Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Image Modified


Section
bordertrue

Focus: Presentation skills,  public speaking skills

The Future Talent Programme's Lightning Talk Challenge isa programme for (FTP22) offers students and young professionals an opportunity to present their ideas on stage as part of the TNC Lightning Talk programme. Nominated by GÉANT project or idea to an international audience at GÉANT's annual TNC conference.  Nominated by GÉANT project partners, participants undergo series of are given training to help them master presentation skills and prepare participants for an impactful presentation at the actual event, if their proposal is accepted an impactful presentation.

FTP22 challenges participants to present their research or idea as a 5-minute "Lightning Talk" at the TNC Conference which will be held from 13 - 17 June 2022 in Trieste, Italy. Participants whose proposals are selected by the TNC Programme Committee . In addition, participating in the challenge gives students the chance to building an international network of peers through the virtual workshops where they will learn new skills and practice their presentations together.  Participants whose proposal gets selected for the conference will be invited to TNC21.

Note

TNC21 Official statement:

"In the uncertain times caused by the events that have been affecting our world in 2020 we have been evaluating all possible options regarding the format of TNC21. At this stage we know that the event preparation and the conference will be different from previous years, but we’re planning accordingly and will keep our community up to date as regularly as possible.
Our plans are to host, together with Jisc, a hybrid conference in Brighton, UK where the physical and virtual elements will coexist.
In February 2021 we will make a final decision about the structure of our flagship event and we will promptly notify the community."

('finalists') will be invited to participate in the TNC conference and their travel fees paid*.  


* Participation in the TNC Lightning Talk Programme will be in accordance with TNC's rules and formats. These will be affected by the special circumstances the world lives in today. Please read the official statement at the TNC22 website.

 

Image Removed

part at TNC22


FAQ STUDENTS


Column

What's included

Students and young professionals will learn how to pitch their proposal and deliver a powerful presentation. The virtual workshops offer a safe environment where participants can learn and practise together, and is often a good place to build a network of peers. In addition, all participants are invited to showcase the end result of their learning in a self-recorded video which may be published through GÉANT media channels. 

Column

What’s included

  • Practical and interactive workshops under the guidance of a professional public speaking coach for all participants
  • Video presentation support
  • 1:1 coaching on public speaking  for 'finalists'
  • *Travel package fees + full conference pass to TNC20 for finalists
Requirements
  • for finalists (see the above statement*) The hosting NREN is asked to pre-pay the flights for the students and claim the cost back from GN4-4-WP5-T1 through its regular monthly cost claims.

Requirements 

  • This challenge is open to individuals i) students who are registered on any IT & networking (-related ) course (s) at a university , college or or learning provider and ii) young professionals working in IT & networking-related areas.
  • All participants must be nominated by the operating NREN/GÉANT Project Partnera GÉANT member NREN. If in doubt, applicants should select the NREN in the country where they study or work from this list of GEANT members.
  • The lightning The Lightning talk idea must be associated with computer networking or any other technology-related areas. 
  • Lightning talk proposals must include: title, participant name, educational institution, short biography, five keywords, and short introduction of the idea (max. 500 words). Abstract must be marked [Topic title + FTP20FTP]
  • Participants commit themselves to attend the full training programme and therefore must have access to a computer with a webcam to join the webinar(3 virtual workshops in April-May)  
  • Finalists commit to present their proposal at TNC 2022 if selected
  • Excellent command of the English language, both spoken and written

What is required of the NREN  

If you are a NREN, this programme gives you great exposure in the R&E community and may help to strengthen relations with your institutional partners and users. To participate the NREN must:

  • Be a member of the GÉANT GN4-3 Project
  • Be willing to recruit, select and administer the registration of up to 3 candidates 
  • Offer students a local contact (mentor) to support, encourage or promote participants locally.

What is the role of GLAD

GLAD is committed to:

  • Providing training workshops designed to improve participants' public speaking skills.
  • Liaising with NRENs and their candidate(s).
  • Paying successful participants' travel and conference fees for attendance at the TNC conference
  • Selected participants will present at TNC20
  • High English language proficiency is required
  • All participants are invited to share their experiences on social media.


How to Apply (NRENs)

Step 1 Register  Register your candidate online until 28 February 2020 with a brief description of the candidate's topic.

