Top 10 Countries With The Fastest Internet In The World: Why They Change Every Quarter
Is your country on the list?
...kialakítása - Dokumentum orientált telematikai adatcsomagok kezelése nagy tömegben, billiós (1012+) nagyságrend - Alkalmazandó technológiák kiválasztása, például, de nem kizárólagosan: Hadoop, Elastic, MongoDB, Cloudera - Üzemeltetés támogatása: telepítés, skálázás, failover, 7/24 service, monitoring, data management tools - Fejlesztés támogatása: .NET connectors, data management APIs, querying, data security, diagnosztika, dev/test sandboxes Amit várunk - Releváns szakmai kompetenciák, munkatapasztalat és projekt referenciák - A megvalósít&a...
...software development (Scrum) - Spring framework (Spring DI, Spring MVC, Spring Security, - Spring data, Thyemeleaf) - REST - JPA Munkavégzés helye: Budapest, 3. kerület Our company deals with Junior Programmer training, where our trainers are mainly freelancer developers. What we offer: - flexible working hours (up to 1-2 times a week, but full-time work) - start-up, youthful, cheerful office - competitive salary - youthful, good-looking team Knowledge required for work: - Basic programming skills (Java) - Algorithms, data stuctures - Object Oriented programming - Version control (git) - Agile software development (Scrum) - Spring framework (Spring DI, Spring MVC, Spring Security, Spring data, Thyemeleaf) - REST - JPA ...
Spring Security integrálása meglévő alkalmazásba az alkalmazás által használt architektúra megtartásával, ahhoz alkalmazkodva. A feladatleírást magyar nyelvű funkcionális és technikai specifikáció tartalmazza. A meglévő alkalmazás által használt architektúra-elemek szintén dokumentáltak.
SOS keresünk ötletek kreatív szórólapra, ami nem a hagyományos A5-ös szórólap, de mégis odaadható egy rendezvényen. Szívesen kézbe veszik, játékos, trendi, információkat tartalmaz a cégról és a tevékenységről. Aminek szerepelnie kell rajta: Gloster Telekom Kft. Kicsit másképp. Kollaboráció, hálózat, adatközbont, security (IT biztonság), Cisco partner, professzionális megoldások kapcsolat információk referenciák (néhány db logó) Gloster logó Cisco logó Cégről infomrációk: A s...
Hungarian data loss prevention software manufacturer is seeking experienced Windows kernel developer for further development and bug fixing of its existing encryption module. STD/ATL and Multithread development experience is a must, algorithmic capability is advantage. Windows Kernel Development Experience is a must. Hungarian speaking/native developers are preferred. Hungarian version: Informatikai biztonsági szoftvert fejlesztő cégünk C++ fejlesztőt keres projekt alapú munkára, melynek keretében a meglevő C++ alapú objektum orientált kód hibajavítása, továbbfejlesztése az elvégzendő feladat Visual Studio környezetben. Elvárások: * C++ programnyelv ismerete, legal&aa...
I am looking for a freelancer to create a database with data entry capabilities. The database will contain one to seven tables, depending on the complexity of the project. The type of data that will be entered into the database includes customer information, inv...to create a database with data entry capabilities. The database will contain one to seven tables, depending on the complexity of the project. The type of data that will be entered into the database includes customer information, inventory, and financial data. The level of security required for the database is advanced, with encryption and multi-factor authentication to ensure only authorized users can access the information. Ideal skills and experience for this job include database administration, data entry, and securi...
I am looking for a freelancer to create a database with data entry capabilities. The database will contain one to seven tables, depending on the complexity of the project. The type of data that will be entered into the database includes customer information, inv...to create a database with data entry capabilities. The database will contain one to seven tables, depending on the complexity of the project. The type of data that will be entered into the database includes customer information, inventory, and financial data. The level of security required for the database is advanced, with encryption and multi-factor authentication to ensure only authorized users can access the information. Ideal skills and experience for this job include database administration, data entry, and securi...
I am looking for an experie...professional who can assist me in building and configuring both wired and wireless networks. Specifically, I require troubleshooting services for a medium-sized network that consists of 11-50 devices. The ideal candidate should possess the following skills and experience: - Proficiency in network architecture and design - Expertise in network troubleshooting and problem-solving - Knowledge of network security protocols and best practices - Familiarity with wired and wireless network technologies - Ability to work efficiently and effectively with minimal supervision If you have a proven track record in network troubleshooting and optimization, please apply for this project. I am looking for someone who can deliver high-quality work within a reasonable ...
