Elastic transcoder encryptionemplois

Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    2,000 elastic transcoder encryption travaux trouvés au tarif de EUR

    I am searching for an experienced website developer to build a HIPAA compliant platform. The key features of the webs...for an experienced website developer to build a HIPAA compliant platform. The key features of the website should include: - Secure data storage. - User authentication. - Encryption of data in transit. - Field entries such as text, numbers, dates, and medical procedure info. - Robust handling of uploaded files, such as storing files on server, encrypting files before storage, enabling users to download files, and ensuring HIPAA compliant storage (). Ideal candidate should have a thorough understanding and experience in developing secure, HIPAA-compliant websites, working with encryption techniques, and handling sensitive data responsibly.

    €3997 (Avg Bid)
    €3997 Offre moyenne
    94 offres
    AWS network issue S'est terminé left

    More details: What specific AWS service are you experiencing network issues with? EC2 (Elastic Compute Cloud) What type of network issue are you encountering with EC2? Connectivity issues between EC2 instances Are the EC2 instances located in the same region? Yes, in the same region

    €16 (Avg Bid)
    €16 Offre moyenne
    32 offres
    Cross-Platform Mobile Money App S'est terminé left

    ...management system (via file transfer or web services) - Our payment switch (ISO8583 or web services) - The information systems of various partner billers (modalities to be defined) 6. Technical Requirements The provider must ensure the following technical requirements: - High 24/7 availability of the platform - Seamless scalability to absorb growth in user base - Reinforced security mechanisms (encryption, tokenization, etc.) - Robust and reliable architecture - Ease of integration with third-party APIs and systems 7. Deliverables The provider must supply: - Complete documented source code - Detailed technical documentation (architecture, flows, data models) - Installation, configuration, operation and maintenance procedures - Test plans for unit, integration and non-...

    €6086 (Avg Bid)
    €6086 Offre moyenne
    92 offres

    ...looking for an experienced and full-time Senior DotNet Core Developer for a position that requires expertise in API encryption and system integrity checking. Since this is a web-based system, having solid experience in this area will provide a substantial advantage. Key Responsibilities: - Develop using DotNet Core - API's Development - Encrypt existing APIs - Perform regular checks to ensure system integrity The ideal candidate should have: - Extensive experience in API encryption - Proficiency in DotNet Core development - Proven experience in maintaining web-based systems Given the sensitive nature of the project, having a strong background and understanding in data encryption and security is absolutely critical. You will be handling confidential inf...

    €1114 (Avg Bid)
    €1114 Offre moyenne
    100 offres

    ...leveraging JVM optimizations for enhanced performance. - Utilize Custom IDE for application development and debugging on IoT devices and edge computing platforms, contributing to our smart retail solutions. - Implement and manage device agents for secure and efficient communication between retail devices and the cloud. - Ensure robust device security in a retail environment, including implementing encryption and secure data transmission protocols. - Manage device firmware upgrades and version control, ensuring seamless updates and compatibility across retail devices. - Optimize retail device system performance, including kernel and embedded OS enhancements, and Embedded C programming for hardware interfacing and control. - Collaborate with cross-functional teams to define, ...

    €1269 (Avg Bid)
    €1269 Offre moyenne
    20 offres

    ...participation listing. ## Administrative Functions - Manual event and heat setup, with a user-friendly interface or spreadsheet integration. - Ability to categorize/filter events based on date and location. - Provision for real-time updates to heats and pilot listings. ## Technical Requirements - Responsive design compatible with Android and Apple mobile devices. - Secure user authentication and data encryption. - Scalable architecture to support a growing user base. ## Development Milestones **Milestone 1: Project Setup and Initial Design** - Establish project management tools and repository - Define the technology stack and development frameworks to be used. **Milestone 2: Dev Functionality Development** - Develop User Notification system - Add Patreon - Add new Profile ty...