Step 2  All accepted candidates will become participants of the Future Talent Programme and will receive the training. Your participant takes participant takes part in the e-virtual training workshops in March April and AprilMay. Dates and Programme will be confirmed to you and your participant by email.  

Step 3 Participants Participants submit their Lightning Talk proposal to TNC Programme Committee by 09 14 March 20202022, midnight CET. 

Step 4 Participants will be notified by notified by the TNC Programme Committee  of Committee  of the acceptance or rejection of the proposalproposal 

Step 5 Selected candidates Selected participants ('finalists') take further training and take centre stage at TNC20

Timeline 

28.02.21Registration deadline
Mar11TNC21 Lightning Talk Submission deadline
May21Welcome + Training Programme
Jun21Participation in TNC21







Section
bordertrue

Media & Downloads

The Future Talent Programme challenges students to take part in TNC21 | GÉANT CONNECT Online

Promotion video FTP  

Future Talent Programme 2020 Finalists 

Future Talent Programme 2019 Conquering the TNC Stage 30/07/2019, CONNECT magazine

Amazing TNC19 experience for Future Talents July 2, 2019 Learning.org

Future Talents are ready for TNC19 Lightning Talks 14/06/2019, Learning.org


Submit Registration

https://events.geant.org/event/512/

Registration deadline
11 March 2022 12:00 PM CET

registration is closed


Section

Schedule   

11 March 2022 12:00PM CET
Deadline for NRENs to register candidates for the programme
 
https://events.geant.org/event/512/ 

14 March 2022   
Submission deadline for candidates to send Lightning Talk proposal to TNC22
https://tnc22.geant.org/submission-guidelines/

April 2022 
Acceptance/rejection Lightning Talk proposals by TNC22 Programme Committee

April  - May 2022   
Public speaking workshops  

13 - 17 June 2022  
TNC22, Trieste, Italy



Section

FAQ (NRENs)

Expand
titleWho can participate in this programme?

Any early career candidate nominated by a GÉANT Project NREN partner studying at a university or college in a GÉANT partner country, or working at a GÉANT NREN.


Expand
titleHow many candidates can you nominate for the programme?

Depending on the number of  candidates in the programme, a maximum of 3 candidates per NREN.


Expand
titleWhat kind of candidates should NRENs look for?

Ideal candidates: (under) graduate, master and PhD students (possibly interns at the NREN), who want to commit time and energy to learn and develop beyond the basic university programme.


Expand
titleWhat kind of topic can be submitted for a lightning talk

The subject matter of each presentation could be any idea, project or research or innovation the candidates have been working on which addresses a technical, economic, legal, security or environmental aspect in any IT and networks field. (see former topics below)


Expand
titleHow does selection and recruitment take place? done

We expect NRENs to select and nominate a maximum of 3 candidates. All nominated candidates who comply with the programme requirements (see Requirements) will be admitted to the Future Talent Programme. The acceptance of the participant's proposal for the Lightning Talk programme at TNC will be the exclusive decision of the TNC Programme Committee without any interference of the Future Talent Programme. The Future Talent candidate competes with all the other proposals submitted for the conference. Winning proposals are selected based on originality and clarity. 


Expand
titleWhat do you need to send to Future Talent Programme to nominate a candidate?

A complete application includes the online registration at https://events.geant.org/event/512/ including the mentor's contact details, the candidate’s contact details,  university and a short description of the topic the candidate wants to submit as a Lightning Talk. The application must be submitted by 14 March 2022


Expand
titleWhat will be your role as a host and mentor?

Your role as a mentor is to engage with your candidate on a regular basis during the programme, provide encouragement and advice throughout the programme and attend related events. If your candidate is selected to present at TNC, we encourage you to support him or her during the conference. All candidates' costs are funded by the programme and can be reclaimed from GN4.3-WP1-T5 following the normal GÉANT project claimant rules and procedures.


Expand
titleWhat is the duration of the programme?

The programme runs from March to June, and includes 3 workshops for all participants. Depending on the number of participants the workshops will be organised in groups of max 5 and will run in March and April. TNC 'finalists' can expect further coaching from a professional trainer coach prior to the conference. The TNC conference will take place from 21-25 June online.


