Filtrér

Mine seneste søgninger
Filtrer ved:
Budget
til
til
til
Slags
Evner
Sprog
    Job-status
    10,420 it operations jobs fundet, i prisklassen EUR

    I represent a growing Publishing organization and need your help. We are expanding our operations in the Romance niche (including Historical, Paranormal and others). We have a continuous stream of manuscripts of around 80K words each that we need to be proofread. We are looking to create an ongoing business relationship with the chosen bidder(s)

    €13 - €22 / hr
    €13 - €22 / hr
    0 bud

    We are running Magento 1.9 version. We are want to migrate to version 2.0 and want to streamline the ordering, inventory and CRM operations. Need PROFESSIONAL EXPERTS/ AGENCY ONLY who can provide full: - ecommerce process consulting - Migration of current store to Magento 2.0 including historic data - Integration of CRM module for higher customer satisfaction

    €3748 (Avg Bid)
    €3748 Gns Bud
    15 bud

    I am the operations manager for an esports team and need a header for my twitter. it will need to be the black and orange with the same logo I will attach and my position. The name of the team is called Dawn Rising. This is their twitter page [log ind for at se URL]

    €16 (Avg Bid)
    €16 Gns Bud
    17 bud
    mobile app for warehouse 6 dage left
    VERIFICERET

    ...my code to do this stage : The mobile app from stage I should be enhanced with the ability to store data about tracked products in the local memory of a mobile device. All operations on products (adding new products, increasing amount, decreasing amount and removing) should now be available regardless of the availability of a network connection. Single

    €185 (Avg Bid)
    €185 Gns Bud
    14 bud

    I have the page design with me. The design include each page, and how it should be. The operations start from, creating a product at warehouse 1. Create Product details Style Article details... 2. PO 3. GRN/Receive 4. Move to a store 5. POS Sales Discount Hold and bill another order Vouchers/Loyality cards Credit

    €375 (Avg Bid)
    €375 Gns Bud
    6 bud

    ...DO THIS STEPS AS BATCH OPERATIONS ON A LIST OF FILES: 1 - SELECT LIST OF SOURCE IMAGE FILES OR ENTIRE DIRECTORY OF IMAGES 2 - SELECT WHERE TO SAVE TARGET FILES AND POSSIBILITY TO AUTOMATIC CHANGE THE NAME OF FILE (ADDING FIXED TEXT, ADDING NUMBERS, USING SPECIAL CHARACTERS ...) 3 - POSSIBILITY TO CREATE A CHAIN OF OPERATIONS ON IMAGES IN A SEQUENCE:

    €474 (Avg Bid)
    €474 Gns Bud
    17 bud

    ...swipe *Action bar: Search, main page, notification, messages,answer It doesn't matter how the design will be after these features are provided, I don't have any idea about web service and api terms, processes that need to be done on server side and so on. I don't know, these operations will be owned by the application developer, because both my English

    €31 (Avg Bid)
    €31 Gns Bud
    3 bud

    I need you to write an operations management report . 4000 words maximum $85 operations manager asked to deliver a report to your new manager to brief him about the operations performed in company. Project Outline Section 1: Company background, products produced or services offered by the company Section 2: Operations Topics could include: 1. Productivity

    €80 (Avg Bid)
    €80 Gns Bud
    26 bud

    Need help preparing for a test on operations and inventory management. Things you need to be able to do are: -Calculate process/system capacity and bottlenecks -Compute Mean Absolute Deviation (MAD) and Mean Absolute Percentage Error (MAPE) -Calculate Seasonal Index, Indices, Average Seasonal Index -Use regression line and seasonal indices to derive

    €48 / hr (Avg Bid)
    €48 / hr Gns Bud
    1 bud
    Trophy icon I need some Graphic Design 1 dag left

    ...theme to the website basically. All the text and pictures needed can be found on our website. I have a rough idea .. Page 1 front is to be black with our logo on it and the tag line your asset our protection. Page 2 and 3 can be a panoramic view of london with info about our company and some news as to why security is important. Pages

    €26 (Avg Bid)
    Garanteret
    €26
    7 indlæg

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...area) is transferring all funds to us (New Frontier Operations). We will need to modify the payment processing to allow for multiple recipients (up to 5 businesses 4 Hardcoded and 1 business data relating to individual login). What needs to happen is the following : Business – “Would you like to pay it forward?” – Conditional UI can choose to make an

    €99 (Avg Bid)
    €99 Gns Bud
    17 bud
    Facebook app integration 5 dage left
    VERIFICERET

    I want to allow a user to l...finger or a click of a mouse. It will leave a blue translucent square where the press/click occurred and notify the picture owner that a segment of their facebook picture was especially liked. I know the above is broadly specified but I do not know the best way to integrate this feature into current facebook operations.