    €515 (Avg Bid)
    €515 Offre moyenne
    54 offres

    ...testing and simulation prior to live market application. 6. Enhanced Security and Data Encryption Purpose: Elevate the security of API keys and sensitive data to the highest standards. Functionality: Utilize state-of-the-art encryption methods to secure API keys and sensitive data in the database, ensuring data is unreadable by unauthorized entities, including developers. Employ secure encryption algorithms and practices for data at rest and in transit. 7. Transaction Logging Purpose: Maintain detailed records of all buy and sell transactions executed on the platform. Functionality: Log every transaction, including date, time, cryptocurrency type, volume, price, and transaction outcome. Secure storage and encryption of transaction logs to ensure confidentiali...

    €559 (Avg Bid)
    €559 Offre moyenne
    59 offres

    I'm in need of an Excel expert who can assist me in creating an advanced tracking system for specific KPI's and security measures. For the KPI tracking, you'll work with: - Sales - Profit Margin - Customer Satisfaction It's also crucial for the data we manage is secure with a well-setup security system. Data security is paramount, and I need these set up: - Data encryption - User authentication - Firewall protection Moreover, the security measures should include an effective incident tracker that, in case of any violation, notifies me through email. Skills needed: - Expert in Excel - Understanding of Data Security - Knowledge in setting up email notifications. Please, only apply if you have a strong understanding of these areas.

    €161 (Avg Bid)
    €161 Offre moyenne
    38 offres

    I am in search of a skilled iOS developer to design, optimize, and enrich iOS SDKs. The primary focus of this project will revolve around specific features, including: - Implementation of robust data encryption mechanisms to safeguard sensitive user data. - Deployment of reliable user authentication methods supporting various sign-in options. - Creation of an efficient push notifications system to enhance user engagement. - Ensuring comprehensive error handling and reporting functionalities to effectively communicate issues and data discrepancies. Your responsibilities will involve integrating APIs to ensure seamless connectivity and functionality. Additionally, central to the project is the incorporation of analytics tracking, which encompasses: - Custom event tracking to enable...

    €40290 (Avg Bid)
    €40290 Offre moyenne
    28 offres

    I'm urgently requiring a skilled software developer, specifically well-versed in creating upper-tier security software for MacBook and iPad ...software for MacBook and iPad devices. The software should be feature-rich with functionalities such as: - Virus scanning and removal: The software must proficiently detect and eradicate any harmful or malicious programs. - Firewall protection: An inbuilt tool to monitor and control incoming and outgoing network traffic based on predetermined security rules is required. - Encryption and security audits: I'd also need encryption options and regular security audit capability to maintain the integrity of our systems. WE PROVIDE YOU DEVICES FOR YOUR SECURITY CHECKUP IF YOU HAVENT . WE NEED IOS 17.6 IPHONE WE NEED MACOS17.6...

    €2379 (Avg Bid)
    €2379 Offre moyenne
    12 offres

    I'm looking for a talented individual with proficiency in image processing and hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in su...processing and hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that its original concepts not changes - making image change so many time like a loop - calculating images hash The resultant processed images should be provided in JPEG, PNG, and GIF formats. A background in encryption and cryptography will be highly desirable. Your experience with these specific image processing techniques will be crucial to the succes...

    €113 (Avg Bid)
    €113 Offre moyenne
    56 offres

    I'm in need of an experienced PHP developer to secure and establish PHP REST APIs. The key requirements for this project include: 1. Security Enhancements: - Encryption of data; implementing a powerful encryption mechanism to shield sensitive data - Authentication and authorization; setting up a robust security system to authenticate users and authorize necessary permissions - Protection against SQL Injection; applying various techniques to guard against SQL injection attacks, ensuring database security 2. Efficient Data Load Management: - The APIs should be designed to fetch data as needed from the MySQL database, ensuring fast and efficient loading to uphold user experience 3. Data Handling: - The REST APIs will primarily handle JSON data, thus pro...

