Data-Intensive Computing at NSF Corporate Alliance June 18, 2008 Jeannette M. Wing Assistant Director Computer and Information Science and Engineering.

Slides:



Advertisements
Similar presentations
THE ROLE OF INSURANCE REQUIREMENTS WITHIN AN ORGANIZATION By Aaron Hardiman, MBA, ARM.
Advertisements

Tradition innovation Online Branding Kate Legg Solicitor.
Directorate for Mathematical and Physical Sciences Facilities and Cyberinfrastructure April 2, 2014 Advisory Committee for Cyberinfrastructure Wayne Van.
Topics Changes Risk Assessments Cloud Data Security / Data Protection Licenses, Copies, Instances Limits of Liability and Indemnification Requests for.
Susan Wyatt Sedwick, PhD, CRA Associate Vice President for Research and Director, Office of Sponsored Projects Export Controls and Deemed Exports.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
The Gathering Cloud computing - Legal considerations David Goodbrand, Partner 28 February 2013 Aberdeen Edinburgh Glasgow.
University Contracting The University of Arizona Contracting & Research Services (CRS)
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
CS CS 5150: Software Engineering Lecture 5 Legal Aspects of Software Engineering 1.
NSF Data Management Plan Requirements Alex Kanous
1 Supplemental line if need be (example: Supported by the National Science Foundation) Delete if not needed. Supporting Polar Research with National Cyberinfrastructure.
Security Policies Group 1 - Week 8 policy for use of technology.
Future Directions for NSF Advanced Computing Infrastructure to support US Science in ACCI meeting April 2, 2014 Jon Eisenberg Director, CSTB.
NSF Vision and Strategy for Advanced Computational Infrastructure Vision: NSF Leadership in creating and deploying a comprehensive portfolio…to facilitate.
1 Building National Cyberinfrastructure Alan Blatecky Office of Cyberinfrastructure EPSCoR Meeting May 21,
Information Asset Classification
Susanne Hambrusch Division of Computing and Communication Foundations (CCF) CISE Directorate National Science Foundation June 28, 2012.
Statewide IT Conference, Bloomington IN (October 7 th, 2014) The National Center for Genome Analysis Support, IU and You! Carrie Ganote (Bioinformatics.
Computer and Information Science and Engineering (CISE) Jeannette M. Wing Assistant Director The Computing (R)Evolution … 2010 Credit: Apple,
Middleware Promises Warranties that Don’t Indemnities that Won’t Stephen Rubin, Esquire
1 Brown Bag Luncheon Series Training 09/25/2008 EXPORT CONTROLS AT YALE.
Export Control and Trade Sanctions: An Overview Loraine J. Hudson Director of Research Facilitation and Dissemination April 7, 2015.
Presented By the Office of Research Integrity & Assurance.
Export Control Basics James E. Peterson, Ph.D. Associate Vice Chancellor for Research Office of Sponsored Research.
BRAIN: Brain Research through Advancing Innovative Neurotechnologies Announced by President Obama in February 2013 as part of FY 2014 Budget Request to.
1 Module 4: Post-Award Administration of Sponsored Projects (Part 1) Office of Research and Sponsored Programs The University of Mississippi 100 Barr Hall.
Responsible Conduct of Research (RCR) Farida Lada October 16, 2013
Operating Systems AOIT Principles of Information Technology.
Adding Genes This presentation gives a quick overview on how to add Genes to Osprey.
After completing this lesson, participants will be able to:  Identify ethical, legal, and policy issues for managing research data  Define copyrights,
Elements of a Data Management Plan Bill Michener University Libraries University of New Mexico Data Management Practices for.
00870B2F.0/Internet%20Safety.jpg.
RNA-Seq 2013, Boston MA, 6/20/2013 Optimizing the National Cyberinfrastructure for Lower Bioinformatic Costs: Making the Most of Resources for Publicly.
Export Controls in a University Research Setting DFA Monthly Meeting Stanford University School of Medicine December 15th, 2006.
Computing and Communications and Biology Molecular Communication; Biological Communications Technology Workshop Arlington, VA 20 February 2008 Jeannette.
Custom Software Development Intellectual Property and Other Key Issues © 2006 Jeffrey W. Nelson and Iowa Department of Justice (Attach G)
May 28, 2009Great Plains Network meeting, Kansas City 1 Some NSF funding opportunities Terry Langendoen (703) Expert, Robust.
NSF Programs and Possibilities Research Linkages EU-US 23 September 2004 Sylvia Spengler US National Science Foundation.
Training II: Software, Publications, IP, and Export Control Issues L. Meixler Many researchers tend not to regard software as IP. They often share software.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
How to Publish Your Code on COIN-OR Bob Fourer Industrial Engineering & Management Sciences Northwestern University COIN Strategic Leadership Board.
Organizational Structure Coordination and Leadership Group (CLG) AD Council BIOCISEEHRENGGEOMPSSBE OIIA Charge: Coordinating NSF’s cyberinfrastructure.
FEDERAL UPDATE Jeff Warner Senior Contract and Grant Officer Alisia Ford Contract and Grant Officer Spring QRAM - Tuesday, March 12, 2013.
Changing Databases This presentation gives a quick overview on how to change databases in Osprey.
Data-Intensive Computing at NSF Data-Intensive Computing Symposium, Yahoo!, Sunnyvale, CA March 26, 2008 Jeannette M. Wing Assistant Director Computer.
Public Access: Update on Progress National Science Foundation April 2, 2014.
Support for Basic Research at the National Science Foundation Jeannette M. Wing Assistant Director Computer and Information Science and Engineering Directorate.
Chaitan Baru Senior Advisor for Data Science CISE Directorate National Science Foundation NIEHS Webinar October 27, 2015 Image Credit: Exploratorium. Integrating.
NATIONAL CONFERENCE Intellectual Property Policies for Universities and Innovation dr. sc. Vlatka Petrović Head, Technology Transfer Office Acting Head,
Network Science and Engineering Jeannette M. Wing Assistant Director Computer and Information Science and Engineering Directorate National Science Foundation.
Institutional Repositories July 2007 Intellectual property management : the DISA experience Dr D Peters DISA: Digital Innovation South Africa.
{ Tanya Chaturvedi MBA(ISM) Hadoop is a software framework for distributed processing of large datasets across large clusters of computers.
Introduction to Webinar on Upcoming ACI Solicitations March 3, 2016 Amy Friedlander Deputy Division Director Division of Advanced Cyberinfrastructure/NSF.
Lecture 11. Intellectual Property SPRING 2016 GE105 Introduction to Engineering Design College of Engineering King Saud University.
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
Division Director: NSF CISE CCF
Article 4 [Obligations of Applicant] 4.1. As a sole and exclusive owner of the Application, Applicant warrants that.
INDEMNITY The University of Texas System Office of General Counsel Dana Hollingsworth, Attorney.
Technology Transfer Office
Contracts A contract is an agreement between two or more parties which creates an obligation to do or not to do a particular thing. The document containing.
Organizations Are Embracing New Opportunities
Models for Resources and Management
Matt Link Associate Vice President (Acting) Director, Systems
Attention! In order to print this two-page flyer, please follow these steps: 1) Personalize the text and logo area with your custom copy and logo. 2) Delete.
Assistant Director, NSF Computer & Information Science & Engineering
Agreements OSR Symposium
Open Access and Compliance with NIH Public Access Policy
Presentation transcript:

