Tuning solaris siteminder policy server jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    11,378 tuning solaris siteminder policy server jobs found, pricing in USD
    Time edit a vocal session 6 days left
    VERIFIED

    I need someone to flex-time a vocal session using Logic Pro X. If you use other production software i would be open to hearing from you also bu...needs to be edited to match the reference vocal track so that all vocal track are completely in sync with each other. The resulting vocals need to sound as natural as possible. Tuning had already been done.

    $26 (Avg Bid)
    $26 Avg Bid
    11 bids

    I have a 35 page Policy and Procedure manual in PDF form. I'd like it in Word format.

    $81 (Avg Bid)
    $81 Avg Bid
    2 bids

    We have a WordPress website [login to view URL] that we would like to speed up as the current google perf...a WordPress website [login to view URL] that we would like to speed up as the current google performance results are not very good. We need an expert in performance tuning to get the site both desktop and mobile running their best.

    $152 (Avg Bid)
    $152 Avg Bid
    77 bids
    RaceME - Creating an article 5 days left
    VERIFIED

    Article - (Bes...article needs to help people find the best tuner for their Dodge RAM 6.7L cummins as well as product reviews. Reviews must be natural. The article also has the benefits of tuner tuning into your car. E.g. do not break the car's warranty, increase the performance of the car, set the back-up and return to its original state and more ...

    $74 (Avg Bid)
    $74 Avg Bid
    28 bids

    Iam looking for someone who creates for me eBay description. Requirements are: - Write description / no spelling errors. Knowledge about technical English. - Design the eBay description. HTML 5 .. etc - Copy writing - Article Writing This job is longterm

    $6 / hr (Avg Bid)
    $6 / hr Avg Bid
    10 bids

    I am growing my online business and I am building an opt-in page for my free product to grow...online business and I am building an opt-in page for my free product to grow my email list. I would like someone who understand legal requirements for these to write my Privacy policy and Terms and Conditions to be compliant with GDPR and other requirements.

    $184 (Avg Bid)
    $184 Avg Bid
    27 bids

    need 1 PAF Template, 1 fillable/expense reimbursement form, 1 memo template for policy reinforcement and 1 memo template for welcoming new hires. Customized with our logo.

    $312 (Avg Bid)
    $312 Avg Bid
    12 bids

    HTML website 90% done. Needs tweaking. Needs to run perfectly on all platforms. Need to properly set up gallery area.

    $120 (Avg Bid)
    $120 Avg Bid
    19 bids

    Good morning, I am looking for an good experimented writer to create for my business al the regulations policy for my business including the website and the management system. I will discuss more details in private with the winner. My maximum offer is the best I can do so don`t bid if you believe that you may charge me more.

    $65 (Avg Bid)
    $65 Avg Bid
    21 bids

    ...image. They need a bit of cleanup and tuning for iOS We will release this react universal toolkit to open source as soon as this upgrade is completed. Then the developer will work on our actual application modules which: - use the UI components - user the datastore module: the datastore sync user data with our server, sends API calls (no response data)

    $34 / hr (Avg Bid)
    $34 / hr Avg Bid
    34 bids

    ...practices. • Great understanding of object-oriented designs and principles. • Experience with offline storage, threading, and performance tuning. • Experience building apps which communicate with a server via REST web services. • Excellent communication skills. • Ability to work in the US time zone from time to time. • Familiar...

    $38 / hr (Avg Bid)
    $38 / hr Avg Bid
    34 bids

    Vendor management policy & procedure writing and editing

    $83 (Avg Bid)
    $83 Avg Bid
    15 bids
    Trophy icon Logo - Sky Racing Suspension 3 days left

    I...logo with brand name SKY RACING SUSPENSION. The color should be red, blue, black and grey or any combination of these colors. We provide motorcycle, racing suspension set-up, tuning & services. I need a logo on motorcycle fork, so it should be more elongated. I attach photo for better understanding. I am available for other information.

    $100 (Avg Bid)
    Guaranteed Top Contest
    $100
    217 entries

    Currently we are using Sucuri Firewall (caching) and WP Rocket as plugin. But we still can and need faster loading speed. Who can help us fine tuning our website?

    $121 (Avg Bid)
    $121 Avg Bid
    49 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $251 (Avg Bid)
    $251 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $568 (Avg Bid)
    $568 Avg Bid
    1 bids

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $555 (Avg Bid)
    $555 Avg Bid
    1 bids
    Cakephp Expert 15 hours left

    ...solution designs and related code. ● Package and support deployment of releases. ● Work with teammates in the integration of applications including developing, refining, and tuning integrations between applications. ● Analyze and resolving technical and application problems. ● Adhere to high-quality development principles while delivering solutions on-time

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    16 bids

    ...recommendations based upon assessment of environment 3. Design of new environment Task #2 Description: - Install Process Buildout of new virtual machines 1. OS install and tuning 2. Install of Prerequisites. 3. Install of IBM Websphere 1. Migration of Ques to new environment 2. Testing of new environment Task #4 Description: 1. Provide Go

    $2100 (Avg Bid)
    $2100 Avg Bid
    1 bids
    Web Development 10 hours left

    ...is an example of website which I am seeking to develop. The website will feature following options:- (1) Request for Spare parts/Accessories (2) Request for Garage /Auto Tuning (3) Request for Auto Detailing (4) Request for Car Wash Another example of reviews will be [login to view URL] Concept should be same as both above website but design should

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    36 bids

    I would like to a 36-page newsletter to be fine-tuned. Not every page need a tuned-up. Just about 1/3 of the pages are not handled well and need the photos and text to be adjusted nicely. The indesign file can be downloaded from the link: [login to view URL]

    $14 / hr (Avg Bid)
    $14 / hr Avg Bid
    29 bids

    ...effective is it. Then suggest a policy on banning cigarettes in public areas and eateries and how this can have a positive impact to health and the environment. Do use examples practiced in other countries Also state out the pro and cons of this suggested policy if it is to be implemented. Have a SWOT analysis for the policy to see its effectiveness No

    $26 (Avg Bid)
    $26 Avg Bid
    5 bids
    I need a CopyWriter Ending left
    VERIFIED

    Website content fine-tuning and writing. 1-2 weeks timeframe

    $21 / hr (Avg Bid)
    NDA
    $21 / hr Avg Bid
    82 bids

    I can provide support for Hadoop/Big Data Admin...to Accommodate the Expanding Business Needs. - Well Experienced in Different Vendors (Hortonworks, Cloudera, MapR, etc) of Big Data and Cloud. - Big Data Capacity Planning, Tuning, Solution Architecting, Issue Resolution, and Security. - Big Data Analytics Solution Architecture, and its Implementation.

    $40 / hr (Avg Bid)
    $40 / hr Avg Bid
    3 bids

    ...described for the Admissions Committee your motivations for, and the goals underlying, your application to the Technology and Policy Program. In this supplement, we would like you to articulate your reasons for studying technology and policy at MIT -- to someone who is not acquainted with the field. This should NOT be a simple recapitulation or rephrasing

    $53 (Avg Bid)
    $53 Avg Bid
    11 bids