Ibm information server data stage työt

Suodata

Viimeisimmät hakuni
Suodatusperuste:
Budjetti
asti
asti
asti
Tyyppi
Taidot
Kielet
    Työn tila
    5,148 ibm information server data stage työtä löytyi, hinnoittelu EUR
    Urgently required Android app developer 6 päivää left
    VARMENNETTU

    We are working with IBM on a sensor which needs to be scanned by the phone camera with something like QR and display the data and sent automatically to the server. We need some modifications on the free APK ( no algorithms changes - link below) to eliminate the options they have and choose the only ones we are interested. If this is doable using

    €333 (Avg Bid)
    €333 Keskimäär. tarjous
    31 tarjoukset

    I will need a ERD diagram created with normalisation techniques to 3rd bottom up approach. I have 5 datasets and a brief this will be sent once anyone is interested in the project

    €33 (Avg Bid)
    €33 Keskimäär. tarjous
    9 tarjoukset

    Hi , we need help debugging and implementing stalls and data forwarding for a 5 stage pipelined [kirjaudu nähdäksesi URL:n] processor uses RISC-like instruction set. The processor has four internal registers: R0, R1, R2, and R3. Each register is 1-byte. The address space of instruction memory and data memory is 256, and the processor uses little-endian byte ordering

    €164 (Avg Bid)
    €164 Keskimäär. tarjous
    3 tarjoukset

    Hi , we need help debugging and implementing stalls and data forwarding for a 5 stage pipelined [kirjaudu nähdäksesi URL:n] processor uses RISC-like instruction set. The processor has four internal registers: R0, R1, R2, and R3. Each register is 1-byte. The address space of instruction memory and data memory is 256, and the processor uses little-endian byte ordering

    €20 - €164
    €20 - €164
    0 tarjoukset
    IBM Xpages Development 3 päivää left

    Need someone to assist in completing the build of IBM Domino / XPages system. The Developer must have proven experience developing web interfaces for IBM Domino v9.0.1, XPages, Java, HTML, and CSS for desktop as well as mobile user interfaces.

    €17 / hr (Avg Bid)
    €17 / hr Keskimäär. tarjous
    7 tarjoukset
    Enable SSL on IBM Integration BUS V10 3 päivää left
    VARMENNETTU

    I need to enable SSL on an integration service hosted on IBM IIB V10

    €176 (Avg Bid)
    €176 Keskimäär. tarjous
    1 tarjoukset

    ...password and login data with a form login after that the rest server will return a JWT token and this token needs be stored on a local place on app cache this token will be used to pass to the same rest server to get some data and display it on a table. If token expired the login screen will to to user needs login again if token is stored data will be presente...

    €127 (Avg Bid)
    €127 Keskimäär. tarjous
    2 tarjoukset

    We are looking at developing an AI model using IBM, Microsoft or AWS cloud to recognise invoices, bank statements, receipts, etc. and post to the right categories in our chart of accounts automatically. The project will help us to reduce the reliance of teams of account clerks and make data entry more accurate.

    €5473 (Avg Bid)
    €5473 Keskimäär. tarjous
    15 tarjoukset
    Project for Anudeep K. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Gili L. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for macitaytac 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    We are looking to build a new website to resell IT products and services to included manufacturers like Microsoft, Amazon, Oracle, IBM, Cisco, etc.

    €167 (Avg Bid)
    €167
    9 työtä

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Hashem A. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Saikumar U. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Ahmed M. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Miftahul A. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Meenoy S. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Kemal H. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Robert Y. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Xiaodong C. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Joan A M. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Daniyal A. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Yuan N. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Aqeel F. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Xiaoqi D. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Chunyan Y. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Keskimäär. tarjous
    1 tarjoukset
    Project for Jin C. 4 päivää left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €499 (Avg Bid)
    €499 Keskimäär. tarjous
    1 tarjoukset

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €488 (Avg Bid)
    €488 Keskimäär. tarjous
    1 tarjoukset

    I am looking for IBM lotus approach expert.