I am urgently seeking a skilled developer to integrate a VPN API into my iOS, Android, Windows, and Mac applications. The VPN service that needs to be integrated with will be specified once I have found the ideal candid...developer to integrate a VPN API into my iOS, Android, Windows, and Mac applications. The VPN service that needs to be integrated with will be specified once I have found the ideal candidate for the job. Ideal skills and experience for this job include: - Experience with VPN API integration - Proficiency in developing for iOS, Android, Windows, and Mac platforms - Knowledge of VPN protocols and security - Ability to work efficiently on a tight deadline If you have the necessary experience and skills to complete this project, please submit your proposal as soon as...
...wireframe. 2nd: 2D minimalist/cartoon visual of a front door with a box with company logo on it. | another image of minimalist box with it open showing t-shirt, notebook (SWAG) 3rd: Similar to attached example, showing a female at a computer screen using Zoom showing a few other people but a presentation showing in screenshare. 4th: 2D minimalist/cartoon employee in front of computer screen again, but the UX on the screen shows a "survey" screen, then will need a screen that shows the results of the survey. 6th: 2D Minimalist/cartoon employee in front of a computer screen this time looking at a company portal/intranet page that shows recommended content and a job that matches to their skillset to apply for. 7th: UX Screen of that same company portal/i...
I am looking for a freelancer who can help me set up an AI research system on my local computer. Specifically, I want the system to perform machine learning tasks using Python. The project's completion timeline is within 1-2 weeks. Ideal skills and experience for this job include: - Proficiency in Python programming language - Knowledge of AI and machine learning concepts - Experience in setting up AI research systems on local computers - Familiarity with PDF and MYSQL formats and their integration with AI systems. GOAL: Having AI-assisted research projects on my local computer. I need to have a chatbot that i can train to help me with research based on a certain set of documents. JOB: Assist me in setting up a local environment where I can 'sandbox' dif...
...countries or possess fluency in their respective languages. Here are the required skills for this role: - Proficiency in the language of the specific country, as well as a strong command of English, both in speaking and writing. - Preferably, a solid understanding of construction processes and materials. - Excellent communication skills. - Sales prowess that knows no bounds. -Competency in handling computer tasks. - Bonus points if you have prior experience in real estate or small house sales. Let's delve into the details of the work at hand: - Your primary responsibility will be selling our small houses. - You'll be tasked with identifying potential clients who are involved in short-term rental ventures, such as AirBnB, , campgrounds, and holiday house providers, amo...
I am in need of a freelancer to install a FastSSL DV Certificate on my CentOS 7 server. I already have the certificate, so the job will simply entail the installation process. No additional security configurations are required, and there is no specific deadline for the completion of the job. Ideal skills and experience for this job include knowledge of CentOS 7 server, SSL installation, and web server security. Thank you for your consideration.
Company Name: Forum Park Security I am looking for a modern and sleek logo design for my security company. I am open to any color scheme and do not have any specific elements in mind. The ideal freelancer for this project should have experience in creating professional logos for security companies and be able to provide a range of design options for me to choose from.
I'm looking for a computer engineer to help fix a laptop issue I'm having. As I'm not sure what the problem is, I'd like an on-site support to diagnose and repair my laptop with me. This project is for personal use, and I'm looking for reliable services with fair rates.
...experienced freelancer to develop a Biomatrix Access Application. The application will require advanced security features to ensure user authentication and safety. The application will provide secure and efficient access control to our Biomatrix system, a state-of-the-art biometric identification and verification system. The primary goal of this project is to create a user-friendly interface that integrates seamlessly with the Biomatrix system and enhances the overall access control experience. I have some general ideas for features, I am open to suggestions and would like to work with an experienced developer in this area. Ideal skills for the job include: - Web development - Security expertise - Knowledge of Biomatrix technology Thank you for your interest, and I l...
