Website template simmilar ibm com jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    11,859 website template simmilar ibm com jobs found, pricing in USD

    I need a new website. I need you to design and build a website for my small business like [login to view URL], [login to view URL]

    $385 (Avg Bid)
    $385 Avg Bid
    15 bids
    Trophy icon Gadgets E com Banner Design 4 days left

    Hello, I was looking for someone to design me a banner for my gadgets store [login to view URL] I would like the banner to be 1500px width X 600px height. It should be blue #167ac6 and black. I would like something like the picture attached however I want the boxes to have my logo as if they were gifts like the sample box picture below. You could use a few gadgets which I have in my store(salad bo...

    $50 (Avg Bid)
    Guaranteed
    $50
    11 entries

    We are working with IBM on a sensor which needs to be scanned by the phone camera with something like QR and display the data and sent automatically to the server. We need some modifications on the free APK ( no algorithms changes - link below) to eliminate the options they have and choose the only ones we are interested. If this is doable using

    $373 (Avg Bid)
    $373 Avg Bid
    33 bids

    website SEO for userdcar520.com

    $94 (Avg Bid)
    $94 Avg Bid
    86 bids

    I would need help creating a Com add in for Visio that would work as a userform where u can fill in the data in the attached image. The code would need to be accesable since we will do more changes to it later and add other processes to it. Is this something you could do ? this is only the begining alot more things could be added to this later on

    $35 (Avg Bid)
    $35 Avg Bid
    2 bids

    python (or any desktop application code) application that will: detect a material (ex. an authentication dallas key ) plugged into com port (rs232), read data from it, convert data from hexa to ascii put asci code into the keybord buffer the application will run in the background project for inspiration ([login to view URL])

    $135 (Avg Bid)
    $135 Avg Bid
    7 bids

    python (or any desktop application code) application that will: detect a material (ex. an authentication dallas key ) plugged into com port (rs232), read data from it, convert data from hexa to ascii put asci code into the keybord buffer the application will run in the background project for inspiration ([login to view URL])

    $649 (Avg Bid)
    $649 Avg Bid
    6 bids

    I would need help creating a Com add in for Visio that would work as a userform where u can fill in the data in the attached image. The code would need to be accesable since we will do more changes to it later and add other processes to it. Is this something you could do ? this is only the begining alot more things could be added to this later on

    $192 (Avg Bid)
    $192 Avg Bid
    5 bids

    ...users from a banned country to connect a target website through a Virtual server or any other alternative solution to let users from a banned country to be able to connect the target website ( Tarfet website is only allowed to malaysian IP ) . No error in flash , GIF or delay in request is accepted . Simmilar websites exists already so writing a source

    $224 (Avg Bid)
    $224 Avg Bid
    4 bids

    Hey, i need someone to copy my webpage from a .biz to a .com domain. No big thing i think. It is an Wordpress based One-Page-Website on heckenschnitt.biz. You should copy the whole content to heckenschnitt.com. I can provide FTP-Access in Chat.

    $24 (Avg Bid)
    $24 Avg Bid
    40 bids

    Need someone to assist in completing the build of IBM Domino / XPages system. The Developer must have proven experience developing web interfaces for IBM Domino v9.0.1, XPages, Java, HTML, and CSS for desktop as well as mobile user interfaces.

    $19 / hr (Avg Bid)
    $19 / hr Avg Bid
    8 bids

    I need to enable SSL on an integration service hosted on IBM IIB V10

    $200 (Avg Bid)
    $200 Avg Bid
    1 bids

    I need a new website. I need you to design and build my online store.

    $301 (Avg Bid)
    $301 Avg Bid
    33 bids

    We are looking at developing an AI model using IBM, Microsoft or AWS cloud to recognise invoices, bank statements, receipts, etc. and post to the right categories in our chart of accounts automatically. The project will help us to reduce the reliance of teams of account clerks and make data entry more accurate.

    $6227 (Avg Bid)
    $6227 Avg Bid
    15 bids

    I have an HTML (with some Javascript in it) file that I created. I would like to create a simmilar application using Android Studio.

    $31 (Avg Bid)
    $31 Avg Bid
    15 bids

    Hello, i am looking for a php expert for my web site: satellitetv24.com He will do some changes at my website. It is simple work. Please send me your offers. Thank you.

    $1161 (Avg Bid)
    $1161 Avg Bid
    27 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    We are looking to build a new website to resell IT products and services to included manufacturers like Microsoft, Amazon, Oracle, IBM, Cisco, etc.

    $190 (Avg Bid)
    $190
    11 entries

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $251 (Avg Bid)
    $251 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $568 (Avg Bid)
    $568 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $555 (Avg Bid)
    $555 Avg Bid
    1 bids

    Hi there will be security and coding work for my site. Please check satellitetv24.com

    $1137 (Avg Bid)
    $1137 Avg Bid
    38 bids

    I am looking for IBM lotus approach expert.

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    4 bids

    ...and Assessment 1. Evaluation of the current IBM Websphere Install 2. Make recommendations based upon assessment of environment 3. Design of new environment Task #2 Description: - Install Process Buildout of new virtual machines 1. OS install and tuning 2. Install of Prerequisites. 3. Install of IBM Websphere 1. Migration of Ques to new environment

    $2100 (Avg Bid)
    $2100 Avg Bid
    1 bids

    Experience in quantum computing basics. can demonstrate grover's algorithm on IBM Q. Modify the Grover's search black box for 2 qubits (shown in the YouTube video) to be able to perform Grover's search for 4 qubits Modify the Grover's search black box for 2 qubits (shown in the YouTube video) to be able to perform Grover's search for 4 qubits

    $17 (Avg Bid)
    $17 Avg Bid
    2 bids

    Hello, PLEASE READ THE COMPLETE MESSAGE BEFORE YOU REPLY I am trying to connect with Contributors/Opinion article writers from Forbes, HuffPost, Inc etc. for a story. These would be global as well as Indian platforms. Request you to share your list with pricing and publications mentioned clearly to take this forward. Huffington Post [login to view URL] Forbes [login to view URL] [login to...

    $1353 (Avg Bid)
    $1353 Avg Bid
    5 bids