App streams security cameraJobs
Min virksomhed laver ure inspireret af flyvemaskiner. Jeg skal have lavet 3D camera circle around the product. Det skal laves indenfor 2-3 dage max. da skal bruge det til en kampagne vi er lige ved at køre.
Shop Store , all my product, My Iphone , Canon Camera.....xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Shop Store , all my product, My Iphone , Canon Camera.....xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
...(“Goonhilly” / “The Lizard” ) and use relevant DBMSs – either PostgreSQL, mySQL or SQLite. It is however acceptable to use a number of a team’s portable computers as train computers. The prototype should focus and demonstrate the potential of your proposed architecture. Especially the future shift to image recognition should be as seamless as possible. It is fully acceptable (and recommended) that security and tamper issues are left to coming prototypes. Equipment provided - 'Goonhilly' and 'The Lizard' – two servers running at a separate network. - A virtual server pr group member. (upon request) - A number of APs using the 5 GHz frequency band (in order to limit the crosstalk) is available for demonst...
...(“Goonhilly” / “The Lizard” ) and use relevant DBMSs – either PostgreSQL, mySQL or SQLite. It is however acceptable to use a number of a team’s portable computers as train computers. The prototype should focus and demonstrate the potential of your proposed architecture. Especially the future shift to image recognition should be as seamless as possible. It is fully acceptable (and recommended) that security and tamper issues are left to coming prototypes. Equipment provided - 'Goonhilly' and 'The Lizard' – two servers running at a separate network. - A virtual server pr group member. (upon request) Requirements to the software • A CD containing source code for all programs in the project together...
...list (code numbers) on a product packaging using their phone's camera. The core functionality of the app should involve the following: - Image Recognition: The app should be able to accurately scan and recognize the text from the image of the additives list. - Text Analysis: Automatically provide the official and layman descriptions of all the additives. - Health Impact: The app should also have a feature that provides known health impacts of each additive. Key Features: - Cross-Platform: The app should be developed for both iOS and Android, ensuring a wider reach. - Minimalist Design: The user interface should be simple and minimalist to ensure ease of use and focus on core functionalities. - Basic Accuracy: While using the camera featur...
I'm seeking a skilled Cameraman with a DSLR camera to capture personal moments in Kathmandu. Besides photography, I need video recording and photo capture services. Ideal skills and experience: - Proficient in using a DSLR camera for photography and videography - Able to capture and document personal moments effectively - Experienced in video recording and confident in delivering high-quality footage - Capable of capturing both images and videos with creativity and attention to detail - Prior experience in photo editing would be a plus, but not mandatory
I am in need of a skilled developer who can build a customized matchmaking database for my internal use. The database will primarily focus on matching investors to investment opportunities. Key Features: - Storing Match Pr...to specific staff members. No external user authentication is required. - Search Criteria: The database should have search functionality based on the geographic location. Ideal Skills: - Proficiency in database management and development - Experience in creating matchmaking algorithms - Understanding of security protocols for internal databases - Ability to implement search functions based on specific criteria Please note that this project requires a high level of security and confidentiality, so a strong track record in handling sensitive...
...enhance our market presence and drive sustainable growth. In line with this vision, we are actively seeking new business accounts to partner with us in our journey towards mutual success. Objective: The primary goal of this project is to identify and acquire new business accounts that align with our values, objectives, and expertise. By expanding our client base, we aim to: Increase revenue streams and profitability. Enhance market reach and penetration. Strengthen brand recognition and reputation. Foster long-term partnerships and collaborations. Target Audience: We are targeting businesses across various industries that can benefit from our products/services. Our ideal clients include but are not limited to: Small and medium enterprises (SMEs) Startups and emerging businesse...
...Google Adsense Approval: Develop the platform with Google Adsense integration in mind, adhering to their program policies to ensure potential ad placement approval. Core PDF functionalities: Compress PDFs Merge multiple PDFs Split PDFs into separate documents Convert PDFs to other formats (e.g., Word, Excel, JPG) (Optional) Basic PDF editing features (consider development complexity) Security: Implement robust security measures to protect user data and uploaded files. Scalability: Design the platform with scalability in mind, considering future growth and potential additional features. Technical Considerations: Front-End Development: HTML, CSS, JavaScript Framework (e.g., ReactJS) Back-End Development: Server-side language (e.g., Python, PHP) PDF Processing: Utilize PDF m...
