New website aims to close gap between researchers and technology

Whether it’s software to analyze or manipulate data, extra computing power for a short period of time, or hands-on instruction that helps a researcher select the best tool, researchers at Illinois have always sought out tools and trainings that enable, further or enhance their work. Yet investigation into the needs of campus researchers uncovered a gap between available resources and the means to find and use them.

Members of the Research IT team at Technology Services conducted their own research during an initiative called the Year of Cyber Infrastructure and discovered, importantly, that campus researchers often were not aware of technology tools or training opportunities, and that when they did know, those resources were difficult to find.

The solution was a brand-new portal at researchit.illinois.edu. The website is organized simply by resources, research news and trainings, and is a gateway to those resources, events, and research news that can enhance any researcher’s knowledge and work at Illinois.

Karen Hogenboom, Head of the Scholarly Commons and Associate Professor of Library Administration, was part of the group that assisted with the portal’s database design. She was involved from the beginning of the project and indicated that the site will have immediate benefits for her work and throughout campus.

"We have a specific goal for the Scholarly Commons of trying to connect people with help in methodologies like digital humanities or things that involve a lot of computing power. It will be a great tool for us. We’ve tried to keep up a list ourselves of where to send people, but this is going to be much more robust.”

Researchers can be confident that when they visit researchit.illinois.edu that they will have a wide range of services and tools available to them in only a few clicks, Hogenboom noted.

"It is comprehensive. Any help with research technology on campus should be represented there, and Research IT is committed to keeping it up to date. It replaces the word of mouth [about how to find or access resources] that takes years to develop.”

One of the most important things to know about the portal is that it serves researchers in all disciplines, according to Tracy Smith, Director of Research IT.  

"Dozens of campus collaborators provided ideas and tools resulting in an incredible campus resource,” explained Smith.  “We are expecting more ideas from researchers themselves as the portal begins to be widely used,” she said.

The portal is an initiative of Research IT, which aims to bridge any gaps that may exist between researchers and the technology that enables research. Research IT partners with units, researchers, and IT Professionals to provide the best possible collaborations to assist research.

Research is collaborative by design. Therefore collaboration was essential to providing the easiest access and most information about resources. The Research IT Portal is a partnership between Technology Services, the National Center for Supercomputing Applications (NCSA), the School of Information Sciences (iSchool), Engineering IT, the University Library, and the Office of the Vice Chancellor for Research (OVCR).

Hogenboom is proud that the partnership has led to such a positive result.

"I am really excited that we were able to do this in partnership with Technology Services.
A service like this is something we thought about doing, but there was no way for us to do ourselves and sustain it. It is a very effective partnership and really exciting for me and for the Scholarly Commons,” she said.

The Research IT team is already gathering feedback in order to continue closing the gap between researchers and technology.
"We like to think of this as a foundation to build upon,” explained Amy Hovious, Research IT Portal Project Lead. “We want the Research IT Portal to grow and evolve with input from those using the system. Our goal is to let the campus community guide where the portal goes to best meet their needs. We’re already investigating what to include in the next version and beyond,” she said.

image of homepage for Research IT portal New web portal bridges tech tool gap for researchersWhether it’s software to analyze or manipulate data, extra computing power for a short period of time, or hands-on instruction that helps a researcher select the best tool, researchers at Illinois...
Quantum Landscape by Danielle Markovitch Quantum Voyages This article was created by a Technology Services student employee. Our student employees attend, engage, and report on campus events that feature technology. Students provide a unique perspective...
University of Illinois Illinois Tech HubThis article was created by a Technology Services student employee. Our student employees attend, engage, and report on campus events that feature technology. Students provide a unique perspective on...
Leveraging Tech Services for Bio Imaging ResearchThe Biomedical Imaging Lab at Beckman Institute decreased their processing time from over 260 days to just a few hours by leveraging Amazon Web Services at Illinois, provided by Technology Services....
Women and the Under-represented in STEM Wonder to Us All: Women and the Under-represented in STEMThis article was created by a Technology Services student employee. Our student employees attend, engage, and report on campus events that feature technology. Students provide a unique perspective on...
Foellinger seasons Taking on Campus Energy Consumption, One Thermostat at a TimeThis article was created by a Technology Services student employee. Our student employees attend, engage, and report on campus events that feature technology. Students provide a unique perspective on...
Students Capitalize on Computational Genomics Research Using AWS Students Capitalize on Computational Genomics Research Using AWSAmazon Web Services at Illinois gives students and faculty the opportunity to explore and optimize data analysis. Thanks to the campus contract between Amazon Web Services (AWS) and the University of...
Raspberry Pi Gel Imaging on a BudgetWinter is coming. It’s not just a popular phrase from a television program. It’s a motivating force for Drs. Erik Sacks and Lindsay Clark. Sacks, Associate Professor of Perennial Grass Breeding and...
Alma Mater HandshakeThis article was created by a Technology Services student employee. Our student employees attend, engage, and report on campus events that feature technology. Students provide a unique perspective on...
Image of a supernova Physics for EveryoneThis article was created by a Technology Services student employee. Our student employees attend, engage, and report on campus events that feature technology. Students provide a unique perspective on...
Protect Your Device Banner Protect Your Device Physically and DigitallyProtecting your device includes both physical and digital security. We’ve written about preventing theft and registering your computer with Tech Services so we can help find it if it is stolen. But...
Students Earn Credit While Practicing Cyber Security SkillsSecurity is a team effort. All of us play a part in making the internet as safe as we possibly can. Why not do so while earning course credit? Some students have taken advantage of an internship...
U of I Box Keeps Your Data SafeStacks of exams and papers, spreadsheets full of grades, and empty coffee cups. These three things are connected. They’re certainly all part of midterms season here at Illinois. If you teach, chances...
Protect Your Data: Encrypt Your DeviceThere are a lot of ways to protect your data. For those who choose to store files on their local hard drive, a strong password is the first line of defense against threats. That helps prevent people...
Assessing Your RisksRisk isn't something that we like to think about, but of course we face it daily. The Electronic Frontier Foundation has put together an article on Risk Assessment guiding questions to ask yourself.
Analyzing Your RiskData breaches, where personal information, credit data, or health information is disclosed, are all too common. The results of these breaches  could include fines, legal costs, bad publicity, and...
Data header Where is Your Data?There used to be one option for storing your data. Your local hard drive. External hard drives hadn't been developed yet, and the cloud hadn't even been considered. Now, people have to decide...
Do You Know Your Data?Think about the amount of data you have. Financial information, medical records, photos, music, movies, academic work...those are all basic, but what about the other data do you have that you...
How Secure Are Your Passwords500 million. 68 million. 32 million. That’s how many accounts have been hacked at Yahoo, Dropbox, and Twitter, respectively, in the past couple years...and that’s just the tip of the iceberg. Fraud,...
Protecting Yourself On Public Wi-FiYou’re sitting at a table, desperately wanting to check facebook or email, but don’t have a cellular signal. You log in to the free Wi-Fi and type your passwords in. And that's when it happens:...

Pages