Have a different question? 
Email: glad@geant.org  


FTP22 Lightning Talks

Artificial Intelligence for the early diagnosis of cardiac comorbidities associated to COVID-19 - Chiara Leonie (GARR)  

Expand

COVID-19 is an infectious disease, caused by SARS-CoV-2, that mainly affects the respiratory system. Unfortunately, it can also have serious impact on cardiovascular system, triggering the occurrence of cardiac diseases that must be timely identified. Thus, this project aims to contribute to the diagnosis of cardiac comorbidities associated to COVID-19, with the development of an artificial intelligence (AI)-based tool.

https://youtu.be/Czxr-sV5oQY?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw


 

Embedding a culture of internationalisation into the curriculum through "Internationalisation at Home"- Preparation for the changing context of Higher Education in Ireland - Nidhi Piplani Kapur, Waterford Institute of Technology, HEANET

Expand

My proposed research seeks to address the ‘gap’ in the Irish National Strategy for Internationalisation, by delving deep in how ‘Internationalisation of Curriculum (IoC)’ can provide internationalisation experiences to the 98% of students in Ireland who currently do not travel abroad. My research will investigate ways to provide an international experience ‘at home’ to all students, mainly using technology-based interventions. It will seek to inform a strategy that will drive the development and embedding of a culture of ‘Internationalisation at Home (IaH)’ in the curriculum. This will bridge skill deficits in Irish graduates and build multicultural competencies required by industry.



Section

Why we need a collaborative DDoS protection architecture in Europe - Marion Dübendorfer (SWITCH)

Expand

Distributed Denial of Service (DDoS) attacks have the potential to disrupt access to critical infrastructure for population groups across the world – yet their mitigation capabilities lie largely in the hands of private tech companies based in the US. This lightning talk explores the opportunities and benefits of an open, federated DDoS protection architecture in Europe.

https://youtu.be/nqRtm2jZbww?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw


Fake News Detection Models — Introducing GAN Generated Synthetic Samples to Improve Performance - Bruno Gonçalves Vaz (Universidade do Porto) FCT/FCCN

Expand

News datasets are extremely imbalanced, with the fake news not being as well represented as the real news. Thus, machine learning models for fake news detection do not perform as good as expected. Hence, Generative Adversarial Networks can be used to produce high-quality synthetic samples to better represent the fake news data, improving the models’ performances.

https://youtu.be/2748eoymHqY?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw



AI for Heritage ─ SOS digital collections: classifying and characterizing - Ana Carneiro (School of Arts | Universidade Católica Portuguesa - Porto) FCT/FCCN

Expand

A presentation that focuses on finding solutions that use AI to catalogue and categorize archival collections. Firstly, the difficulties that archivists have in the transition to digital followed by the various problems when one tries to implement AI. Finally, the necessary steps to carry out a project in partnership with a heritage space and a potential workflow.

https://youtu.be/IkNUbj4nvpE?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw



Traffic analysis of communication and collaboration apps bloomed with Covid-19 via advanced Deep Learning approaches -  Idio Guarino (University of Naples Federico II) GARR

Expand

The COVID-19 pandemic and the resulting increase in interactions via digital tools has deeply changed network traffic. To manage these changes, network operators need advanced tools for classification and the prediction of internet traffic. To face these tasks, the idea is to design advanced deep-learning based techniques with a special focus on traffic generated by social communication and collaboration apps.

https://youtu.be/hWXjB23EYs8?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw



Roman Emperors and Facial Recognition - Karel van Klink (GÉANT)

Expand

Facial recognition and Roman emperors: a unique application that will allow for the preservation of culture for generations to come.

https://youtu.be/Qujjm5upGKU?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw



Self-Sovereign Identity (SSI) for Future-Proof Digital Wallets - Frederic Gerber (SWITCH)

Expand

When the Internet was introduced at the end of the last century, it was not clear what use it would have. Today, we are at a similar crossroads with SSI, which consists of a set of principles for digital identities that users directly control. While it is not certain that SSI will change our society as groundbreakingly as the Internet did, it seems to be establishing itself as a paradigm that will endure for some time. From the user's perspective, it is important to understand the power of digital wallets, which is why this presentation will go through the main principles of SSI and convince everyone that a digital wallet is just as vulnerable as a physical one.

https://youtu.be/Q3bRLITeX6E?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw



Multi-factor authentication support between eduGAIN federations - Hilco de Lathouder (SURF)