My WordPress website's CAPTCHA at is acting up. I need help identifying and resolving the issue. Key skills include: - Proficiency in WordPress website management - Experience with various CAPTCHA plugins and services like Google reCAPTCHA and Really Simple CAPTCHA - ...acting up. I need help identifying and resolving the issue. Key skills include: - Proficiency in WordPress website management - Experience with various CAPTCHA plugins and services like Google reCAPTCHA and Really Simple CAPTCHA - Strong troubleshooting and problem-solving skills - Ability to identify conflicts between CAPTCHA and other plugins If you have a good understanding of WordPress security, CAPTCHA, and can effectively troubleshoot plugins, I'd love to hear from you.
Hi ITYPE Designs, I noticed your profile and would like to offer you my project. We can discuss any details over chat.
My system has been compromised by hackers...personal data - Ensuring control over cameras and microphones is restored Ideal Skills and Experience: - Proven experience in cybersecurity and network security, particularly with Azure - Expertise in identifying and removing hackers from systems - Ability to secure personal data effectively - Strong problem-solving skills and attention to detail - Experience in restoring control over cameras and microphones within a system - Excellent communication skills to provide updates on progress and explain steps taken to prevent future breaches. Please only bid on this project if you have the expertise and availability to act promptly. My privacy and security are of the utmost importance, so I need someone who can provide a quick and ef...
I'm seeking a highly proficient professional to conduct a Tier 2 Security Assessment of our web application; specifically focusing on evaluating compliance with security standards. Your targets for this assessment include, but are not limited to: - Analyzing how our system handles user registration and authentication processes - Identifying potential vulnerabilities within these functionalities - Providing an actionable report on how to harden our security measures in conformity with the best industry standards. The ideal candidate will have extensive experience in web application security, specifically in auditing user registration and authentication procedures. Your practical insights into advanced security measures will be highly appreciated. Pl...
I'm looking for a computer engineer with strong expertise in Google techn...Proficiency in Operating Systems and Technical Skills: You should be well-versed in various Operating Systems and technical aspects to tackle the challenges of the project. - Google Technology Proficiency: You must have a deep understanding and hands-on experience with Google technologies, products, and services. Ideal Skills and Experience: - Previous experience in software development, network security, or hardware design would be a plus. - Strong understanding and experience in using multiple operating systems, particularly Windows, Linux, and macOS. - Excellent problem-solving skills and the ability to work independently and in a team. - A proactive approach to learning and adapting to new technolo...
...representative, such as line of business, key executives' name, etc. • Take pictures of the subject company and its vicinity, as per Confirmis’ standard operating guidelines. • Provide observation about the company to gauge activeness, e.g., staff working at the premise, loading/unloading of goods, etc. REQUIREMENTS: • Must be living in (or nearby) Kepanjen, Malang • Has a camera or phone/tablet of quality with a camera, internet access Please see the attached file for the site visit guideline. You are only required to deliver the pictures, video & observations and are not expected to put together a report like the Sample Report. Note: Milestone will be released the following week after the site visit to give us time to organize ...
I need to professionnel of security to block a tiktok account for my client
Description: I'm seeking an experienced AWS and Django developer to urgently fix a "502 Bad Gateway" error that started occurring on my Django-based website hosted on an AWS EC2 instance after an IAM role change. The task will also involve reviewing and revoking AWS access previously granted to a developer, and ensuring the site's security and integrity. Responsibilities: Diagnose and resolve the "502 Bad Gateway" error. Review and modify IAM permissions to ensure both security and functionality. Confirm that all components of the AWS environment (like EC2, RDS) are properly configured and interacting without issues. Ensure the Django application is securely configured and fully operational. Provide a brief report on the changes made and any re...