    €25 (Avg Bid)
    €25 Offre moyenne
    12 offres

    ...para SPA). - Backend: Node.js (recomendado para integración con JavaScript) o Python. - APIs: OpenAI para Whisper y ChatGPT, alternativas para síntesis de voz y reconocimiento de voz. 4. Tecnologías de autenticación y seguridad: - OAuth, JWT, y SSL/TLS para garantizar la seguridad y la privacidad de los datos. 5. Tecnologías de despliegue y mantenimiento: - Docker, Kubernetes, y AWS Elastic Beanstalk para garantizar la fiabilidad y la escalabilidad de la aplicación. 6. Tecnologías de pruebas: - Selenium, JUnit, y Postman para garantizar la calidad y la fiabilidad del sistema. 7. Tecnologías de colaboración y gestión de proyectos: - GitHub, Trello, y Asana para garantizar la eficiencia y la...

    €1185 (Avg Bid)
    €1185 Offre moyenne
    46 offres

    ...with extensive experience in network security, data encryption, and malware detection. Although I've not specified a particular area of cyber security, your role will be wide-ranging and comprehensive. Project Guidelines: 1- Implementation of Encryption Algorithm: a) Develop an implementation scenario for one encryption algorithm. b) Provide a detailed description of the chosen algorithm, including its functioning. c) Apply software engineering approaches, starting from requirements gathering to design and implementation phases. d) Submit a complete project package containing: • The implemented encryption algorithm. • Detailed documentation of the algorithm and project development process. • A graphical interface for file encrypt...

    €106 (Avg Bid)
    €106 Offre moyenne
    45 offres
    AES Cyber Security Expert Needed S'est terminé left

    ...Summary: - Implementation of Encryption Algorithm: a) Develop an implementation scenario for one encryption algorithm. b) Provide a detailed description of the chosen algorithm, including its functioning. c) Apply software engineering approaches, starting from requirements gathering to design and implementation phases. d) Submit a complete project package containing: • The implemented encryption algorithm. • Detailed documentation of the algorithm and project development process. • A graphical interface for file encryption and decryption. • Important Implementation Tips: In your implementation, please adhere to the following guidelines: 1. Your program should accept any file type as input (e.g., .docx, .jpg, .xlsx, etc.). 2. Depending on y...

    €124 (Avg Bid)
    €124 Offre moyenne
    51 offres

    I am seeking a tech-savvy freelancer to prioritize key fixes and configurations on my Bitcoin wallet which is hosted on an AWS server. This project will have three main focus areas: 1. AWS Bucket Setup: I require assistance in setting up an AWS bucket to ensure the smooth and secure receipt of users' KYC...of the Blockcypher need to be updated and possibly optimized for the purpose. 3. Email Spam Issue: I've been experiencing a problem where automated emails are directed to spam. A remedy for this issue is urgently needed. The ideal candidate for this project will have deep knowledge of and experience with AWS bucket setup, Blockcypher configuration, and email spam prevention. Proficiency in encryption and security procedures, specifically related to Bitcoin wallets, is...

    €120 (Avg Bid)
    €120 Offre moyenne
    150 offres

    I'm seeking an expert in Python to develop a decryption utility tool. The purpose of this tool is to decode encrypted messages, binary files, and encoded data, helping me simplify and expedite data analysis tasks. The ideal candidate will: • Have substantial experience with Python programming. • Be familiar with various encryption algorithms, notably AES, RSA and DES. Your expertise in these will be key to the successful creation of this utility. • Be committed and focused, as the tool must be completed ASAP. Looking forward to receiving bids from suitable and interested freelancers. Please, when bidding, include any relevant experience and examples of similar projects.

    €20 (Avg Bid)
    €20 Offre moyenne
    77 offres

    I’m seeking a proficient blockchain developer, experienced in utilizing Solana blockchain platform, to integrate a unique feature into my project - a secure, wallet-to-wallet chat function. Key Requirements: - Extensive programming skills and understanding of Solana blockchain - Experience in developing and integrating real-time chat functionality - Knowledge of implementing end-to-end encryption, ensuring a secure and private communication channel for users The end product should enable safe, private conversations between wallets on the Solana blockchain platform. Your expertise will contribute significantly to the overall user experience of my project. Looking forward to working with devoted and skilled developers.

