Cyberinfrastructure Roles & Responsibilities

Cyberinfrastructure ITS Teams

Cyberinfrastructure Service Hub Team
  • The goal of the Cyberinfrastructure Service Hub Team is to enable members of the various service teams, managers and projects (Science DMZ, Ceph Storage, Hummingbird Cluster) to interface so that research infrastructure services evolve according to a shared understanding of strategic direction and priority.
  • This team of leaders from the Academic Divisional Computing, Core Technologies and Research and Faculty Partnerships groups within ITS, are dedicated to support and promote computational resource environment that will meet the needs and expand the capabilities of researchers across the campus and beyond.

Consulting with Researchers

  • Recommend solutions and/or options in the terms of systems, tools, integration, hardware and software to help researchers maximize their project funds and resources by investigating what existing Cyberinfrastructure service components can be leveraged
  • Provide consultation services for how to connect to the Science DMZ, Hummingbird HPC, Data Center physical hosting, or other Cyberinfrastructure components
  • Provide an estimate for one-time and ongoing costs for direct connection to the Science DMZ, for connections outside the Data Center

Implementation & Access

  • Collaborate with the development of specifications for new equipment
  • Configure hardware, software, and operating systems

Operations & Maintenance

  • Optimize and maintain the Cyberinfrastructure environment, such as the network stack for high-speed data transfer

Research Teams


  • If a connection outside the ITS Data Center at speeds above 1 Gbps is required, costs are a client responsibility
  • Review related services

Implementation & Access

  • Help select system/network hardware and software
  • Participate in development of specifications for new equipment

Operations & Maintenance

  • Learn how to use tools, such as Globus
  • Move data to the Data Transfer Network (DTN)
  • Review ESnet usage policy
  • Maintain your hosts in accordance with security best practices