...line of business, key executives' name, etc. • Take pictures of the subject company and its vicinity, as per Confirmis’ standard operating guidelines. • Provide observation about the company to gauge activeness, e.g., staff working at the premise, loading/unloading of goods, etc. REQUIREMENTS: • Must be living in (or nearby) San Fabian, Pangasinan, Philippines • Has a camera or phone/tablet of quality with a camera, internet access Please see the attached file for the site visit guideline. You are only required to deliver the pictures, video & observations and are not expected to put together a report like the Sample Report. Note: Milestone will be released the following week after the site visit to give us time to organize the r...
I am seeking an expert in AWS servers, particularly in the problem-solving aspect of EC2 instances. Key tasks to be performed: - Diagnose the specific issues of the server - Suggest and implement suitable solutions to rectify the problems - Maintain and improve server performance Ideal Expertise and Skills: - Strong technical skills and deep understanding of AWS, specifically EC2 instances...the problems - Maintain and improve server performance Ideal Expertise and Skills: - Strong technical skills and deep understanding of AWS, specifically EC2 instances - Proven track record in handling server emergencies and solving server issues - Competence in developing and maintaining customer-focused, high-performance AWS infrastructure - Proficient with best practices in ensuring server se...
...Implement MOSSE with SCRFD for Java Android 2) Implement it in our app by replacing MLKit and connect it to our engine 3) Replace our engine with ARCface The App must be fast and robust. For the 1st milestone deliverables... implement MOSSE tracking with SCRFD for Java Android running the C++ libs. Create a demo app that runs detection and tracking and: 1. shows boxes and tracking ID for each face detected. 2. model size 3. fps 4. face confidence 5. screen resolution 6. Allow the app to run on Android's both front and back camera 7. add a zoom feature if supported by the device's camera. 8. add an option to upload and process recorded videos. no need to do ui/ux design key point is to integrate c++ library with android app ...
I'm seeking an expert to assist with the complete transfer from my current WooCommerce setup to my own account. The data size is between 1GB to 5GB. Key Requirements: - Expertise in WooCommerce: You should ...its functionalities. - Data Migration Experience: Proven experience in transferring large data sets in WooCommerce efficiently and securely. - Ownership Transfer Knowledge: Familiarity with the process of transferring ownership rights in WooCommerce, ensuring a smooth transition without data loss or disruptions. Your role will be to handle the migration process while ensuring the integrity and security of all transferred data. I'm looking for someone who can guarantee a seamless transfer, recognizing the criticality of the process in maintaining my store's fun...
Objective: Develop a robust vehicle counting application optimized for the NVIDIA Jetson Nano. The application should accurately count cars passing through multiple cameras using RTSP live streams. Key Requirements: Modular Design: The software should have a configurable region of interest (ROI). This will allow customization of the tracking area for different camera setups. The system should support settings for either two-way or single direction vehicle detection, selectable per camera. Multi-Camera Support: The application must handle live feeds from at least three cameras simultaneously without frame skipping. Ensure seamless capturing, detecting, and tracking across all cameras, maintaining high accuracy and performance. Error Handling: Implement robust e...
I am looking for professional resume writer that has demonstrated experience in writing resume for Australian market within Senior Cyber Security roles. Understanding of Information Security, Security Architect and GRC domain is preferable The incumbent should use their own experience to craft the profile organically. I am looking some help in polishing up my profile for senior consultant/ managerial role so resume should reflect both technical and business acumen. I can provide my draft resume as a reference to build on top of that.
Project description: I'm seek...technical support. The task involves installation of network equipment (switches, access points, and security cameras for both indoor and outdoor areas). Your role will involve: - Mount/Install network equipment as directed - Field technical support - Remote support Contractor should carry liability insurance and C7 license is preferred Ideal candidates should have extensive experience with network cabling and a track record of executing similar projects successfully. It's crucial for the freelancer to be proficient in handling varieties of network cables especially Cat 5e, Cat 6 and Fiber optic cables, and familiar with network switches, access points, speakers, and security camera installations both indoor and o...
