All RFPs in Science & Technology

Gula Tech Foundation—Cybersecurity Grant Program

January 28, 2021

The Gula Tech Foundation operates a competitive grant process for cybersecurity nonprofits multiple times a year. Each grant competition will have a unique focus. Grant winners receive a financial donation and will have the opportunity to participate in an all-expenses-paid marketing program to elevate public awareness of their organization. 

Burroughs Wellcome Fund—Innovation in Regulatory Science

February 12, 2021

The Burroughs Wellcome Fund identified Innovation in Regulatory Science as an important, underfunded area. This initiative is designed to provide financial support to stimulate research efforts in this area.  The program's focus is on providing support for academic researchers developing new methodologies or innovative approaches in regulatory science that will ultimately inform the regulatory decisions FDA and others make. 

William T. Grant Foundation—Research Grants on Reducing Inequality

August 04, 2021

he Foundation’s mission is to support research to improve the lives of young people ages 5-25 in the United States. One way that the Foundation pursues this mission is by investing in high-quality field-initiated studies on reducing inequality in youth outcomes. 

Cisco Research and Open Innovation - Career/ Life Paths of Women in Engineering

Career/ Life Paths of Women in Engineering, Computer Science, and Data Science/ Applied Mathematics

CISCO Research Center - Software Defined Networks/ P4

Cisco is seeking research proposals in the area of Software Defined Networking (SDN) that will allow complex networking functionality to be specified using target independent domain specific programming languages. Proposed research should investigate innovative approaches that enable advances in data-plane programming, network-wide policy specification, and compiler technology.

CISCO Research Center - Security Assurance for Agile, Continuous Deployment, and DevOps

Even as Agile evolves to accommodate classical organization requirements and even security verification (e.g., Forrester’s “Agile-scrum-fall”), the need for advanced automated security assurance tools remains.

CISCO Research Center - Robust and Transparent Cryptography

Cryptography is essential for information security, but existing cryptosystems do not always provide us with the protections that we need, and those cryptosystems will need to be adapted to meet emerging challenges. Research is need to drive improvements in several areas: robustness, postquantum security, suitability for the Internet of Things, and transparency to the user regarding the correctness and faithfulness of those systems.

CISCO Research Center—Economic Impact of Cyber-risk

Cisco anticipates that over the next decade, privacy concerns and cyber-risks to data will continue to rise and will drive our industry to take steps to significantly improve the ways we manage confidential, proprietary information (i.e. customer or financial data), intellectual property and PII (Personally Identifiable Information).

CISCO Research Center -Threat Mitigation

This call for research seeks to fund revolutionary approaches to detecting vulnerable devices, remediating identified vulnerabilities, and/or mitigating threats associated with vulnerable components by:

  • Designing intelligent network defenses which dynamically detect and defendor quarantine vulnerable components using technologies such as software defined networking or virtualization
  • Proactively securing vulnerable components with virtual patching or binary rewriting
  • Increasing the complexity and cost of an attacker exploiting a vulnerable component with advancements in Moving Target Defenses (MTD)
  • Devising novel design, development, and deployment methodologies for compartmentalizing vulnerability impact through application sandboxing, containerization, or virtualization

CISCO Research Center —Distributed Storage Systems: Coding, Caching, Data Management, and Hyperscale Data Centers

In this research, we are soliciting proposals to investigate the use of erasure and network coding techniques to make efficient use of data center resources in large scale distributed storage systems. The proposals should look into exploiting resources available in all tiers of the data center hierarchy, namely compute, memory, network and storage to maximize access to storage resources both under normal operation and during data recovery following failures.

Pages