    €115 (Avg Bid)
    €115 Offre moyenne
    14 offres

    I'm in need of a capable Laravel developer who can craft a Laravel based cloud which includes some customized requirements. Key features must include: User Management: - User registration - User login - User roles and permissions File Encryption and Management: - Encryption capabilities to ensure file security. Billing and Quotation: - Integration of a billing system to handle transactions. - Quotation function for users to make estimates. Admin Panel: - Capability to manage users, files, and billing. Dynamic Plans and Subscriptions: - The platform needs to host various plans and subscriptions for different levels of users. Experience in Laravel, user interface design, file management systems and secure payment integrations would make you an ideal freelancer for...

    €147 (Avg Bid)
    €147 Offre moyenne
    31 offres

    As a business striving for optimal data protection, I'm on the lookout for an expert who can deliver an in-depth review of Cyber Security The ideal freelancer for this job would be someone with: - Intensive knowledge and experience in Cyber Security - Solid understanding of Data Encryption and Malware Protection Deliverables: - A comprehensive topic review, spanning 10 to 15 page 20 resources each 500 word minimum given : I will give you the proposal

    €19 (Avg Bid)
    €19 Offre moyenne
    11 offres

    I need an ETL developer to streamline and automate an existing manual process. This includes: - Transferring two encrypted *. files from a source server to a local machine. - Decrypting these files into *.csv format. - Running SQL on one file and a PowerShell command on the other file to create a staging table. - Setting up a Micro...staging table. - Setting up a Microsoft SQL Server database into read-write mode from read-only. - Reverting the database back to read-only upon task completion. - Sending a report to the user upon task completion. Ideal skills for this job include advanced SQL, PowerShell, and ETL development. Familiarity with read/write permissions on Microsoft SQL Server and experience with data transfer and encryption/decryption processes are also highly benefici...

    €32 (Avg Bid)
    €32 Offre moyenne
    17 offres

    ...measures to safeguard PHI, including data encryption, access controls, and audit trails. 3. Design a comprehensive sample tracking module to monitor the movement and status of samples while maintaining HIPAA compliance. 4. Incorporate reporting capabilities to generate detailed and customizable reports for lab results without compromising patient privacy. 5. Develop an inventory management system that complies with HIPAA regulations for tracking laboratory supplies and equipment. 6. Integrate billing functionality while ensuring the secure handling of financial data and PHI. 7. Implement user management features that adhere to HIPAA guidelines for controlling access to sensitive information. Key Features: 1. HIPAA-Compliant Security Measures: - Encryption of data at r...

    €14486 (Avg Bid)
    Urgent
    €14486 Offre moyenne
    143 offres

    I am in need of a tech-savvy individual who possesses the skills and experience necessary to help me with my site migration. My website, originally built on WordPress, requires a move to AWS, specifically the Elastic Beanstalk service. Key duties include: - Assessing the current WordPress site - Generating an effective migration plan - Implementing the migration to Elastic Beanstalk without compromising site integrity - Testing and troubleshooting post-migration Ideal freelancers will illustrate: - Proficiency in WordPress and AWS Elastic Beanstalk - Previous experience with website migration - Strong problem-solving skills - An understanding of web standards and best practices I look forward to successful and smooth transition. Thank you.

    €125 (Avg Bid)
    €125 Offre moyenne
    202 offres

    ...specialized in ethical hacking. This individual will be responsible for comprehensively testing my Android app and ensuring it is free from any potential hacking vulnerabilities or scams. Though no specific areas were indicated for priority testing, the ideal candidate should have expertise in testing all integral security components within an app’s infrastructure such as: - User Authentication - Data Encryption - In-app Purchases The ideal freelancer should have previous experience in cybersecurity testing specifically in Android apps and hold a proven track record in identifying and resolving security vulnerabilities. I’m hoping to have this project completed within a month. Your technical insight and expertise will be invaluable in guaranteeing the security of my...