As an organization, we aim to significantly boost our network security. Thus, we're seeking a skilled professional capable of: - Configuring firewall - Implementing an effective Intrusion Detection System - Establishing secure remote access Unfortunately, we skipped out on specifying our preferred secured remote access service and the size of our network infrastructure during the initial stages. However, we encourage applicants to be fully versatile with VPN, SSH, RDP, and to be equipped to handle infrastructure of various sizes. Prior experience with these areas will be advantageous. Do you have what it takes to help us execute a thorough network security overhaul? If so, we want to hear from you!
...secure and scalable VPN/Internet gateway solution. This project involves building server software capable of authenticating client connections and providing access to the internet. Requirements: Master's degree or PhD in Computer Science, Cybersecurity, or a related field Extensive experience in internet security, privacy, and VPN technologies Strong proficiency in server-side software development Familiarity with OpenWrt and router firmware development (preferred) Passion for internet security and privacy Responsibilities: Develop robust Wireguard exit nodes and VPN server software Ensure seamless integration with existing client software and VPN router firmware Implement secure authentication mechanisms for client connections Design scalable server architecture f...
Testing and Deployment Describe how the system will be tested and deployed. Discuss your operational security of the system with respect to the Identify, Protect, Detect, Respond, Recover categories of NIST Cybersecurity framework. Describe what you will be doing at each phase. what is needed: NIST framework document like what you can do here. Usability testing see my for test plan
I need a custom WordPress solution that will allow registered users on one WordPress site to create posts via a form, and have these posts automatically published on a separate WordPress site. Ideal skills for this project include: - Strong understanding of WordPress development - Experience with creating custom plugins - Familiari...users on Website A to create posts - Establishing a connection between Website A and Website B for seamless post transfer - Ensuring the posts are published immediately on Website B I'm open to your suggestions for user information that could be included in the post transfer, and I would appreciate your input on best practices for this kind of cross-website integration. Your input on potential security considerations for such integrations would ...
I'm looking for a skilled Python developer to create a security application with robust intrusion detection capabilities. Key Features: - Intrusion Detection: The application must be able to detect and alert me about any potential security breaches. - Log Gathering: I'll need the app to effectively and securely gather logs from IoT devices. - Access Control Management: It should have the ability to manage and control access to the security system. Logging Mechanism: - The application should be able to log activities from sensors and smart home devices effectively. Ideal skills and experience: - Strong Python programming skills, coupled with experience in security applications. - Proficiency in designing and implementing robust intrusion de...
...structure and enhance topical authority for blog posts, ensuring content is displayed in a topical authority format on the blog page. • Monitor and analyze SEO performance metrics, making data-driven decisions to improve organic search rankings and traffic. 2. Plugin Management: • Audit existing plugins to identify redundant or outdated plugins that can be removed to streamline site performance and security. • Update and maintain necessary plugins, including 301 Redirect Pro and WP Rocket, to ensure compatibility and optimal functionality without conflicts. 3. Site Performance Optimization: • Implement caching, lazy loading, and other performance enhancements using WP Rocket to improve site speed and overall user experience. • Collaborate with the team to...
...line of business, key executives' name, etc. • Take pictures of the subject company and its vicinity, as per Confirmis’ standard operating guidelines. • Provide observation about the company to gauge activeness, e.g., staff working at the premise, loading/unloading of goods, etc. REQUIREMENTS: • Must be living in (or nearby) San Fabian, Pangasinan, Philippines • Has a camera or phone/tablet of quality with a camera, internet access Please see the attached file for the site visit guideline. You are only required to deliver the pictures, video & observations and are not expected to put together a report like the Sample Report. Note: Milestone will be released the following week after the site visit to give us time to organize the r...
We are need of developers proficient in low-code platforms to create a suite of applications. Firstly, we will need a web application, a mobile application, and an enterprise application developed. These are crucial tools for our business operations and customer interactions. In terms of functionali...expecting a relatively small user base initially, but these applications should be scalable and able to handle growth. Ideal candidates would have: - A strong background in low-code development - Experience in building web, mobile, and enterprise applications - Proficiency in user authentication, data storage, and API integration - The ability to design scalable systems - A good understanding of security principles If you have the skills and experience for this project, please get...