Expand

Lightning Talk proposal featuring the results of a 1 month research project conducted as part of the University of Amsterdam's Security and Network engineering Master Program. The results are a start for improving support for (standardized) multi-factor authentication methods between eduGAIN federations.

https://youtu.be/Q3bRLITeX6E?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw


Guessing PINs, One Partial PIN at a Time - Ashley Sheil (Maynooth University)HEANET

Expand

We created different methods of guessing a person's PIN, by attempting to guess their partial PIN incrementally in an in-the-wild scenario. We look at the different patterns that result, as well as lengths of guessing time. We wanted to see how secure, in comparison, a full PIN is compared to using partial PINs as means of authentication.

https://youtu.be/sjuFlIzDxLI?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw


Challenges in processing and knowledge discovery in specifications of scientific resources - Witold Taisner (Poznan Supercomputing and Networking Center)PSNC

Expand

The talk will focus on major challenges present in both processing and further utilization of the data, such as specifications of certain scientific resources: articles, computational resources or datasets. Our goal is to create a recommender system for the aforementioned data
utilizing linguistic and natural language processing techniques, with a special focus on deep learning.

https://youtu.be/6wdwCE1eMPk?list=PLELuOn8jN3IK6iudJj0XuImkufrjHnaLw


Archived FTP Lightning Talks


Expand

FTP21

Section

A testbed to bridge the cybersecurity skills gap in industrial control systems - conrad-ekisa/HEANET

Expand

ICS cybersecurity is of increasing concern and this is evidenced by the mounting reports of cyber threats and attacks on ICS infrastructure that are referenced both within the technical community and the public media.

 https://learning.geant.org/conrad-ekisa/

Telomerase – eternal life or a panacea for all cancers ?! - hanna-karpenko/BASNET

Expand

Telomerase is considered the key to cellular immortality, the “fountain of youth.” This enzyme allows cells to multiply rapidly without aging. At the same time, telomerase allows cancer cells to divide indefinitely, which is the reason for the formation of tumors. Scientists from all over the world have been trying to solve this problem for a very long time. But today there is no exact model of the structure of human telomerase, due to the complexity of the structure and the high cost of this study. Computer modeling methods make it possible to quickly and cost-effectively reconstruct the spatial structure of human telomerase by homology based on the structural data of related templates. The work is done with the help of the State Supercomputer Multi-access Center of the UIIP NASB and the NREN BASNET network infrastructure. Computer methods of molecular dynamics optimize the model and make it accurate enough for rational design drugs and will help to understand that telomerase is eternal life or a panacea for oncology.

https://learning.geant.org/hanna-karpenko/

A Hierarchical Learning Approach to Enable Network Slicing in Future Telecommunication Systems federico-mason/GARR

Expand

In this work, we designed a hierarchical learning architecture, where multiple agents cooperate to orchestrate network slices under different working conditions. Our hierarchical architecture will support PSC in a much more efficient way than conventional approaches, allowing the current telecommunication networks to assist emergency operators (e.g., firefighters, policemen, healthcare professionals) without the need for a dedicated infrastructure.

 https://learning.geant.org/federico-mason/

Indoor Localization Service based on Beacons: A System to Save Your Life! - sara-raggiunto/GARR

Expand

Navigation systems help users find their way around the world. But what if we wanted to reach the exact platform of our departing train and it’s a matter of minutes? Or what if in the earthquake/fire event we wanted the shortest path to the escape route? The skill is to move from a problem to an extremely innovative solution. Indoor localization allows users to access unknown environments. The main challenges of the proposed system are the safety, the access control, and the activity monitoring. In fact, knowing instantly the exact position of the people to be assisted is extremely important in an indoor environment. 

https://learning.geant.org/sara-raggiunto/

Biometrics-based scheme for public key agreement protocol in wireless body area networks - anna-valeria-guglielm / GARR

Expand

Wireless body area networks (WBANs) are becoming increasingly popular as they allow individuals to continuously monitor their vitals and physiological parameters remotely from the hospital. With the spread of the SARS-CoV-2 pandemic, the availability of portable pulse-oximeters and wearable heart rate detectors has boomed in the market. At the same time, in recent years we assisted to an unprecedented increase of healthcare breaches, revealing the extreme vulnerability of the current generation of WBANs. Therefore, the development of new security protocols to ensure data protection, authentication, integrity and privacy within WBANs are highly needed. In this context, we target a WBAN collecting ECG signals from different locations on the individual’s body, and we propose a new information theoretic key agreement protocol that exploits the inherent randomness of ECG signals to ensure authentication between the nodes within the WBAN.

