Freelancer ibm jobs

Filtrovat

Moje poslední hledání
Třídit podle:
Rozpočet
pro
pro
pro
Typ
Dovednosti
Jazyky
    Stav zakázky
    3,531 freelancer ibm zakázek nalezeno, ceny v EUR

    Dorogoy Rodion, ya hotel u vas uznat', net li u vas vozmozhnosti rabotat' v Germanii? Yest' vozmozhnost nanyat' vas na proekt v Münchene, gde ponadabyatsya vashy znanija IBM DataStage. Budu rad pogovorit' s vami ob etom, esli yest' vozmozhnost'. Pjotr Schulmann

    €54 / hr (Avg Bid)
    €54 / hr Průměr. nabídka
    1 nabídky

    Need someone to assist in completing the build of IBM Domino / XPages system. The Developer must have proven experience developing web interfaces for IBM Domino v9.0.1, XPages, Java, HTML, and CSS for desktop as well as mobile user interfaces.

    €17 / hr (Avg Bid)
    €17 / hr Průměr. nabídka
    7 nabídky

    I need to enable SSL on an integration service hosted on IBM IIB V10

    €176 (Avg Bid)
    €176 Průměr. nabídka
    1 nabídky

    We are looking at developing an AI model using IBM, Microsoft or AWS cloud to recognise invoices, bank statements, receipts, etc. and post to the right categories in our chart of accounts automatically. The project will help us to reduce the reliance of teams of account clerks and make data entry more accurate.

    €5477 (Avg Bid)
    €5477 Průměr. nabídka
    15 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    We are looking to build a new website to resell IT products and services to included manufacturers like Microsoft, Amazon, Oracle, IBM, Cisco, etc.

    €167 (Avg Bid)
    €167
    9 příspěvky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €221 (Avg Bid)
    €221 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €220 (Avg Bid)
    €220 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €500 (Avg Bid)
    €500 Průměr. nabídka
    1 nabídky

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    €488 (Avg Bid)
    €488 Průměr. nabídka
    1 nabídky

    I am looking for IBM lotus approach expert.

    €20 / hr (Avg Bid)
    €20 / hr Průměr. nabídka
    4 nabídky

    ...and Assessment 1. Evaluation of the current IBM Websphere Install 2. Make recommendations based upon assessment of environment 3. Design of new environment Task #2 Description: - Install Process Buildout of new virtual machines 1. OS install and tuning 2. Install of Prerequisites. 3. Install of IBM Websphere 1. Migration of Ques to new environment

    €1847 (Avg Bid)
    €1847 Průměr. nabídka
    1 nabídky

    Experience in quantum computing basics. can demonstrate grover's algorithm on IBM Q. Modify the Grover's search black box for 2 qubits (shown in the YouTube video) to be able to perform Grover's search for 4 qubits Modify the Grover's search black box for 2 qubits (shown in the YouTube video) to be able to perform Grover's search for 4 qubits

    €15 (Avg Bid)
    €15 Průměr. nabídka
    2 nabídky

    An acronym is a word formed from the initial letters of a name, for example the word IBM is formed from the initial letters of the name: International Business Machines.

    €24 (Avg Bid)
    €24 Průměr. nabídka
    7 nabídky

    Looking for a script to extract contact information from a Word Document and save it in a IBM Lotus Notes database.

    €26 (Avg Bid)
    €26 Průměr. nabídka
    10 nabídky

    ...trainers and skilled resources , predominantly In Oracle BI, Oracle Data Integrator, Hyperion Product stack, Oracle Middleware solution, Oracle SOA, AIA Informatica, IBM Datastage and IBM Cognos. BISPhas footprints virtually across the USA, CANADA, UK, SINGAPORE, SAUDI ARABIA, AUSTRALIA and more by providing live virtual support services from India for