Data-Intensive Computing at NSF Corporate Alliance June 18, 2008 Jeannette M. Wing Assistant Director Computer and Information Science and Engineering Directorate Thanks to the NSF team: Dan Atkins, Debbie Crawford, Haym Hirsh, Jim French, Stephen Meacham, …

2Data-Intensive ComputingJeannette M. Wing Science Story

3Data-Intensive ComputingJeannette M. Wing How Much Data? NOAA has ~1 PB climate data (2007) Wayback machine has ~2 PB (2006) CERN’s LHC will generate 15 PB a year (2008) HP building WalMart a 4PB data warehouse (2007) Google processes 20 PB a day (2008) “all words ever spoken by human beings” ~ 5 EB Int’l Data Corp predicts 1.8 ZB of digital data by K ought to be enough for anybody.

4Data-Intensive ComputingJeannette M. Wing Convergence in Trends Drowning in data Data-driven approach in computer science research –graphics, animation, language translation, search, …, computational biology Cheap storage –Seagate Barracuda 1TB hard drive for $195 Growth in huge data centers Open Source “MapReduce” programming model

5Data-Intensive ComputingJeannette M. Wing “Work” w1w1 w2w2 w3w3 r1r1 r2r2 r3r3 “Result” “worker” Partition Combine Master Divide and Conquer

6Data-Intensive ComputingJeannette M. Wing Data-Intensive Computing Sample Research Questions Science –What are the fundamental capabilities and limitations of this paradigm? –What new programming abstractions (including models, languages, algorithms) can accentuate these fundamental capabilities? –What are meaningful metrics of performance and QoS? Engineering –How can we automatically manage the hardware and software of these systems at scale? –How can we provide security and privacy for simultaneous mutually untrusted users, for both processing and data? –How can we reduce these systems’ power consumption? Users –What (new) applications can best exploit this computing paradigm?