...Requirements: - Identify and rectify improper error handling, ensuring that user-friendly error messages are displayed and errors are logged for debugging purposes. - Address server banner disclosure, to enhance the security of the application. - Modify CORS configuration to prevent misconfigurations and enhance security measures. I am looking for an expert who is well-versed in AWS, particularly in working with applications. The ideal freelancer for this job should have: - A thorough understanding of AWS services and its integration with Next.js. - Proficiency in addressing security vulnerabilities, in particular server banner disclosure and CORS misconfiguration. - Excellent troubleshooting skills, to quickly identify and rectify improper error handling. Time...
Hi there, We are looking someone who could help us in C T F. We will provide our source codes to analyze them and find vulnurabilities in them. More details will be given upon discussions. Please send your proposals as per description otherwise, you will be ignored. Thank you!
Hey, I'm looking for someone who could able to help me in CTF. I need to. you analyze all the code soon. Preferably I am in need to Cyber Security expert. For more, We can discuss via chat. Thank you
The logo needs to feature hands behind held in some way symbolizing the concept of 'Hanai' — embracing someone into the family. The design is minimalistic, focusing on smooth, clean lines to keep it casual and approachable. Color Scheme: Blue: A calming, light shade of blue to convey trust and dependability. This color could be used for the hand, enhancing the feeling of security and professionalism. Orange: A soft, cheerful shade of orange that contrasts with the blue, used for the medical symbol to inject vitality and warmth into the design. Usage: The design’s simplicity ensures broad versatility across digital and print mediums, maintaining clarity and impact whether scaled down for small items like business cards or enlarged for banners and signage. Thi...
Sure, here's a revised version: Experienced WordPress Designer and Developer Needed I am seeking an experienced WordPress designer and developer to create three websites based on the theme provided https://preview.themeforest...design and development process. New icons will be created for Websites 2 and 3. All websites will be uploaded to our server using HostGator web hosting. Additionally, source files for each website will be sent separately for future use and backup purposes. Each website will include a WhatsApp contact plugin for easy communication. Furthermore, the websites must load quickly, and free plugins for security and SEO purposes will be installed. If you have any questions or need further clarification, please feel free to reach out. Looking forward to wo...
I'm in need of a report that will help me identify potential car theft by analyzing the usage of keyless entry remote systems. Requirements: - The report should be delivered in PDF for...of keyless entry remote systems. Requirements: - The report should be delivered in PDF format, presenting the data in a clear, concise and visually appealing way. - It needs to support keyless entry remote systems specifically, not limited to standard non-smart keys or smart keys. Ideal Skills and Experience: - Proficiency in data analysis and report generation. - Experience in automotive security and car key fobs. - Ability to work with keyless entry remote systems. - Excellent communication skills for a clear understanding of the project's objectives and delivery of the report in a ...
Task Requirements 1- You have to visit the place and get the verification form filled and sign stamped. 2- Take 4 to 5 geotagged photos with GPS MAP CAMERA APP with the name board visible in photos 3- In case of refusal ask them to give you written refusal statment with stamp. 4- Most important get the details of HR person or verifier ( Name, Designation, Department and contact email) If all above requirements fulfilled than task will be considered complete.
We need animated transitions using our logos to transition from one image/camera to the next like you would see in a sports tv broadcast
...an experienced mobile app developer to create a robust application for reselling data eSIM on both Android and iOS platforms. The app will enable user registration, data plan selection, eSIM activation, payment functionality, and additional features as outlined below. Requirements: Platform: The app should be developed for both Android and iOS platforms. Functionality: User registration and login features with secure data collection (Name, email, phone number) for marketing purposes. User consent for data collection and Terms & Use agreement mandatory. Social media login options (Google/Facebook) for simplified registration (optional). Data plan selection and eSIM activation within the app. Integration of payment gateways for transactions. Data Usage ...