    €383 (Avg Bid)
    €383 Průměr. nabídka
    3 nabídky

    ...trainers and skilled resources , predominantly In Oracle BI, Oracle Data Integrator, Hyperion Product stack, Oracle Middleware solution, Oracle SOA, AIA Informatica, IBM Datastage and IBM Cognos. BISPhas footprints virtually across the USA, CANADA, UK, SINGAPORE, SAUDI ARABIA, AUSTRALIA and more by providing live virtual support services from India for

    €152 - €457
    €152 - €457
    0 nabídky

    2.1. Comparison of data collection between QRadara and your SIEM solution Write a paragraph (150-250 words) to describe how data collection is being done in QRadar and your SIEM solution and compare both. 2.2. Comparison of data processing between QRadara and your SIEM solution Write a paragraph (150-250 words) to describe how data processing is being done in QRadar and your SIEM solution an...

    €39 (Avg Bid)
    €39 Průměr. nabídka
    28 nabídky

    I want to use Ibm spss software on my PhD theses

    €323 (Avg Bid)
    €323 Průměr. nabídka
    1 nabídky

    I need a Python programmer to adapt an existing script that uses Google ...SpeechRecognition (for API to the service), PyAudio (for microphone). This simple script can be used or the programmer can write it from scratch. As an alternative to Google, also IBM Watson or Microsoft API can be used if the programmer has more experience with these services.

    €27 / hr (Avg Bid)
    €27 / hr Průměr. nabídka
    25 nabídky

    ...trainers and skilled resources , predominantly In Oracle BI, Oracle Data Integrator, Hyperion Product stack, Oracle Middleware solution, Oracle SOA, AIA Informatica, IBM Datastage and IBM Cognos. BISPhas footprints virtually across the USA, CANADA, UK, SINGAPORE, SAUDI ARABIA, AUSTRALIA and more by providing live virtual support services from India for

    €307 (Avg Bid)
    €307 Průměr. nabídka
    10 nabídky

    ...quick straight forward job for a contractor that is proficient in SPSS. Need someone to fix the problem and to generate the results. USER REQUIREMENTS -Must have a version of IBM SPSS -Need a quick turnaround (within hours) VARIABLE ANALYSIS Variables: 9-11 Varibales: 12- 15 Variables: 16 -19 Variable: 21-25 As mentioned earlier, this needs to be prepared

    €414 (Avg Bid)
    €414 Průměr. nabídka
    35 nabídky
    Build B2B Leads -- 2 Ukončeno left

    ...Companies in US who have implemented following services: 1. Adobe Campaign(Adobe marketing cloud) 2. Unica(IBM Campaign) 3. SAS(Modules: Visual Analytics, Customer Intelligence, Enterprise Miner) 4. Watson Campaign Automation(WCA) also called Silverpop(An IBM company) Let me know if you could provide list of companies and Information of top level executives

    €156 (Avg Bid)
    €156 Průměr. nabídka
    2 nabídky
    IBM ILOG CPLEX Ukončeno left

    Small project with IBM ILOG CPLEX optimization studio

    €2 - €7 / hr
    €2 - €7 / hr
    0 nabídky

    ...the existing system (volunteer management). Specifically, I am looking for IBM Watson's certificate to be IAM only, and to modify IBM Watson's module (PHP) published on [pro zobrazení URL se přihlaste] to be IAM-compliant one. Final product is a set of IAM-compliant source code of Drupal's IBM Watson (Speech to Text) module below. Perhaps it is proba...

    €171 (Avg Bid)
    €171 Průměr. nabídka
    13 nabídky

    We are working with IBM on a sensor which needs to be scanned by the phone camera with something like QR and display the data and sent automatically to the server. We need some modifications on the free APK ( no algorithms changes - link below) to eliminate the options they have and choose the only ones we are interested. If this is doable using

    €306 (Avg Bid)
    €306 Průměr. nabídka
    14 nabídky

    We are a data analytic company and wanted to read and write spss data files through c# via api. We also wanted to make sure there is no licencing issue from IBM SPSS.

    €99 (Avg Bid)
    €99 Průměr. nabídka
    5 nabídky