Internal analysis jobs

Filtro

Minhas pesquisas recentes
Filtrar por:
Orçamento
para
para
para
Tipo
Habilidades
Idiomas
    Estado do Trabalho
    5,090 internal analysis trabalhos encontrados, preços em USD

    annual internal audit a a a a a a a a a a a a a a a a a a a a a

    $570 - $1140
    $570 - $1140
    0 ofertas

    I need you to develop some software for me. I would like this software to be developed using PHP.

    $177 (Avg Bid)
    $177 Média
    17 ofertas

    ...italics and bold tags [login to view URL] HTML Code 8.Analysis of non index able attributes [login to view URL] Optimization [login to view URL] Analysis and Optimization of Alt and Title tags [login to view URL] Analysis and Optimization [login to view URL] of internal Navigation /linking structure [login to view URL] of external Links 14.Analysis of Broken L...

    $81 (Avg Bid)
    $81 Média
    23 ofertas

    ...italics and bold tags [login to view URL] HTML Code 8.Analysis of non index able attributes [login to view URL] Optimization [login to view URL] Analysis and Optimization of Alt and Title tags [login to view URL] Analysis and Optimization [login to view URL] of internal Navigation /linking structure [login to view URL] of external Links 14.Analysis of Broken L...

    $82 (Avg Bid)
    $82 Média
    28 ofertas

    I would like to provide customers to remote destkop to my internal data pages, but I need to limit the ability to click on specific links. So basically I want them to only have the functionality to search my database and view certain details. This need to be an online web tool. With the added feature of limiting the user from clicking certain links

    $1195 (Avg Bid)
    $1195 Média
    32 ofertas

    We have real estate website www.dwarkadeal.com. We want to three tasks to be .../home/dwarkadeal/public_html/includes/[login to view URL]) in /home/dwarkadeal/public_html/includes/[login to view URL] on line 1486" We want to get rid of this error 3)Also, sometime we get 500 INTERNAL server error Please tell us how much time you'll take to solve these issues

    $98 (Avg Bid)
    $98 Média
    25 ofertas

    Dear Community, We are a startup located in Italy called VAI Globale. We are hiring a developer to make a prototype of an intranet-style Web application. Our main goal at the moment is having the following functions: * Signing up * Logging in * The main functional interface (the design is already in the Powerpoint file) * Creating keywords with privacy settings (we want to test this function w...

    $33 (Avg Bid)
    $33 Média
    4 ofertas

    ...we are looking for a developer who can help us set up a prototype of a Windows web application. This application aims to be a collaboration tool for companies to enhance internal communication and project management in order to improve employee-wide visibility. Our application’s aim is to provide a company’s employee with a more complete knowledge

    $67 (Avg Bid)
    $67 Média
    5 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $251 (Avg Bid)
    $251 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $250 (Avg Bid)
    $250 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $568 (Avg Bid)
    $568 Média
    1 ofertas

    ...approach based to Machine Learning (ML) /neural network technic should be used to implement the Security Engine. A Machine Learning (ML) based algorithm will give to gateways an internal Artificial Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external

    $555 (Avg Bid)
    $555 Média
    1 ofertas

    ...upload those images and that [login to view URL] can use any programming language but if it is possible in python then go for [login to view URL] is video of output and images for [login to view URL] internal model we have to detect only that black spots(inclusion)as you can see in video we have to make whole model from images to you can see in video [login to view URL] most important th...

    $321 (Avg Bid)
    $321 Média
    4 ofertas
    Build internal website 3 dias left
    VERIFICADO

    I want to build an internal website hosted in local server "not connected to the Internet" , for a small business directory. * The main objective of this website is acts as a unified portal for employees to providing all forms used with personnel department in printable format. the user just need enter his ID number in the form and the form will filled

    $149 (Avg Bid)
    $149 Média
    30 ofertas

    ...following below on a monthly basis. Site [login to view URL] (MUST SPEAK SPANISH) KEYWORDS AND WEBSITE ANALYSIS [login to view URL] research 2.Analysis of Keywords Search Global and Local Volume ,Competition and Relevancy [login to view URL] Document type Analysis ON-PAGE OPTIMIZATION [login to view URL] of Title Tags [login to view URL] of Meta Description Tags "A...