I'm looking for a developer for my own business who has expertise in JavaScript and can provide full-stack development for a web application. This web appli...development for a web application. This web application will benefit my business by increasing efficiency and providing services to our customers. The developer will be required to be experienced in a variety of programming languages including HTML, CSS, JavaScript, and .NET. Aside from building the web application, the developer will also need to be knowledgeable in the areas of API development and security. In addition, the developer needs to be able to demonstrate their coding skills in order to be considered. I am looking for someone who has a little background in software development and can help take my business to ...
Job Description: We are seeking a talented and highly motivated Software Developer to assist in a project involving data collection, database creation, and text messaging integration....Develop a software or use existing tools to mine data on commercial real estate agents operating within New York, focusing on gathering phone numbers and email addresses. - Clean and organize the collected data into a structured and accessible database. - Design an SMS system, integrated with the database, to send messages to all contacts using a provided phone number. - Ensure data privacy and security measures are in place to comply with legal regulations. - Provide regular updates and reports on the progress of the project. - Troubleshoot and fix any issues that may arise during the course of the...
I have a VPN app and I want to do some fixes to it, the app was developed in Android Studio with kotlin language, I want to improve the design, add some things, fix bugs and optimize. I have the source code of it. Ideal Skills and Experience: - Experience developing VPN apps for Android - Knowledge of OpenVPN protocol over dnstunnel - Strong understanding of Android development and security features
...who was selling it to me was a little bit below board red flags are going off and when I pushed for things to go by the books he got angry and ended up giving me the website and wouldn't take payment for it. I was pretty desperate and unfortunately I took the website namecheap scan the files after they've already been uploaded to my phone and desktop and they were corrupt. Things were done to my computer to make it look as if my child is a target. I lost my email account for 2 months eventually I got it back in hindsight pretty easily considering I had no way to recover it no two step no phone numbers no nothing. We moved out of town and when we came back to the old Network the hacking got intensely worse. I have many different reasons to believe I'm hacked my devi...
...Create an API for the eBay sniper website that allows users to add bid items, retrieve their bids, and perform other relevant actions programmatically. Use secure authentication mechanisms (e.g., OAuth, API keys) to protect the API endpoints. API Documentation: Provide comprehensive documentation for the API, including endpoint descriptions, request/response formats, and example code snippets. Security and Privacy - Secure Communication: Implement SSL/TLS encryption to ensure secure communication between the website, API, and users' browsers. User Privacy: Follow best practices for handling and storing user data securely. Comply with relevant data protection regulations (e.g., GDPR, CCPA). Error Handling and Logging: Implement error handling mechanisms to gracefully handle...
I need a good technical content writer for writing my document with technical words for cloud computing and its security issues. It need to do the practical part. We can discuss the contents by messages. Payment will be depends on the quality of the work( it will be higher).
I am looking for a WordPress developer to create a portfolio website for my cyber security profile. I will provide the theme for the website. I have a list of specific functionalities and themes that I require for the website. The website should showcase the services offered by me. Ideal skills and experience with UI/UX for this job &include proficiency in WordPress development, SEO, Blog Management, Database, SSL implementation, and basic operational control for management and experience in creating portfolio websites.
...and G-Suite apps and other tools. - Experience in handling several CRMs - Best if you have a specialty skill like BOOKKEEPING, RECRUITMENT, IMMIGRATION, EDUCATION, RTO (Registered Training Organization), HEALTHCARE, REAL ESTATE, MARKETING, E-commerce, etc. Home-office set-up requirements: - Speed test result – at least 50 MBPS - Dedicated workspace - Noise-canceling headset - Laptop or desktop computer with 4-8GB Ram; SSD 256GB-1Tb storage Please send the following: 1. UPDATED and DETAILED copy of your CV in WORD format (no graphics, no designs, just text) 2. Personality test: 3. Answers to the following questions: - When is your birthday (month, day, year)? - What's your age? - What's your relationship status (married, in a stable relationship, living
...and One Drive for Business Version 23.101.0514.0001 and Windows 10 (updated till date). Problem started last week! The Runtime 68 Error is occurring in several files when loading and input form involves selecting/saving/retrieve path. The same macros worked perfectly on C: drive or whenever onedrive is logged out. Previously worked ok with onedrive..no change in code! Same issue with another computer. Added trust location similar to from regedit: HKEY_CURRENT_USERSoftwareSyncEnginesProvidersOneDrive Ideal skills and experience for this job include: - Strong knowledge of VBA Macro programming and Microsoft 365 - Experience troubleshooting Runtime Errors - Familiarity with One Drive and use of path in VBA. - Excellent
...performance. - Dashboard and visualization tools to present key metrics and performance indicators in a visually appealing manner. 5. Integration and Collaboration: - Integration with other business systems such as CRM tools, accounting software, and marketing automation platforms. - Collaboration features to facilitate teamwork and communication among employees. 6. Security and Data Privacy: - Implement robust security measures to protect sensitive customer and business data. - Compliance with data privacy regulations, such as GDPR (General Data Protection Regulation). Benefits: - Streamlined business processes: The software brings together CRM and ERP functionalities, enabling seamless coordination and improved efficiency across different departments. -...
