Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Slags
Evner
Sprog
    Job-status
    4,548 ibm bpm tool jobs fundet, i prisklassen EUR
    AS400 Market Research Argentina 6 dage left
    VERIFICERET

    ...items, reports and presentations Understand business objectives and design surveys to discover prospective customers’ preferences. Number of companies using IBM i (as400) servers Contact info of IBM i influencers (Press, Users group, Decision makers, Marketer, Partners, Integrators... Compile and analyze statistical data using modern and traditional methods

    €10 / hr (Avg Bid)
    €10 / hr Gns Bud
    8 bud
    Short Article 3 dage left

    ...unintended acceleration Video Link 3: [log ind for at se URL] Discussion Points: 1) Analyse if Toyota is in dire need of organizational change through a BPM intervention. 2) Investigate if dilution of quality culture in Toyota during the recent years is responsible for such a fiasco. 3)Determine if the supplier of defective accelerator

    €81 (Avg Bid)
    €81 Gns Bud
    25 bud

    We are working with IBM on a sensor which needs to be scanned by the phone camera with something like QR and display the data and sent automatically to the server. We need some modifications on the free APK ( no algorithms changes - link below) to eliminate the options they have and choose the only ones we are interested. If this is doable using

    €329 (Avg Bid)
    €329 Gns Bud
    33 bud

    Need someone to assist in completing the build of IBM Domino / XPages system. The Developer must have proven experience developing web interfaces for IBM Domino v9.0.1, XPages, Java, HTML, and CSS for desktop as well as mobile user interfaces.

    €17 / hr (Avg Bid)
    €17 / hr Gns Bud
    8 bud

    I need to enable SSL on an integration service hosted on IBM IIB V10

    €183 (Avg Bid)
    €183 Gns Bud
    3 bud

    We are looking at developing an AI model using IBM, Microsoft or AWS cloud to recognise invoices, bank statements, receipts, etc. and post to the right categories in our chart of accounts automatically. The project will help us to reduce the reliance of teams of account clerks and make data entry more accurate.

    €5484 (Avg Bid)
    €5484 Gns Bud
    15 bud

    I need a new website. I need you to design and build my online store. reference - alibaba, BPM application, aliexpress

    €7 / hr (Avg Bid)
    €7 / hr Gns Bud
    22 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €222 (Avg Bid)
    €222 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €502 (Avg Bid)
    €502 Gns Bud
    1 bud

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €491 (Avg Bid)
    €491 Gns Bud
    1 bud

    I am looking for IBM lotus approach expert.

    €20 / hr (Avg Bid)
    €20 / hr Gns Bud
    4 bud

    ...and Assessment 1. Evaluation of the current IBM Websphere Install 2. Make recommendations based upon assessment of environment 3. Design of new environment Task #2 Description: - Install Process Buildout of new virtual machines 1. OS install and tuning 2. Install of Prerequisites. 3. Install of IBM Websphere 1. Migration of Ques to new environment

    €1857 (Avg Bid)
    €1857 Gns Bud
    1 bud

    Experience in quantum computing basics. can demonstrate grover's algorithm on IBM Q. Modify the Grover's search black box for 2 qubits (shown in the YouTube video) to be able to perform Grover's search for 4 qubits Modify the Grover's search black box for 2 qubits (shown in the YouTube video) to be able to perform Grover's search for 4 qubits

    €15 (Avg Bid)
    €15 Gns Bud
    2 bud

    I need a simple music player that can be able to show me only the songs with an interval of Tempo, e.g. all the songs with more than 80 bpm and less than 90 bpm, Then it can play them all. Much Better if it's in Flutter, if it's not possible only Java. No UI details needed.

    €27 (Avg Bid)
    €27 Gns Bud
    7 bud

    An acronym is a word formed from the initial letters of a name, for example the word IBM is formed from the initial letters of the name: International Business Machines.

    €24 (Avg Bid)
    €24 Gns Bud
    7 bud

    Looking for a script to extract contact information from a Word Document and save it in a IBM Lotus Notes database.

    €26 (Avg Bid)
    €26 Gns Bud
    10 bud

    ...Moudaber, etc... Let's try one with you, if you impress me, then we can be long term buddies! I will discuss budget price, price isn't fixed.. Goes up with short time :) Bpm: 24-26, I love vocals.. Im a synth and vocal guy... Sexy percussions plays a big role! Anyway, these are some examples concerning heavy techno. 1) [log ind for at se URL]

    €279 (Avg Bid)
    €279 Gns Bud
    15 bud

    ...trainers and skilled resources , predominantly In Oracle BI, Oracle Data Integrator, Hyperion Product stack, Oracle Middleware solution, Oracle SOA, AIA Informatica, IBM Datastage and IBM Cognos. BISPhas footprints virtually across the USA, CANADA, UK, SINGAPORE, SAUDI ARABIA, AUSTRALIA and more by providing live virtual support services from India for

    €385 (Avg Bid)
    €385 Gns Bud
    3 bud

    ...trainers and skilled resources , predominantly In Oracle BI, Oracle Data Integrator, Hyperion Product stack, Oracle Middleware solution, Oracle SOA, AIA Informatica, IBM Datastage and IBM Cognos. BISPhas footprints virtually across the USA, CANADA, UK, SINGAPORE, SAUDI ARABIA, AUSTRALIA and more by providing live virtual support services from India for

    €153 - €460
    €153 - €460
    0 bud

    I need to study small animals (chicken and other birds) biometrics. I need a small device to be used with this animals, heart beat up to 450 bpm and oximetry around 80%. The device should work for a month and send the data to a bluetooth device, the "server" may be also programmed to receive the data (*.csv is fine). Each device should have a unique

    €1165 (Avg Bid)
    €1165 Gns Bud
    13 bud

    2.1. Comparison of data collection between QRadara and your SIEM solution Write a paragraph (150-250 words) to describe how data collection is being done in QRadar and your SIEM solution and compare both. 2.2. Comparison of data processing between QRadara and your SIEM solution Write a paragraph (150-250 words) to describe how data processing is being done in QRadar and your SIEM solution an...

    €39 (Avg Bid)
    €39 Gns Bud
    28 bud

    I want to use Ibm spss software on my PhD theses

    €324 (Avg Bid)
    €324 Gns Bud
    1 bud

    I need a Python programmer to adapt an existing script that uses Google ...SpeechRecognition (for API to the service), PyAudio (for microphone). This simple script can be used or the programmer can write it from scratch. As an alternative to Google, also IBM Watson or Microsoft API can be used if the programmer has more experience with these services.

    €27 / hr (Avg Bid)
    €27 / hr Gns Bud
    25 bud

    ...trainers and skilled resources , predominantly In Oracle BI, Oracle Data Integrator, Hyperion Product stack, Oracle Middleware solution, Oracle SOA, AIA Informatica, IBM Datastage and IBM Cognos. BISPhas footprints virtually across the USA, CANADA, UK, SINGAPORE, SAUDI ARABIA, AUSTRALIA and more by providing live virtual support services from India for

    €325 (Avg Bid)
    €325 Gns Bud
    9 bud

    I need a basic music player that can be able to get the tempo of the whole songs in the phone. Then group them by intervals (e.g. Slow songs goes more than 80 bpm and less than 90 bpm). No graphics details needed.

    €94 (Avg Bid)
    €94 Gns Bud
    8 bud