Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Strategies

University plays leading role in $10 million cyberinfrastructure initiative

  • University of Colorado Boulder
  • May 13, 2022
Courtesy: CFE Media and Technology
Courtesy: CFE Media and Technology
Total
0
Shares
0
0
0
0

The CU Boulder-led initiative—MATCH, or Multi-tier Assistance, Training and Computational Help—is part of a larger program called Advanced Cyberinfrastructure Coordination Ecosystem: Services and Support (ACCESS). ACCESS is replacing the Extreme Science and Engineering Discovery Environment (XSEDE), which has been the leading program for NSF-funded cyberinfrastructure in the U.S. for the past eleven years.  

According to the NSF, ACCESS “aims to establish a suite of cyberinfrastructure coordination services — meant to support a broad and diverse set of requirements, researchers and modes from all areas of science and engineering research and education — set up as five independently managed yet tightly cooperative service tracks supported by a coordination office.” 

One of the five ACCESS tracks, MATCH is spearheaded by CU Boulder’s Research Computing group. Other organizations participating in MATCH include the Massachusetts Green High Performance Computing Center (MGHPCC), University of Southern California Information Sciences Institute, the Ohio Supercomputer Center, and the University of Kentucky. MATCH proposes a new model for cyberinfrastructure (CI) support services that reflects significant changes in the size and composition of the user group community.

“CU Boulder and our MATCH collaborators will lead this groundbreaking effort nationally by leveraging existing tools, interfaces and community experts to assist researchers using NSF-funded cyberinfrastructure to most effectively conduct their research,” said Dr. Shelley Knuth, assistant vice chancellor of Research Computing at CU Boulder and MATCH principal investigator. “This project will have a transformative impact on the national research cyberinfrastructure.” 

MATCH will:

  • Leverage modern information delivery systems and simplify user interfaces to provide cost-effective scaled support to a broader community
  • Engage experts from the community to develop training materials and instructions to reduce the user learning curve for an expanding range of systems, applications and computational techniques
  • Employ a matchmaking service that will maintain a database of specialist mentors and student mentees that can be matched with projects that provide the domain-specific expertise needed to leverage ACCESS resources

The MATCH project will include the Pegasus workflow-management system; Open OnDemand, an interactive interface to remote computing resources; and the Connect.CI portal currently led by the Northeast Cyberteam in the framework for the multi-tiered approach to support.

The effort will be discussed in a co-located event at the 2022 Practice and Experience in Advanced Research Computing (PEARC) conference that will be held July 10–14 in Boston, Massachusetts. 

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

University of Colorado Boulder

Related Topics
  • CFE Content
  • Featured
Previous Article
Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
  • Strategies

Locking down team communication can help control information

  • Rick Farrell
  • May 4, 2022
Read More
Next Article
Courtesy of CFE Media and Technology
  • Strategies

University joins consortium to enhance cybersecurity

  • Laurie Fickman
  • May 16, 2022
Read More
You May Also Like
Courtesy: Brett Sayles
Read More

How to implement layered industrial cybersecurity in volatile times

Read More

Will CISA recommend securing industrial control systems?

Courtesy: CFE Media and Technology
Read More

Shields up for industrial control systems

Courtesy: CFE Media and Technology
Read More

Improve two-factor authentication system security

Courtesy of CFE Media and Technology
Read More

University joins consortium to enhance cybersecurity

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
Read More

Locking down team communication can help control information

Courtesy of: Verve Industrial
Read More

Six steps to effective patch management

Image courtesy: Brett Sayles
Read More

White House urges private companies to strengthen cybersecurity

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT