Badisa Mosesane’s NCSA Internship and PEARC19 Activities

Badisa Mosesane (University of Botswana) recently completed a three-month (plus two weeks) cyberinfrastructure professional internship at the National Center for Supercomputing Applications (NCSA). While he was there, he learned about the Blue Waters supercomputer, the XSEDE project, the NCSA Industry program, and much, much more!

Here’s his report.

In July, Badisa had the opportunity to attend the Practice & Experience in Advanced Research Computing (PEARC19) conference in Chicago. Badisa presented an update about the DRONES4GOOD project during STEM-Trek’s AI4GOOD@PEARC19 workshop.

Badisa Mosesane presenting an update of the DRONES4GOOD project during the AI4GOOD@PEARC19 workshop

Badisa’s NCSA internship was supported by the National Science Foundation. Gap funds were provided by Cray Computing via STEM-Trek Nonprofit.

We appreciate the care with which this opportunity was planned and executed. Special thanks to NCSA Internship Coordinators Dan LaPine and Volodymyr Kindratenko, systems engineers and other specialists who taught Badisa many useful skills that he will, in turn, share with others in Botswana.

We are grateful to the Sigma Phi Delta fraternity brothers who shared their house with Badisa.

Many thanks to Director of Community Outreach Sarah Shoemaker and the congregation of the Apostolic Life Church in Champaign who provided Badisa with a spiritual home away from home; they arranged transportation to services and provided Sunday fellowship.

We also appreciate the many other STEM-Trek friends who helped make Badisa’s summer in Illinois more comfortable and memorable.

Coolest guy on campus; this highly-coveted shirt is from Badisa’s 2017 internship at CERN!

Leave a Comment

Awesome! You've decided to leave a comment. Please keep in mind that comments are moderated.

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>