 https://learning.geant.org/anna-valeria-guglielmi/


FTP20

What if we don’t have to type anymore? Luis Sampaio, FCT/FCCN

Expand

This presentation outlines a new approach on human-machine interaction that is inclusive to people with hand/arm movement impediments and vocal impairments through the use of an electroencephalography headset and electromyography surface electrodes respectively, all on a decentralized application that is developed to guarantee privacy on communication between users. 

https://learning.geant.org/luis-sampaio/

Internet of Things - Alvise Baggio, GARR

Expand

FaaSt (Forecast as a Service) is a project created on occasion of the hackathon organized by GARR (Hack The Cloud) on November 2019 whose main theme was environmental sustainability. The idea behind Faast is to use cloud communication infrastructure to improve the electric grid and provide end-users with real-time information on the sources of energy used in the grid and to opt for the renewable options.

https://learning.geant.org/alvise-baggio/

Postquantum secure cryptographic schemes - Panayiota Smyrli, CYNET

Expand

Recent advancements in quantum computing have brought about fundamental challenges to cryptography. The security of many classical cryptographic schemes, such as the digital signature algorithm (DSA), the Diffie-Hellman (DH) key exchange protocol, and their elliptic curve variants, relies on the hardness of the well-known discrete logarithm problem over cyclic groups in elliptic curves over finite fields. 

https://learning.geant.org/panayiota-smyrli/

Computer Discovery of Novel Drugs, Hanna Karpenka, BASNET

Expand

Computer molecular modeling techniques play an important role in research into the development of new drugs. The use of neural networks for these methods in the rational design of potential drugs can minimize the time and cost of searching for various targets and potential drugs! Such a computer model can, with high probability, predict the vulnerability in the structure of the infectious agent and indicate which chemical compound should be synthesized.

https://learning.geant.org/hanna-karpenka/

Challenges and Opportunities of Crowdfunding in Ireland - Kelly Wang, HEAnet

Expand

Digital connectivity is transforming all aspects of our lives. Today information, ideas and financial flows are exchanged rapidly online and worldwide.  A case in point is Crowdfunding.  Enabling investors and entrepreneurs to connect worldwide online, to access much needed finance, this new model has emerged as a powerful disruptive force, reshaping traditional funding models and undermining traditional market dynamics.

https://learning.geant.org/kelly-wang/

Information-Centric Networking (ICN) - Paul Duggan, HEAnet

Expand

Information-Centric Networking (ICN) is an alternative approach to the Internet networking architecture. The main idea behind this approach is that information is identified by name, rather than by IP address. Due to this capability, this information can be cached on some or all hops on the delivery path between a source and an end-user, depending on a caching policy. For example, if an end-user requests a video, a copy of this video may be cached at every hop along the path between the source and end-user. When an adjacent user requests the same video, the request may be serviced from a node closer to the user instead of from the source. This can lead to significant savings in quality, costs and latency

https://learning.geant.org/paul-duggan/

FTP19

Expand

Democratizing Smart Farming with AI on LoRa Sensor Networks – Luca Coviello, Fondazione Bruno Kessler, Italy (GARR)
https://tnc19.geant.org/video-archive/#s33
2A Lightning Talks: First Strike
Minute: 54:28 Luca 

Building Community Machine Learning Tool for Agriculture and Forest Species Identification – António Ferreira, University of Trás-os-Montes e Alto Douro (UTAD), Portugal (FCT/FCCN).]
https://tnc19.geant.org/video-archive/#s33
2A Lightning Talks: First Strike
Minute: 54:28 Antonio 

Sport-Related Sudden Cardiac Death: A New In- Cloud System for Athletes Prevention – Agnese Sbrollini, Università Politecnica delle Marche, Italy (GARR).
https://tnc19.geant.org/video-archive/#s33
2A Lightning Talks: First Strike
Minute: 49:40  Agnese

Content-Interaction-Powered Distance Learning – Contact, pointing, immersion and feeling of presence – Enrico Pietrocola, Conservatorio G.Verdi, Milano, Italy (GARR). 
https://tnc19.geant.org/video-archive/#s39