    €20 / hr (Avg Bid)
    €20 / hr Keskimäär. tarjous
    4 tarjoukset
    Project for Ahmed S. 3 päivää left

    ...and Assessment 1. Evaluation of the current IBM Websphere Install 2. Make recommendations based upon assessment of environment 3. Design of new environment Task #2 Description: - Install Process Buildout of new virtual machines 1. OS install and tuning 2. Install of Prerequisites. 3. Install of IBM Websphere 1. Migration of Ques to new environment

    €1846 (Avg Bid)
    €1846 Keskimäär. tarjous
    1 tarjoukset

    Experience in quantum computing basics. can demonstrate grover's algorithm on IBM Q. Modify the Grover's search black box for 2 qubits (shown in the YouTube video) to be able to perform Grover's search for 4 qubits Modify the Grover's search black box for 2 qubits (shown in the YouTube video) to be able to perform Grover's search for 4 qubits

    €15 (Avg Bid)
    €15 Keskimäär. tarjous
    2 tarjoukset

    Design an audio amplifier / booster employing a transistor long-tail pair input stage (BJT or MOS) and a 250 mW BJT class-AB complementary output stage to drive a 25 Ω earphone speaker using discreet transistors. Ensure maximum output compliance using a max +6 V supply rail and a minimum total voltage gain of 20. The amplifier is to be driven by a mobile

    €60 (Avg Bid)
    €60 Keskimäär. tarjous
    6 tarjoukset

    An acronym is a word formed from the initial letters of a name, for example the word IBM is formed from the initial letters of the name: International Business Machines.

    €24 (Avg Bid)
    €24 Keskimäär. tarjous
    7 tarjoukset

    Looking for a script to extract contact information from a Word Document and save it in a IBM Lotus Notes database.

    €25 (Avg Bid)
    €25 Keskimäär. tarjous
    10 tarjoukset

    Hello, We are looking for 3D Character model and Environment for our upcoming game . Detailed requirement is attached herewith. Best Regards, Vaibhav

    €1213 (Avg Bid)
    €1213 Keskimäär. tarjous
    24 tarjoukset

    ...support with highly intellectual professional trainers and skilled resources , predominantly In Oracle BI, Oracle Data Integrator, Hyperion Product stack, Oracle Middleware solution, Oracle SOA, AIA Informatica, IBM Datastage and IBM Cognos. BISPhas footprints virtually across the USA, CANADA, UK, SINGAPORE, SAUDI ARABIA, AUSTRALIA and more by providing

    €382 (Avg Bid)
    €382 Keskimäär. tarjous
    3 tarjoukset

    ...support with highly intellectual professional trainers and skilled resources , predominantly In Oracle BI, Oracle Data Integrator, Hyperion Product stack, Oracle Middleware solution, Oracle SOA, AIA Informatica, IBM Datastage and IBM Cognos. BISPhas footprints virtually across the USA, CANADA, UK, SINGAPORE, SAUDI ARABIA, AUSTRALIA and more by providing

    €152 - €457
    €152 - €457
    0 tarjoukset
    Stage photos Loppunut left

    Hello, I'm looking for someone to stage photos of a commercial space to show events at the space. Thank you.

    €75 (Avg Bid)
    €75 Keskimäär. tarjous
    26 tarjoukset

    ...1. Comparison of data collection between QRadara and your SIEM solution Write a paragraph (150-250 words) to describe how data collection is being done in QRadar and your SIEM solution and compare both. 2.2. Comparison of data processing between QRadara and your SIEM solution Write a paragraph (150-250 words) to describe how data processing is being

    €39 (Avg Bid)
    €39 Keskimäär. tarjous
    28 tarjoukset

    I want to use Ibm spss software on my PhD theses

    €323 (Avg Bid)
    €323 Keskimäär. tarjous
    1 tarjoukset

    I need a Python programmer to adapt an existing script that uses Google ...SpeechRecognition (for API to the service), PyAudio (for microphone). This simple script can be used or the programmer can write it from scratch. As an alternative to Google, also IBM Watson or Microsoft API can be used if the programmer has more experience with these services.

    €27 / hr (Avg Bid)
    €27 / hr Keskimäär. tarjous
    25 tarjoukset