    €83 (Avg Bid)
    €83 Offre moyenne
    19 offres

    ...looking for a specialist to make a custom encryption for my laptop's UEFI firmware at runtime and decrypt at output. At no point will the firmware itself be decrypted. This will enhance security and protect the firmware from potential tampering or unauthorized access. I am keen on improving the overall safety of my system, and thus value someone who understands the essence of addressing security vulnerabilities. Here's what I am looking for: - A comprehensive understanding of kali linux as that is the targeted operating system for this project. - Proficiency in dealing with UEFI firmware. Specifically, if you have experience working with the firmware on the Lenovo Ideapad Slim 3 15IIL05, that would be preferable. - Prior experience with firmware encryption and...

    €1198 (Avg Bid)
    À la une
    €1198 Offre moyenne
    6 offres
    Survey application S'est terminé left

    ...The application should be responsive and performant, with minimal latency during question set retrieval and submission. - Database queries should be optimized for efficient data retrieval. **3.2 Security:** - Implementation of secure authentication mechanisms (e.g., JWT tokens). - Protection against common security threats such as SQL injection and cross-site scripting (XSS). - Encryption of sensitive user data, including passwords and payment information. **3.3 Scalability:** - The application architecture should be scalable to accommodate a growing user base and increasing question sets. - Load balancing and caching mechanisms should be considered for scalability. **4. UX Design Requirements:** - A clean and intuitive user interface (UI) design wit...

    €1042 (Avg Bid)
    €1042 Offre moyenne
    196 offres

    /ip route add dst-address=0.0.0.0/0 .../ip firewall nat add chain=srcnat action=masquerade out-interface=sstp-adsl add chain=srcnat action=masquerade out-interface=sstp-starlink add chain=srcnat action=masquerade /interface sstp-client add name=sstp-starlink connect-to=<server_address> user=vpnuser password=vpnpassword certificate=none profile=default-encryption disabled=no /interface sstp-client add name=sstp-adsl connect-to=<server_address> user=vpnuser password=vpnpassword certificate=none profile=default-encryption disabled=no I want Force Interface vpn sstp-starlink To establish communication always and forever, mandatorily from gateway= distance=1 and Force Interface vpn sstp-adsl To establish communication always and forever, mandatorily from gateway= dis...

    €28 (Avg Bid)
    €28 Offre moyenne
    13 offres

    As a small non-profit organization (association for the bladder exstrophy c...a small non-profit organization (association for the bladder exstrophy community), we need an experienced professional to assist in setting up our AWS to house our medical records database. Key functions: - Systems integration with Filmmaker Pro, our chosen platform for this project. - Implementation of basic encryption for data security. Ideal Experience and Skills: - Proven experience with AWS setup and systems integration - Strong understanding of basic data encryption. Please note that whilst we do not require HIPAA-compliant security measures, an understanding of the privacy and sensitivity attached to medical record handling is preferred. We will set up the filmmaker database. Just n...

    €154 (Avg Bid)
    €154 Offre moyenne
    35 offres
    AI-Driven Talent Evaluation Web App S&#039;est terminé left

    ...a portfolio showcasing modern and sleek designs. Key Features: 1. User Authentication and Role-based Access Control: 2. User profiles, history and data: 3. Data Analysis and Comparison Metrics: 6. Dashboard and Notifications 7. Security and Compliance: • Ensure data security and compliance with industry standards and regulations, including GDPR and data encryption protocols. • Implement robust security measures, including encryption, access controls, and audit trails, to protect user data and privacy. Technology Stack: • Frontend: React.js or Angular for the user interface. • Backend: Node.js with for the server-side logic. • Database: MongoDB for storing player profiles, performance data, and video footage. • AI Framework: TensorFlow ...

