB)
-
(2019-06-17)Scientific computing and computational analysis are becoming integral aspects of virtually any field of science. Efforts of many research laboratories to produce scientific code frequently becomes unsustainable after the ...
application/pdf
PDF (27MB)
-
(2020-03-23)The final report of the Globus Auth First Principles Vulnerability Assessment.
application/pdf
PDF (819kB)
-
(2020-02-05)Final report of Trusted CI engagement with Singularity
application/pdf
PDF (946kB)
-
(2020-06-20)The final report of the Trusted CI engagement with University of California, Berkeley's Secure Research Data and Compute Platform (SRDC).
application/pdf
PDF (742kB)
Now showing items 176-195 of 195