7Data-Intensive ComputingJeannette M. Wing NSF’s Interest in Data-Intensive Computing Broad interest, (potentially) long-term CISE –Cross-directorate: CCF, CNS, IIS –Short-term: CluE To provide the broad academic community access to large-scale computing cluster and massive data sets –Longer-term: Look for cross-cutting theme in FY09 solicitation NSF –Potentially cross-foundational, e.g., via Cyber-enabled Discovery and Innovation (CDI); CISE, OCI, MPS, ENG, … –Why? Scientists are drowning in data!

8Data-Intensive ComputingJeannette M. Wing CluE: Cluster Exploratory Google+IBM cluster software and services –Same as Academic Computing Cluster provided for six universities (announced last October) Seed program by NSF –$5M will fund SGERs and regular awards –Solicitation released; July 17 proposal deadline. –Jim French (IIS Program Director) Hope: CluE will be a wild success and community interest and demand will be high

9Data-Intensive ComputingJeannette M. Wing Google+IBM Cluster Cluster –1600+ processors, terabytes of memory, hundreds of terabytes of storage, internal networking –External network connection Software –Linux –Hadoop (written by Yahoo!): Open Source version of Google’s MapReduce, Google File System –IBM Tivoli: management, monitoring and dynamic resource provisioning of the cluster Services –Operations and maintenance, including staff, loading data and programs, energy costs

10Data-Intensive ComputingJeannette M. Wing Legal Issues

11Data-Intensive ComputingJeannette M. Wing The Partnership: Roles Google and IBM –Provide data cluster, user support, scheduling, NSF –Review proposals, identify awardees, funding Universities –Propose and execute research plans on data cluster

12Data-Intensive ComputingJeannette M. Wing The MOU Codify the roles Establish restrictions to comply with export law Prescribe the need for “usage agreement” –Remove NSF from this industry/university process and raise awareness of university sensitivities

13Data-Intensive ComputingJeannette M. Wing The Usage Agreement Sets out terms and conditions for use of the hardware/software suite Three significant issues –Indemnification State universities prevented by constitution or law from signing Private universities will not sign as a matter of policy –Export control Barrier to university mission. May prohibit access by some students. –Intellectual Property Jury is out on this. Part of 1 on 1 negotiation.

14Data-Intensive ComputingJeannette M. Wing Indemnification Example University and Corporation each agree to defend, indemnify and hold harmless the other respective parties for and against any losses damages or claims for damages arising from the wrongful acts or omissions of their respective officers, employees, students or agents (including, without limitation, University Students and University Personnel) in connection with the exercise of their rights and the performance of their obligations under this Agreement, including but not limited to … Asymmetric: We agree not to sue each other but University pays cost of defending Corporation should it be sued based on something a University person did.

15Data-Intensive ComputingJeannette M. Wing Export Control Example Specifically, unless authorized by appropriate government license or regulations, you agree not to export, directly or indirectly, any technology, software or commodities provided by Corporation or their direct product (including software developed by you on the Corporate systems) to any of the following countries or to the nationals of any of the following countries, wherever they may be located: Cuba, Iran, Sudan, Syria, and North Korea. Explicit Country List discriminates against students from those countries who may be enrolled in University.

16Data-Intensive ComputingJeannette M. Wing Interesting Logistical Issues How do you allocate the resource? –A “rack week” is not a unit of measurement a typical researcher could relate to How do you get the data on/off the resource? –Sending terabytes of data over the net is slow.

17Data-Intensive ComputingJeannette M. Wing Academia-Industry-Government Partnership Win-win-win for all New model for NSF –CISE is breaking new ground at NSF (in many ways) NSF/CISE welcomes –Other corporations to participate in Data-Intensive Computing effort and other efforts in the future –This and other new models of A-I-G partnerships

18Data-Intensive ComputingJeannette M. Wing Thank you!

19Data-Intensive ComputingJeannette M. Wing Credits Copyrighted material used under Fair Use. If you are the copyright holder and believe your material has been used unfairly, or if you have any suggestions, feedback, or support, please contact: Except where otherwise indicated, permission is granted to copy, distribute, and/or modify all images in this document under the terms of the GNU Free Documentation license, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation license” (