    €1055 (Avg Bid)
    €1055 Offre moyenne
    219 offres

    I'm looking for an Elastic Search expert who can efficiently implement a full-text search feature for a huge set of product data. The expert will take responsibility for the development of an effective method of full-text search across my English language product data. Skills and Experience requirements: - Profound experience with Elastic Search - Strong understanding and application of full-text search - Prior experience with product data - Solid knowledge of English language data indexing. The issue is that i am having problems creating the aggregations to not apply filters from the same types so all of the possibilities remain the same for the selected attribute group when using DYNAMIC attributes that cannot be hardcoded, i have a function that works correctly on...

    €125 (Avg Bid)
    €125 Offre moyenne
    94 offres

    ... Core Features: - Secure Data Encryption: Incorporate advanced data encryption to ensure the security of users' data traffic. - Multiple Server Locations: The app should allow users to connect to servers in multiple locations worldwide. - Kill Switch: Include a kill switch feature for disconnection protection, preventing accidental data leaks when VPN connection drops. Platforms: - The application should be compatible with both Android devices and Windows-based systems. User Registration: - The app should include a simple yet secure registration process for users. Please note that authentication at each login will not be required. Ideal Skills: - Strong experience in Android and Windows software development - Proficient in implementing data encryption -...

    €439 (Avg Bid)
    €439 Offre moyenne
    69 offres
    Game Files Custom Decryption S&#039;est terminé left

    I need an expert cryptographer capable of working with custom encryption used for game client files. Specifically, your task will involve the following: - Decrypting game configuration files and game asset files. These two types of files are crucial to the completion of the project. - Explain what is the method used for encrypting the files Ideal candidates for this job would have proven experience in decrypting custom game client files, asset extraction, and game behavior analysis. Please provide a detailed explanation of how you plan to approach this task in your bid.

    €188 (Avg Bid)
    €188 Offre moyenne
    42 offres

    I'm in need of a C++ expert who can build a tailor-made encryption solution for UEFI firmware during runtime. Aim is to develop an executable code that incorporates a unique encryption method. Let's establish a groundbreaking security standard together! The job requires: - Mastery in C++ to create an executable code - Deep understanding and experience in developing encryption methods from scratch - Expertise in UEFI firmware, especially in runtime processes - Ability to apply creative problem-solving strategies to develop a custom solution - Experience in data security is preferred Please note that this is not about implementing an existing encryption algorithm, but about being innovative and developing a method that doesn't currently exist....

    €1116 (Avg Bid)
    €1116 Offre moyenne
    7 offres
    PHP Script and API Key Optimization S&#039;est terminé left

    I am in need of an expert who can optimize a PHP script that is currently used for analyzing article content and implementing API keys. ...categorize content accurately. Security requirements: - Incorporating secure token-based authentication for the API key. - Implement API key over HTTPS encryption. Ideal Skills: - Proficiency in PHP scripting. - Experience in optimizing scripts for improved speed, memory usage and scalability. - Familiarity with sentiment analysis and content categorization. - Thorough knowledge of token-based authentication and HTTPS encryption. Your responsibility will be to ensure the script functions at an optimal speed, uses memory efficiently, and is highly scalable. Expertise in securely implementing token-based authentication and HTTPS e...

    €23 / hr (Avg Bid)
    €23 / hr Offre moyenne
    59 offres

    Hello, need a devleoper for now. node.js | react | Amazon DynamoDB | Amazon Elastic Kind regards

    €20 / hr (Avg Bid)
    €20 / hr Offre moyenne
    177 offres

    ...within Flutter applications. - Apply runtime integrity checks focused on file system validation. Your task will be to fortify the application against attempts to alter, manipulate, or reverse-engineer file data. Your Skillset: - In-depth knowledge of Flutter and its intricacies. - Extensive understanding of network security measures to ensure robust defense systems. - Experienced in data encryption and authentication/authorization skills. It is not a question of programming but of discussing together how to integrate tampering controls into our business application. Preferably the availability is for a 1/2 hour chat to answer some questions on the anti tampering techniques to be used. Some example questions: do change between build time and runtime? why does the crc check...