6A Lightning Talks: Second Strike
Minute: 35:20 Enrico

Project Fox, a Quest for a Statically Typed Embeddable Programming Language – Pierre van Houtryve, HEPH Condorcet, Mons, Belgium (BELNET).
https://tnc19.geant.org/video-archive/#s39
6A Lightning Talks: Second Strike
25:34 Pierre

FOG Computing as a Lifeline for E Health Users – Era Ajdaraga Krluku, Ss. Cyril and Methodius University, Macedonia (MARNET)
https://tnc19.geant.org/video-archive/#s39
Minute: 29:45 Era


FTP18

Hey network, what's going on? -- Virtual assistants for networks - Rüdiger Birkner, ETH Zurich/ SWITCH, Switzerland
https://tnc18.geant.org/web/media/archive/2A
Minute: 48:45 Rudiger

Back to the future: let’s bring schools to XXI century! - Ilaria Bortolotti, Università di Roma La Sapienza/GARR, Italy
https://tnc18.geant.org/web/media/archive/2A
Minute: 37:45 Llaria

Efficiency is the way to go: get to know EnkiJosé Pedro Guerra Brito, UTAD, Universidade de Tás os Montes e Alto Douro / FCT/FCCN, Portugal
ttps://tnc18.geant.org/web/media/archive/2A
Minute: 43:29 José

Empowering student involvement in campus network deployment - Antonio Angel Cruzado Castillo, University of Málaga / RedIRIS, Spain
https://tnc18.geant.org/web/media/archive/6AMinute: 32:25 Antonio

mySense - AI and Big Data for agroforestry applications Jorge Mendes, UTAD, Universidade de Trás os Montes e Alto Douro / FCT/FCCN, Portugal
https://tnc18.geant.org/web/media/archive/6A
Minute: 27.09 Jorge

V-Labs: autonomous provisioning of virtual environments using PaaS approach Simone Feretti, INFN Sezione di Roma Tor Vergata / GARR, Italy
Poster Presentation

SCOReS: A dynamic cache system for e-Science applications Davide Michelino, Università di Napoli Federico II - INFN Sezione di Napoli/ GARR, Italy
Poster Presentation

Network installation upgrade, done with students? Melchor Alejo Garau Madrigal, University of Málaga / RedIRIS, Spain
Poster Presentation

Privacy-Friendly Threat Detection Using DNS Gijs Rijnders, Eindhoven University of Technology / SURFnet, Netherlands
Poster Presentation


FTP17

Beyond Touch, Swipe and Tap for Smart Clothing! Retro brings Nostalgia Adwait Sharma, University of Applied Sciences Upper Austria, Hagenberg/ACONET, Austria Security risks and ethical
https://tnc17.geant.org/web/media/archive/2A
Minute: 23:40 Adwait

implications of sensitive data on the Internet of Things Ernesta Grigaityte, The University of Central Lancashire, Cyprus (UCLan Cyprus)/CYNET, Cyprus
https://tnc17.geant.org/web/media/archive/2A
Minute: 38.49 Ernesta

“SmartWindow”- Pablo Picasso meets Graham Bell Rafay Iqbal Ansari, Frederick University/CYNET, Cyprus Distributed
https://tnc17.geant.org/web/media/archive/2A
Minute: 17:58 Rafay

learning based on free open educational resources Tiago José Castro, ESMAD - Politecnico Porto/FCT/FCCN, Portugal
https://tnc17.geant.org/web/media/archive/2A
Minute 50:24 Tiago

Switches - routers in disguise. Software router acceleration using OpenFlow hardware Norbertas Kremeris, Kaunas University of Technology/LITNET, Lithuania
https://tnc17.geant.org/web/media/archive/6A
Minute 1.00:26 Norbertas

Using Raspberry Pis for cheap Wi-Fi monitoring Fredrik Strupe, Norwegian University of Science and Technology/UNINETT, Norway
https://tnc17.geant.org/web/media/archive/6A
Minute: 55:30 Fredrik

Submit Application!

Application deadline  for NRENs 
28 Feb 2021

Technical Areas

Identity and Access Management

Section
Expand

Identity and Access Management (IAM) is about creating and managing digital identity for users, which can be used to represent a person in the digital world. Using state of the art authentication and authorization methods ensures that only the owner can access his identity and only entitled can access a resource.

In this area, it is all about Identity Providers, Identity Federation, Service Providers and Discovery Services. Your project may improve existing software solutions or create new applications for a global community.