Babba is an establishment that produces Social Media contents established in Turkey. Babba's core business is Digital Gaming videos and science videos. With this sponsorship, all we need is a broadcast computer. With the financial support for this broadcast computer, Babba will start making money immediately and you will become Babba's partner in return for this support. Check Babba's Social Media Accounts Youtube : Facebook : İnstagram : Tik Tok : @babbagame
...we need you to enter it into the Excel document as TEXT ONLY. For the first two, this is easy - just copy/paste the Headline and Body content into Excel. For the Video with Text Overlay, you need to watch the video and transcribe the words that appear on screen. You can see an example of this in the attachment in row 4. For the Video with Speech, you need to first download the video to your computer (there are free tools for this). Then, upload it to (we have an account you can use). Trint will then transcribe the speech into text for you. You need to just export to csv then copy the text into our Excel file. Please look at the first 4 rows in the attachment - these have all been done as examples. Check google sheet:
We are Looking Freelancer For Simple Copy Paste Job. Must Have Good Internet Speed Must Have Good Typing Must have Good Computer Skills.
I am looking for a developer to create a HIS (Hospital Information System) that will have the following features: - Electronic Health Records - Patient Management - Inventory Management The system will be accessed by less than 200 users, including doctors, labs, and pharmacy staff. Therefore, the system needs to be secure and user-friendly. I prefer t...Inventory Management The system will be accessed by less than 200 users, including doctors, labs, and pharmacy staff. Therefore, the system needs to be secure and user-friendly. I prefer the system to be locally hosted so that I can have more control over the data. The ideal developer for this project should have experience with developing hospital information systems and have knowledge of security measures to protect pat...
...we need you to enter it into the Excel document as TEXT ONLY. For the first two, this is easy - just copy/paste the Headline and Body content into Excel. For the Video with Text Overlay, you need to watch the video and transcribe the words that appear on screen. You can see an example of this in the attachment in row 4. For the Video with Speech, you need to first download the video to your computer (there are free tools for this). Then, upload it to (we have an account you can use). Trint will then transcribe the speech into text for you. You need to just export to csv then copy the text into our Excel file. Please look at the first 4 rows in the attachment - these have all been done as examples. Check google sheet:
I am looking for someone who can help me secure an Excel file that contains personal information. The ideal candidate should have experience in password protection and should be able to ensure that only authorized personnel can access the file. Additionally, I need the cells in the Excel file to be protected, to prevent any accidental changes or deletions.
Welcome to JUMBOMEMECOIN! Our innovative cryptocurrency project is now seeking experienced help in developing a platform ...investment-based platform, built with the ability to provide users with a secure and reliable way to store and access digital assets. The platform will be powered by Binance Smart Chain, offering cutting-edge technology to our users. We require the development of secure and efficient smart contracts, as these will be the backbone of our platform. It is essential that our clients experience maximum security, transparency and trustworthiness when interacting with our smart contracts and thereby utilizing our offering. Are you up for the challenge of helping us make JUMBOMEMECOIN happen? Then please don't hesitate to reach out today! We look forward to he...
...join our team on a part-time basis. Key Responsibilities: Develop, test, and launch WordPress websites based on our blueprint copy. Customise websites to meet client needs, including creating and modifying WordPress plugins. Perform advanced-level HTML, CSS, JavaScript, and PHP coding as needed. Ensure the performance, security, and responsiveness of all new and existing websites. Troubleshoot and resolve issues as they arise. Requirements: Bachelor's degree in Computer Science, Engineering, or a related field. Proven experience as a WordPress developer. Strong knowledge of front-end technologies including CSS, JavaScript, HTML5, and PHP. Experience designing and developing responsive design websites. Proficient understanding of code versioning tools such as Git. C...