    €24 / hr (Avg Bid)
    €24 / hr Offre moyenne
    71 offres

    ...purpose of this database is to keep track of critical volunteer nomination details such as: - Personal information (name, contact details, rugby club) - Skills and experience - Volunteer categories (National and Hampshire) - Volunteer nomination data - Nomination score - Nomination winners Ideal skills for this role would be proficiency in SQL and an understanding of data confidentiality and encryption. Experience in creating relational databases is necessary, and a background in handling volunteer databases or similar projects is highly preferred. Efficient data organisation is crucial, as quick access to specific volunteer details is required. Future modifications should also be easy to accommodate such as reports and form views which the buyer can achieve themselves. This da...

    €160 (Avg Bid)
    €160 Offre moyenne
    96 offres
    Comprehensive Chat App Development S&#039;est terminé left

    I'm looking for a proficient developer to create a chat app compatible across iOS, Android, and Web platforms that will accommodate group chats, file sharing, and ensure message encryption for user security. The app should support a user registration process via email and password as well as phone number verification. Proven experience in mobile and web application development is required, with particular emphasis on chat applications. A strong grasp of encryption protocols and user authentication processes is highly valued. Skills in UI/UX design will also be considered beneficial. same as app call :Honey Jar - voice chat & party. the language will be only Arabic.

    €1033 (Avg Bid)
    €1033 Offre moyenne
    151 offres

    I'm currently in need of a proficient DevOps Engineer who is well-versed with AWS. Key elements of this project involve: - Setting up Continuous integration & deployment - Implementing Infrastructure as code - Use of Kubernetes Note that familiarity with Docker, Jenkins, or Ansible would be highly beneficial, but it is not a strict requirement for this job. Proven experience in working with AWS and a solid understanding of CI/CD principles, IaC, and Kubernetes is essential. Efficiency and attention to detail are imperative for this role.

    €134 (Avg Bid)
    €134 Offre moyenne
    42 offres
    Gas Discount & Fleet Management App S&#039;est terminé left

    ...gas stations. 7. Feedback and Ratings System Objective: To collect and display user feedback. Components: Rating Interface: For users to rate gas stations and their services. Review Management: For gas stations to view and respond to customer feedback. 8. Security and Compliance Objective: To ensure the app adheres to legal standards and protects user data. Components: Data Encryption: For protecting personal and transactional data. Compliance Adherence: Following PCI DSS for payments and relevant laws for user data protection. 9. Marketing and Promotional Tools Objective: To attract and retain users through marketing strategies. Components: Promotional Offers: System to manage and display promotional offers to users. User Engagement: Tools for...

    €650 (Avg Bid)
    €650 Offre moyenne
    140 offres

    ...techniques (electrospinning, freeze-drying, 3D printing, etc.) - Detailed explanation of selected fabrication techniques - Advantages and limitations of each technique - Influence of fabrication parameters on scaffold properties (temperature, pressure, concentration, etc.) 6. Scaffold Properties - Morphology of scaffolds (porosity, pore size distribution, surface area, etc.) - Mechanical properties (elastic modulus, compressive strength, etc.) - Degradation behavior (degradation rate, degradation products, etc.) - Biological properties (cell adhesion, proliferation, differentiation, etc.) 7. Applications of Scaffolds - Overview of tissue engineering applications (bone regeneration, cartilage repair, skin tissue engineering, etc.) - Case studies or examples of scaffold applicati...

    €103 (Avg Bid)
    €103 Offre moyenne
    26 offres

    I'm looking for a professional to develop a hybrid enterprise solution to enhance the security of our employee data. With increasing cyber threats, it's crucial our solut...to effectively secure our employee data - Utilize a hybrid solution that leverages the benefits of both Cloud-based and On-premises technologies - Prioritize ease of use without compromising on the high-level security features. Ideal Skills and Experience: - Proven experience in working with Hybrid platforms (Cloud-based and On-premises) - Excellent understanding of data security and data encryption methods - Previous work on enterprise-level solutions is a bonus. This project requires comprehensive knowledge in data security and hybrid solutions. Only bid if you're confident in delivering a s...

