Tapis

Carian terbaru saya
Tapis melalui:
Bajet
hingga
hingga
hingga
Jenis
Kemahiran
Bahasa
    Status Pekerjaan
    7,743 6 tuning tugasan ditemui, harga dalam USD

    I have a web site and I need help to tune things o...If you are not an real expert in this do not apply for this job, - it will be waste of time. Right now I have some urgent and real important things. Attaching a POS system, tuning some data entry programs and more... If you are the right person with ***solid skills*** we can work together over time.

    $488 (Avg Bid)
    $488 Avg Bida
    42 bida

    We have a Cloud VPS with Centos run on it and VestaCP as a control panel. Currently the server need performance tuning to handle more concurrency users. As the server use the LAMP stack + Nginx reserve proxy, somehow it seem slow. So the main task are optimized it. Tasks: - Optimize Nginx proxy and Apache configuration (convert rules if needed) - Optimize

    $93 (Avg Bid)
    $93 Avg Bida
    16 bida

    Brand innovation is an R&D company requiring specific fine tuning of our website copy for our services offered. We have a design lab focused on consumer problems and addressing the challenging in our modern, changing world. Designing products for business clients we drive innovation through our uniquely future orientates problem statements, transforming

    $72 (Avg Bid)
    $72 Avg Bida
    30 bida
    Time edit a vocal session 3 hari left
    DISAHKAN

    I need someone to flex-time a vocal session using Logic Pro X. If you use other production software i would be open to hearing from you also bu...needs to be edited to match the reference vocal track so that all vocal track are completely in sync with each other. The resulting vocals need to sound as natural as possible. Tuning had already been done.

    $26 (Avg Bid)
    $26 Avg Bida
    15 bida

    We have a WordPress website [log masuk untuk melihat URL] that we would like to speed up as the current google perf...a WordPress website [log masuk untuk melihat URL] that we would like to speed up as the current google performance results are not very good. We need an expert in performance tuning to get the site both desktop and mobile running their best.

    $152 (Avg Bid)
    $152 Avg Bida
    77 bida

    ...reviews raceme ultra tuner reviews raceme tuner 6.7 cummins reviews 6.7 cummins programmer reviews 6.7 cummins tuner reviews Competitor: [log masuk untuk melihat URL] Our products for the review that we have to praise (hype)! [log masuk untuk melihat URL] Our products are for this types: Dodge RAM 6.7L 2007.5

    $74 (Avg Bid)
    $74 Avg Bida
    28 bida

    HTML website 90% done. Needs tweaking. Needs to run perfectly on all platforms. Need to properly set up gallery area.

    $120 (Avg Bid)
    $120 Avg Bida
    19 bida

    ...layout, buttons, navbar, tabbar, dialog, input, inputSelect, autocomplete, searchbar, avatar, image, list components with sortable list, image. They need a bit of cleanup and tuning for iOS We will release this react universal toolkit to open source as soon as this upgrade is completed. Then the developer will work on our actual application modules which:

    $34 / hr (Avg Bid)
    $34 / hr Avg Bida
    36 bida
    Trophy icon Logo - Sky Racing Suspension 14 jam left

    I...logo with brand name SKY RACING SUSPENSION. The color should be red, blue, black and grey or any combination of these colors. We provide motorcycle, racing suspension set-up, tuning & services. I need a logo on motorcycle fork, so it should be more elongated. I attach photo for better understanding. I am available for other information.

    $100 (Avg Bid)
    Dijamin Peraduan Teratas
    $100
    245 penyertaan

    Currently we are using Sucuri Firewall (caching) and WP Rocket as plugin. But we still can and need faster loading speed. Who can help us fine tuning our website?

