June 6, 2017
Applicants proposing to use established key biological and/or chemical resources are expected to include an authentication plan in the “Authentication of Key Biological and/or Chemical Resources” attachment, even if the key resources were purchased or obtained from an outside source that provided data on prior authentication. The authentication plan must include only a description of the methods proposed to authenticate key resources prior to use and at regular intervals, if appropriate. The plan should be no more than one page. Key resources and the methods for authentication will vary by research field. For example, ….
June 6, 2017
The quality of resources used to conduct research is critical to the ability to reproduce the results, so to address scientific rigor in your NIH application, we ask you to include an authentication plan.
Key resources refer to established resources that will be used in the proposed research.
Key biological and/or chemical resources include, but are not limited to, cell lines, specialty chemicals, antibodies and other biologics. Key biological and/or chemical resources may or may not have been generated with NIH funds and: ….
June 5, 2017
We appreciate the many thoughtful comments posted to the blog about working together to improve NIH funding support for early- and mid-career investigators to stabilize the biomedical workforce and research enterprise using a measure called the Grant Support Index (GSI). Some clear themes have emerged, including: ….