    €397 (Avg Bid)
    €397 Offre moyenne
    32 offres

    I'm looking for a developer capable of creating an automated betting software for Live Casino games. The software needs to offer several features: - Reporting real-time game results - Providing multiple betting options - Automatic betting based on pre-set strategies The ideal candidate for this project should have experience in software development, more specifically, familiarity with casino and betting applications is strongly preferred. The software should be compatible with the Windows platform. Please, do not hesitate to get in touch if you have prior experience or if you're interested in this opportunity. Let's discuss the project further.

    €2155 (Avg Bid)
    €2155 Offre moyenne
    94 offres
    NFC Encryption for Data Safety S&#039;est terminé left

    I'm sourcing for a knowledgeable expert to drive an NFC based project focused on reading, writing and encrypting data. The main facets of this project include: ...focused on reading, writing and encrypting data. The main facets of this project include: • Data Control: The core of this task involves handling personal information and financial data. As such, the entity must have comprehensive experience working with such data sets. • Encryption: A robust understanding of basic encryption methodologies is essential to ensure the security of information. Ideal freelancers should have a firm background in NFC applications, specifically in sectors involving data control and encryption. A deep understanding of personal and financial data protection is also cr...

    €84 (Avg Bid)
    €84 Offre moyenne
    9 offres
    New platform S&#039;est terminé left

    ...menus. Ensure compatibility across various web browsers and devices. Control Panel: Design and develop a robust control panel for administrators to manage the platform. Include functionalities for user management, content moderation, analytics, and system configuration. Implement role-based access control to restrict access based on user roles and permissions. Ensure security measures such as encryption, authentication, and authorization. Content Panel (CMS): Build a flexible and intuitive content management system for managing website content. Enable administrators to create, edit, and organize various types of content, including articles, images, videos, and documents. Implement features for scheduling content publication, version control, and content categorization. Provide ...

    €276 (Avg Bid)
    €276 Offre moyenne
    149 offres

    ...**regestration Page Enhancement:** Add the option for users to input their date of birth, along with required backend and frontend adjustments. 5. **Refer and Earn Page Enhancement:** Improve the refer and earn page functionality by enabling users to submit one or more mobile numbers as references. This requires modifications in both frontend and backend/server-side scripting. 6. **Contact Encryption and Storage:** Develop a feature to read contacts, encrypt them using mobile numbers as keys, and securely store them in an encrypted format in a MySQL database on the server. 7. **VAT to GST Replacement:** Replace all instances of the term "VAT" with "GST" throughout the project, including Android, iOS, and PHP components. (Only replace the display word "...

    €65 (Avg Bid)
    €65 Offre moyenne
    5 offres

    I require an experienced coder to integrate the Ascon algorithm into OpenSSL with the core purpose of increasing the encryption strength and supporting a particular application or protocol to be specified later. Key tasks: - Perform full integration of the Ascon algorithm into OpenSSL Ideal Skills: - Extensive experience with Ascon and OpenSSL - Robust understanding of encryption algorithms

    €121 (Avg Bid)
    €121 Offre moyenne
    15 offres

    I require an experienced coder to integrate the Ascon algorithm into OpenSSL with the core purpose of increasing the encryption strength and supporting a particular application or protocol to be specified later. Key tasks: - Perform full integration of the Ascon algorithm into OpenSSL Ideal Skills: - Extensive experience with Ascon and OpenSSL - Robust understanding of encryption algorithms

    €122 (Avg Bid)
    Urgent
    €122 Offre moyenne
    20 offres

    I'm looking for a highly experienced GoLang developer to enhance an existing code build. The features that need to be integrated are user authentication, data encryption, and database integration. Key Requirements: • Advanced skills in GoLang are a must. • Proven experience in integrating user authentication, data encryption, and database connection management into GoLang Builds. • Must provide examples of previous GoLang projects. Your application should focus predominantly on your experience, especially with respect to similar projects. If you fit these requirements, I look forward to seeing your proposal.

    €35 / hr (Avg Bid)
    €35 / hr Offre moyenne
    96 offres