Looking for an experienced freelancer to help me set up a Syslog and SNMP Lab, as well as a pfSense Lab. Ideal skills and experience for the job include: - Knowledge of Linux - Strong knowledge of Syslog and SNMP protocols - Experience with pfSense firewall configuration - Understanding of network monitoring and troubleshooting - Familiarity with configuring devices for network security Successful freelancers should have relevant experience in this field. The lab should include 2-3 devices, with a maximum of 4. I'm looking for a freelancer who can provide a detailed project proposal and can work efficiently to complete the project within the given timeframe.
I need someone who can analyse industry approaches to cybersecurity practices as they relate to privacy and the law. Investigate and communicate effective policies to improve cybersecurity. Develop a cohesive security policy and discuss ethical issues that cybersecurity researchers face. There will be very short tasks involving these deliverables. This also requires availability of 9am AEST tomorrow. Further details will be provided once shortlisted
I am in need of a skilled freelancer who can configure cloudflare block rules to mitigate DDoS attacks. The expected traffic volume and frequency of the attacks are moder...freelancer who can configure cloudflare block rules to mitigate DDoS attacks. The expected traffic volume and frequency of the attacks are moderate and occasional. I would like to block certain regions and IPs to prioritize my website's security. Currently, I am using the free version of Cloudflare, so experience with this plan is necessary. Ideal skills for this job include expertise in DDoS mitigation, cloudflare block rules, and IP blocking techniques in addition to finding pattern in the traffic. The freelancer should also be knowledgeable in website security best practices and have experience in ...
...solutions into clients' existing systems and workflows * Provide ongoing support and maintenance for implemented AI solutions * Stay updated on the latest trends and advancements in AI technologies Requirements: *Proven experience in developing and implementing AI solutions across various industries * Strong expertise in AI technologies, including machine learning, natural language processing, computer vision, and predictive analytics * Proficiency in programming languages such as Python, R, or Java * Familiarity with AI frameworks and libraries such as TensorFlow, PyTorch, or scikit-learn * Excellent problem-solving skills and ability to understand complex business challenges * Strong communication and collaboration skills to work effectively with our team and clients * A...
Looking to hire virtual assistant from new delhi for basic data entry tasks. Requires basic computer knowledge.
There is a website called and it shows all previously executed programs and there location. I need something coded in batch (.bat) format that will run on the screen constantly, and record all opened programs on the fly. For example, if the .bat is running, and i open it will show on the dos screen, " and the file location" also if i open a file for example it will show the name and location below it on the dos screen. I also want it to save a log with the time and date inside the folder. I want it to constantly monitor it live. Thankyou.
I am in need of a Basic Ticket System that is web-based and will be used primarily for customer support. The foll...can add departments to categorize and assign tickets to specific teams or agents. View Departments: Users can view a list of departments and their associated tickets. Mail Server Configuration: Add Mail Settings: Administrators can configure mail server settings to enable email notifications and communication. View Mail Settings: Users can view and manage the configured mail server settings. Security: Password Encryption: User passwords are securely encrypted using hashing algorithms. User Authentication: User authentication is implemented to ensure that only authorized users can access the system. Templates to reply back if there is a new ticket based on the number...
Обслуживание клиентов User Experience Customer Service(Part Time) Job Overview Responsible for assisting us in user experience testing of the product on a computer. You only need to use computer according to our requirements, and you can work at home without professional knowledge This is a part-time job Responsibilities and Duties Assist the staff and perform computer operations as required Reply to our message in time Qualification and Requirements Must live in Moscow or Saint Petersburg. Must have own computer. Should be able to network effectively. Should be able to read and write in English fluently. Must have instant messaging software available. Working Time 1-10 hours/week If the cooperation goes well, there is an opportunity for long-term cooperatio...