    €45 / hr (Avg Bid)
    €45 / hr Gns Bud
    23 bud

    ...swipe *Action bar: Search, main page, notification, messages,answer It doesn't matter how the design will be after these features are provided, I don't have any idea about web service and api terms, processes that need to be done on server side and so on. I don't know, these operations will be owned by the application developer, because both my English

    €31 (Avg Bid)
    €31 Gns Bud
    3 bud

    ...swipe *Action bar: Search, main page, notification, messages,answer It doesn't matter how the design will be after these features are provided, I don't have any idea about web service and api terms, processes that need to be done on server side and so on. I don't know, these operations will be owned by the application developer, because both my English

    €20 (Avg Bid)
    €20 Gns Bud
    7 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €219 (Avg Bid)
    €219 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €497 (Avg Bid)
    €497 Gns Bud
    1 bud

    ...improve security level based on behavioural analysis;  raise alerts for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow

    €485 (Avg Bid)
    €485 Gns Bud
    1 bud

    ...except for the register module. This means you cannot use assign, ifelse, always, ?: and etc. Use hierarchy in your project. For instance, you can design a Register module and use it as an instance in your datapath. You will not support floating point instructions, I-type instructions or J-type instructions. Also you will not implement jr and slt. All other

    €24 (Avg Bid)
    €24 Gns Bud
    2 bud

    We are the manufacturer of the FACEBOOK platform and we need to work with our contact service specialists on some of the FACEBOOK professional areas.

    €62 (Avg Bid)
    €62 Gns Bud
    10 bud

    Need to develop a plugin that needs to connect and read s3 bucket content put , create,delete operations and take the html files that drops in bucket and convert it to json format and send it over to cloud search domain and re index it

    €135 (Avg Bid)
    €135 Gns Bud
    15 bud

    Deliverable: financial model regarding employee compensation and bonuses. We are looking to put together a financial model that takes into account company income, company expenses, individual revenue goals for sales, recruiting and support teams, along with incentive/bonus plans for sales, recruiting and support teams. This is a small executive search firm and looking to build a new incentive/b...

    €130 (Avg Bid)
    €130 Gns Bud
    34 bud

    ...the other one as well), a project with Identity Server, responsible for the authentication, a back-office dashboard to see the registered users and manage the typical CRUD operations for them. The project will have the following characteristics: 1. A project called "Core" exposing some REST API responsible for: 1.1 The Registration of a user (just

    €281 (Avg Bid)
    €281 Gns Bud
    18 bud

    ...will be use to access the events (there are several events) 3,5 or 7 times.. it depends on the product validation is via QR Code. - social networking interfase for marketing purpose - documentation is online within the supported software developer [log ind for at se URL] - show which event it has been assisted - they cannot assist the same event, the same date twice

    €141 (Avg Bid)
    €141 Gns Bud
    12 bud

    ...- rules policys, safety, rules, etc Operations Manuals - (for both restaurants that will explain the entire shop operations, troubleshooting, best practise, role outlines, role guides) Training Manual - redesign Play Books I have all of the information easily ready or shareable I am looking for someone to put it together into a beautiful organised

    €231 (Avg Bid)
    €231 Gns Bud
    36 bud

    ...italian with "Tutte le categorie", and need to change "Enter your search key..." in italian with "Cosa vuoi cercare..." Moreover if you can "Riferimento: S0400606" it must not be shown, i need show it only in back office. In image2 i need to modify text "Write a review" for italian in "Scrivi una recensione" and "Ad...

    €79 (Avg Bid)
    €79 Gns Bud
    1 bud

    Top it operations Community-artikler