Standards and Protocols

Expand

Building on top of existing infrastructure and applications, Standards and Protocols is about creating new ways to for applications and users to communicate.
This area is all about protocols and standards used or being developed in the global Trust and Identity community, like the Security Assertion Markup Language (SAML) and Open ID Connect (OIDC), which will be used to integrate new capabilities in an already existing large infrastructure.

Security and Privacy

Expand

Security is an integral part of most applications and infrastructures. Ensuring data protection, privacy and safety by using measures like encryption and cryptography is nowadays mandatory.

In this area, you may investigate, test and integrate new security features in existing Trust & Identity applications or to create new services that help secure our community, by working on for example multi factor authentication or HSM technologies.

Section

Schedule  

Mar-Jun 2021

22 Feb 2021  
Application deadline 

22 Feb 2021 (wk 8) 
Application review and CV selections.

wk 8- 9  (2 weeks until 5 Mar21)
Time for NRENs to organise logistics and set up of the participant (internship contract , mentorship interaction, (virtual) workspace, time sheets and other local NREN working procedures.

5 Mar 2021 - 14 Sep 2021 (wk10)
Start TIM internship programme  
Section

Promotion materials  

To help NRENs promote the programme and recruit participants we have available the following materials :

Download materials

News and Copy

Also, feel free to use words and copy from news items we create in different places to promote the programme:

Experiences from the first T&I Incubator Mentorship (TIM) programme  

Nov, 2020- Connect online

GÉANT internships through TIM (Trust and Identity Mentorship) Programme 

April 10, 2020, GLAD website

Let’s talk about the Trust & Identity Mentorship Programme

30th Aug 2019, CONNECT online

Brighten the future of Trust & Identity

21st June 2019, CONNECT online

Section

Frequently Asked Questions

Expand
titleCould you provide more details on the programme content?

TIM programme is a mentorship programme. What we mean by that is that it aims to advance participants' careers and professional skills through a collaborate and -creative work on real-life projects. For this TIM participants (mentees) join T&I Incubator team (mentors) and work hand-in-hand with them on the current, live T&I projects. This -creative and dynamic context allows participants to develop their expertise in T&I field  advance their interpersonal skills, such as communication and influencing.

To reinforce and support these learnings, GLAD team will offer to the participants Agile/SCRUM training and a communication skills training.  There is also a local mentor who can assist participants on their learning journey. ‘Learning by doing’ and ‘learning through doing’ represent the underlying ethos of the programme, therefore proactive attitude and growth mindset are an absolute must. 

Expand
titleWho can participate in this programme?

Any early career candidate nominated by a GÉANT Project NREN partner registered at a university or college in a GÉANT partner country or working in the NREN community.

Participation happens through a paid internship at the hosting NREN, who will claim manpower from the GEANT project and pays the trainee.

Expand
titleHow many candidates can NRENs nominate for the programme?

Depending on the number of  candidates in the programme, maximal 1 candidate per NREN.

Expand
titleWhat kind of candidates should NRENs look for?

Ideal candidates are last year's BA, Master and PhD level students in Computer Science, Engineering or other Technology fields with in computer networks who want to commit time and energy to learn and develop themselves beyond the basic university programme.

Expand
titleWhich topics can you as an NREN get involved with?

The Trust & Identity Incubator addresses different topics in different work areas that are being announced before each new cycle. NRENs can get involved in the topics that speak to them. See also TIM Technical Areas.

Expand
titleHow does the recruitment process looks like?

A six months professional internship requires time and dedication and interest from all parties involved. Motivation is essential both for the student as for the NREN.  After  a positive review, the T&I selection Committee will invite the hosting NREN together with their candidate for an  interview to complete the recruitment.   

Expand
titleWhat do you need to send to GÉANT learning and Development (GLAD) to nominate a candidate?

A complete application includes a motivation letter of the hosting NREN and the candidate's motivation letter and CV. Send this to glad@geant.org.  

Expand
titleWhat will be your role as a host and mentor?

Your role as a mentor is to engage with your protege and provide encouragement and advice during the programme and related events.  You can find more info on the mentor role in the NREN_mentorship presentation slides available in TIM Resources Package ( for NRENs)

Have a different question? 
Email: glad@geant.org or leave a comment at the bottom of this page.