First of all my goal to access my vcenter from internet from public without use public I would like to be able to give my users access to the vCenter Server through the Internet ( but security is not the main concern here, at least not now). I read that vCenter needs port 443 to be open in order to accept vSphere Client requests. But I don't know how exactly this should work (important: it's just a test environment; vCenter Server does not have any precious data so at least now I'm not concerned about security; I simply want to learn how to do this). info :- DDNS NO IP hostname ( ) i have home networt ISP ( ) which it praivte network and i want to link my praivte network to public network ( ) by DDNS forward port i get the below anser comment
...we need you to enter it into the Excel document as TEXT ONLY. For the first two, this is easy - just copy/paste the Headline and Body content into Excel. For the Video with Text Overlay, you need to watch the video and transcribe the words that appear on screen. You can see an example of this in the attachment in row 4. For the Video with Speech, you need to first download the video to your computer (there are free tools for this). Then, upload it to (we have an account you can use). Trint will then transcribe the speech into text for you. You need to just export to csv then copy the text into our Excel file. Please look at the first 4 rows in the attachment - these have all been done as examples. THIS IS A FAST TURNAROUND PROJECT. PLEASE ONLY BID IF YOU CAN BEGIN RIGHT AWA...
...multiple WordPress websites. Your primary focus will be to ensure the security and stability of each site by removing vulnerabilities, creating new themes if necessary, and replacing outdated plugins. The successful candidate will be able to create a clear plan and process for each website upgrade before initiating any updates, ensuring a smooth and secure transition. Responsibilities: - Collaborate with team to understand their specific requirements and goals for upgrading and transferring their WordPress websites. - Conduct thorough security audits and vulnerability assessments of each website, identifying potential risks and weaknesses. - Develop and implement strategies to mitigate vulnerabilities and enhance the overall security of each website. - Evaluate ex...
...following areas: This is made on MAC INTEL. MAC INTEL MAC INTEL MAC INTEL - Expertise in Unity integration with Flutter - Strong programming skills in Flutter and Unity You: 1. Give references where you have integrated unity and flutter 2. Give references where you have been able to communicate from Unity to Flutter We have a strange error according to hte attached screenshot. IT goes into security mode One person was able to resolve it through something similar on Windows: Please see the two screenshots attached to this JD Please note: any payments are based on successful integration. Not to move hands and not deliver. Delivery and payment is tightly connected as always. We have heavy Unity
...integrating cURL for web scraping or API consumption. 5. Demonstrated expertise in API development and integration using RESTful principles. 6. Familiarity with version control systems such as Git. 7. Ability to write clean, efficient, and maintainable code. 8. Strong problem-solving skills and attention to detail. 9. Excellent communication and collaboration abilities. 10. Bachelor's degree in Computer Science, Engineering, or a related field (preferred). Join our team and become part of an innovative and collaborative work environment where your skills will be valued and your contributions will have a direct impact on the success of our projects. We offer competitive compensation packages and opportunities for growth and professional development. Note: Please include sam...
...WhatsApp communication functionalities. Notifications and confirmations should be sent to all users via these channels. This feature will help facilitate communication between admins, supervisors, and agents. Security: The system must prioritize data security and implement robust measures to protect user information, transaction data, and uploaded documents. Encryption, access control, and regular data backups should be part of the security framework. Technology Stack: Please indicate the preferred technology stack for the web development project, considering factors such as scalability, security, and ease of maintenance. Timeline and Deliverables: Provide an estimated timeline for the project, including milestones and deliverables. It's essential to ...
I am looking for a freelancer to design User Access Management and Access Control Management ISO27k compliant request forms. The forms should be in Word Document format and fillable pdf s the forms should include at the minimum - access request form...Access Request Details eg Specific systems, applications, remote, or internet resources being requested. Access Level/Privileges: Specific permissions or privileges required for each requested system/resource. Justification: Reason for the access request, business need, and alignment with job responsibilities. Dates of access etc Approvals: Required approvals from the user's manager, information security officer, and IT Director The ideal candidate should have experience in designing request forms and should be familiar with IS...
I am looking for someone to assist me with a copy/paste job for about 10000 entries. The task involves copying and pasting text data only, with no need for specific formatting or templates. I do not require any data verification or validation after the task is completed. Ideal skills and experience for the job include: - Proficiency in basic computer skills, including copy/paste functions - Attention to detail - Ability to work efficiently and accurately - Previous experience in handling similar copy/paste tasks is a plus If you think you are the right fit for this project, please submit your proposal with your relevant experience and your pricing.
Is your country on the list?
This article exposes facts you never knew about your password, and how you can make it stronger.
Building a web application is easy - building one that meets all security requirements is hard. This article covers the 5 popular security practices.