As the creator of a new system aimed at improving our security, I'm in need of a professional with expertise in the field of hacking and system security. The primary responsibility of this role is to rigorously test the system's security to identify vulnerabilities and suggest enhancements. Key Requirements: - Expertise in network, application, and data security: You should be well-versed in these aspects of security to ensure the entire system is robust. - Ability to identify and address firewall misconfigurations: This is of particular concern, given the specific issues I'm looking to address in the network security. Your role is to simulate various hacking attempts and identify any potential weaknesses in the system's se...
...We are seeking an experienced Backend Developer with strong expertise in FastAPI to join our dynamic team. This individual will be responsible for building and maintaining the server-side logic, ensuring high performance and responsiveness to requests from the frontend. **Key Responsibilities**: 1. Design, build, and maintain efficient, reusable, and reliable FastAPI code. 2. Implementation of security and data protection solutions. 3. Integration with frontend components and third-party services. 4. Define and maintain the database models and schemas using MongoEngine with MongoDB. 5. Optimize applications for maximum speed and scalability. 6. Collaborate with the frontend team to integrate user-facing elements. 7. Ensure the application is containerized using Docker. 8. Use Bi...
In need of an architectural design for a medium-sized (10-50 truck) parking lot and garage. The establishment is expected to include: - Security Cameras: For constant monitoring and protection of the facility. - Resilient Flooring: To withstand the heavy traffic and load of numerous trucks. I'm interested in working with professionals who have expertise in civil/architectural design with a robust understanding of security systems and heavy-duty flooring. A background in designing similar facilities would be an added advantage. As time isn't restricted, keen to details and quality over expeditious execution.
I need a professional to connect my OAK PoE camera with a Raspberry Pi 5. I have the camera working perfectly fine on my DELL computer. However, I'm unable to use the camera with my Raspberry Pi 5. This is what I've done so far. 1. I first installed the pip3 and Python 3 Virtual Environment by running. - sudo apt install -y python3-pip python3-virtualenv 2. I then created and activated the Virtual Environment by running. - python3 -m venv projectsenv - source projectsenv/bin/activate 3. Then I installed opencv while inside the virtual environment - pip3 install opencv-contrib-python 4. After that I installed the depthai dependencies for Linux (still in the environment) - sudo wget -qO- | bash 5. Then I installed depthai (still in the
I need a professional to connect my OAK PoE camera with a Raspberry Pi 5. I have the camera working perfectly fine on my DELL computer. However, I'm unable to use the camera with my Raspberry Pi 5. This is what I've done so far. 1. I first installed the pip3 and Python 3 Virtual Environment by running. - sudo apt install -y python3-pip python3-virtualenv 2. I then created and activated the Virtual Environment by running. - python3 -m venv projectsenv - source projectsenv/bin/activate 3. Then I installed opencv while inside the virtual environment - pip3 install opencv-contrib-python 4. After that I installed the depthai dependencies for Linux (still in the environment) - sudo wget -qO- | bash 5. Then I installed depthai (still in the
I am looking for a skilled professional to design a compact camera system that will be inserted into a 3" tube for the purpose of examining welds. This device is crucial for quality control purposes in our manufacturing process and will play a significant role in ensuring the integrity of our products. Key Features: - High Resolution: The camera should provide crisp, clear images for detailed inspection of the welds. - Wide Field of View: A broad visual range is essential for comprehensive surveillance of the welds. - Image and Video Capability: The camera must be capable of capturing both images and video footage to ensure we can thoroughly analyze the welds. As stated, the camera should be able to operate on either battery power or a plug-in power suppl...
I need an apk security expert I hope there are no vulnerabilities in the database in my apk. Other people keep trying to hack my database
I'm in need of a unique, serious-toned video for personal use. The footage will involve you punching and stomping a pillow on a bed. Here's what I expect: - The video should be filmed in a serious, non-humorous manner. This isn't a comedy sketch but a sincere display of pillow punching and stomping. - Wear...non-humorous manner. This isn't a comedy sketch but a sincere display of pillow punching and stomping. - Wear casual clothes for this. No need for gym or formal outfits. - It's a plus if you have prior experience in creating similar videos. Ideally, your skills will include: - Ability to project a serious tone throughout the footage. - Creativity to make the video engaging. - Comfort in front of the camera. - Basic video editing skills to ensure the f...