    $121 (Avg Bid)
    $121 Avg Bida
    49 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $251 (Avg Bid)
    $251 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $250 (Avg Bid)
    $250 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $568 (Avg Bid)
    $568 Avg Bida
    1 bida

    ...for security threats when firmware device results tampered; Security Engine will perform the following operations: Evaluation: When the system is deployed there should be a tuning phase, during which the Security Engine, using reverse engineering technics, extracts CFG (Control Flow Graph) data and used functions to understand devices normal operating

    $555 (Avg Bid)
    $555 Avg Bida
    1 bida
    Cakephp Expert Tamat left

    ...solution designs and related code. ● Package and support deployment of releases. ● Work with teammates in the integration of applications including developing, refining, and tuning integrations between applications. ● Analyze and resolving technical and application problems. ● Adhere to high-quality development principles while delivering solutions on-time

    $12 / hr (Avg Bid)
    $12 / hr Avg Bida
    16 bida

    ...recommendations based upon assessment of environment 3. Design of new environment Task #2 Description: - Install Process Buildout of new virtual machines 1. OS install and tuning 2. Install of Prerequisites. 3. Install of IBM Websphere 1. Migration of Ques to new environment 2. Testing of new environment Task #4 Description: 1. Provide Go

    $2100 (Avg Bid)
    $2100 Avg Bida
    1 bida

    ...is an example of website which I am seeking to develop. The website will feature following options:- (1) Request for Spare parts/Accessories (2) Request for Garage /Auto Tuning (3) Request for Auto Detailing (4) Request for Car Wash Another example of reviews will be [log masuk untuk melihat URL] Concept should be same as both above website but design should

    $7 / hr (Avg Bid)
    $7 / hr Avg Bida
    36 bida

    I would like to a 36-page newsletter to be fine-tuned. Not every page need a tuned-up. Just about 1/3 of the pages are not handled well and need the photos and text to be adjusted nicely. The indesign file can be downloaded from the link: [log masuk untuk melihat URL]

    $14 / hr (Avg Bid)
    $14 / hr Avg Bida
    29 bida

    Website content fine-tuning and writing. 1-2 weeks timeframe

    $21 / hr (Avg Bid)
    Perjanjian Kerahsiaan
    $21 / hr Avg Bida
    82 bida

    I can provide support for Hadoop/Big Data Admin...to Accommodate the Expanding Business Needs. - Well Experienced in Different Vendors (Hortonworks, Cloudera, MapR, etc) of Big Data and Cloud. - Big Data Capacity Planning, Tuning, Solution Architecting, Issue Resolution, and Security. - Big Data Analytics Solution Architecture, and its Implementation.

    $40 / hr (Avg Bid)
    $40 / hr Avg Bida
    3 bida

    Hello We are l...creates a logo for our company named Tech Autotronics" Car Electronic Specialist Specifications: 1. Modern 2. Simple & Clean 3. Professional Please google search ”chip tuning logo & electronic logo & modern logo” for inspiration but please not copy/paste we are looking for a unique project. Something similar to following photo

    $20 (Avg Bid)
    $20 Avg Bida
    54 bida

    I need someone to do some Digital Ocean Server Performance / Tuning for my business. This service should help me manage , fix and report spikes and server issues. Small 2 droplets. Please message me if you have any questions.

    $29 (Avg Bid)
    $29 Avg Bida
    5 bida

    Sila Dafter atau Log masuk untuk melihat butiran.

    Ditampilkan Sulit Peraduan Teratas

    ...Leadership skills • Atleast 3+ years of relevant experience in Python • Strong hands on experience with Python development with Django framework. • Experience with database query tuning. • Must be adaptive to experimenting new technologies. • Must have excellent communication (verbal & written), interpersonal, leadership, and problem solving skills • Mus...

    $5415 (Avg Bid)
    $5415 Avg Bida
    8 bida

    ...again The project is almost finished. The most complet part is the backoffice administrator panel; it is 70%-80% completed, but still need - some remaining development - some tuning and adjustments - some code cleaning Then there is the end user front end to be developed from the beginning, but it is just 2 or 3 responsive page layouts. The project is

    $593 (Avg Bid)
    $593 Avg Bida
    81 bida

    The PostgreSQL is used to store the network performance data for months. Need to analyze the current design, bootle-necks and suggest the performance improvements

    $2148 (Avg Bid)
    $2148 Avg Bida
    12 bida