The Gula Tech Foundation operates a competitive grant process for cybersecurity nonprofits multiple times a year. Each grant competition will have a unique focus. Grant winners receive a financial donation and will have the opportunity to participate in an all-expenses-paid marketing program to elevate public awareness of their organization.
The Burroughs Wellcome Fund identified Innovation in Regulatory Science as an important, underfunded area. This initiative is designed to provide financial support to stimulate research efforts in this area. The program's focus is on providing support for academic researchers developing new methodologies or innovative approaches in regulatory science that will ultimately inform the regulatory decisions FDA and others make.
he Foundation’s mission is to support research to improve the lives of young people ages 5-25 in the United States. One way that the Foundation pursues this mission is by investing in high-quality field-initiated studies on reducing inequality in youth outcomes.
Career/ Life Paths of Women in Engineering, Computer Science, and Data Science/ Applied Mathematics
Cisco is seeking research proposals in the area of Software Defined Networking (SDN) that will allow complex networking functionality to be specified using target independent domain specific programming languages. Proposed research should investigate innovative approaches that enable advances in data-plane programming, network-wide policy specification, and compiler technology.
Even as Agile evolves to accommodate classical organization requirements and even security verification (e.g., Forrester’s “Agile-scrum-fall”), the need for advanced automated security assurance tools remains.
Cryptography is essential for information security, but existing cryptosystems do not always provide us with the protections that we need, and those cryptosystems will need to be adapted to meet emerging challenges. Research is need to drive improvements in several areas: robustness, postquantum security, suitability for the Internet of Things, and transparency to the user regarding the correctness and faithfulness of those systems.
Cisco anticipates that over the next decade, privacy concerns and cyber-risks to data will continue to rise and will drive our industry to take steps to significantly improve the ways we manage confidential, proprietary information (i.e. customer or financial data), intellectual property and PII (Personally Identifiable Information).
This call for research seeks to fund revolutionary approaches to detecting vulnerable devices, remediating identified vulnerabilities, and/or mitigating threats associated with vulnerable components by:
- Designing intelligent network defenses which dynamically detect and defendor quarantine vulnerable components using technologies such as software defined networking or virtualization
- Proactively securing vulnerable components with virtual patching or binary rewriting
- Increasing the complexity and cost of an attacker exploiting a vulnerable component with advancements in Moving Target Defenses (MTD)
- Devising novel design, development, and deployment methodologies for compartmentalizing vulnerability impact through application sandboxing, containerization, or virtualization
CISCO Research Center —Distributed Storage Systems: Coding, Caching, Data Management, and Hyperscale Data Centers
In this research, we are soliciting proposals to investigate the use of erasure and network coding techniques to make efficient use of data center resources in large scale distributed storage systems. The proposals should look into exploiting resources available in all tiers of the data center hierarchy, namely compute, memory, network and storage to maximize access to storage resources both under normal operation and during data recovery following failures.