    $122 (Avg Bid)
    $122 Média
    23 ofertas

    Dear Community, We are a startup located in Italy called VAI Globale. We are hiring a developer to make a prototype of an intranet-style Web application. Our main goal at the moment is having the following functions: * Signing up * Logging in * The main functional interface (the design is already in the Powerpoint file) * Creating keywords with privacy settings (we want to test this function w...

    $82 (Avg Bid)
    $82 Média
    12 ofertas
    .Net Architect 1 dia left
    VERIFICADO

    ...be translated into valid software architecture 9. Ensure the overall integrity of the software architecture and validates it against the system specification. 10. Integrate internal and external product design into a cohesive user experience 11. Design innovative solutions to real market problems. 12. Work closely with customers, business analysts, user

    $16 / hr (Avg Bid)
    $16 / hr Média
    21 ofertas

    ...the study should include: 1. General market research analysis and sales and marketing plan 2. Analysis of the project sector and its technical requirements 3. Financial study (from Costs decomposition, income statement, cash flows and expected financial position of 10 years) and sensitivity analysis 4. key indicators such as (1) Payback period - Return

    $488 (Avg Bid)
    $488 Média
    29 ofertas

    You need to change all internal no-follow links to follow Links. Remove nofollow attribute on all pages

    $27 (Avg Bid)
    $27 Média
    26 ofertas

    As contents · Easy to operate interface Functional aspect · Contact (external, internal) · Workflow relation (application for overtime, business trip application, purchase application ⇔ permission) · Schedule (individual, conference room) · File management · Cooperation with LINE · Equipment management · Cooperation with Forms &mi...

    $597 (Avg Bid)
    $597 Média
    41 ofertas

    ...are a startup located in Italy called VAI Globale, and we are looking for a developer who can help us in making a prototype of an intranet-style web application for a firm's internal employees. The App’s main function is "to show the right people the right information at the right time". We came up with the idea of keywords (#): each keyword can contain

    $59 (Avg Bid)
    $59 Média
    4 ofertas
    VBA expert needed Encerrado left
    VERIFICADO

    1 – Read a file of existing employee IDs 2 – Accept data entry from a user 3 – Write the data to a CSV file Details 1– ...( , ) including the header row. For the hourly pay, save the data with two decimal places. Deliverables: For each program submit: ➢ Program analysis ➢ Hierarchy chart ➢ A working VBA programs with good internal documentation.

    $53 (Avg Bid)
    $53 Média
    3 ofertas

    I am Looking for an E-commerce website with point system as currency to buy products ( no need cash/credit cards/debit cards ) with following key functions: 1) back office -- Upload the products and add/remove functions -- maintain organization structure ( example : managers and team members) -- Vendor assignment for each product and provider 2) Front office : ( role : team member ) --...

    $1146 (Avg Bid)
    $1146 Média
    115 ofertas
    Data entry Encerrado left

    ...met for order entry (set by Management). Enter information into Business Finance System. • Responsible for Order Entry and Control of information related to job files and internal systems up to invoicing. ESSENTIAL FUNCTIONS: 1. Performs all of the following: · enters test requisition data into computer creating an accessioning record which includes:

    $17 / hr (Avg Bid)
    $17 / hr Média
    5 ofertas

    ...are a startup located in Italy called VAI Globale, and we are looking for a developer who can help us in making a prototype of an intranet-style web application for a firm's internal employees. The App’s main function is "to show the right people the right information at the right time". We came up with the idea of keywords (#): each keyword can contain

    $201 (Avg Bid)
    $201 Média
    7 ofertas
    Trophy icon Logo for internal company project Encerrado left

    Deliverable is a finished logo in multiple formats (JPEG, PNG, EPS, AI). The logo will be used by a team for an internal company project. The logo should be based upon / inspired by the Mastercard corporate logo. Same colors. The idea is to represent either: - data flowing over computer networks, or - a foundation, showing the mastercard auth layer

    $100 (Avg Bid)
    Garantido Concurso Principal
    $100
    372 inscrições