Pekerjaan Tidak Dijumpai
Maaf kami tidak dapat mencari pekerjaan yang anda cari.
Cari pekerjaan paling terkini di sini:
Require a content writer who can submit the work asap for an export website. content details are below three headlines for slider about us mission & values accreditation our brand - 24 karat fresh our products sustainability Ref websites: [login to view URL] [login to view URL]
I need a simple APP for Android and iOS delivered fast. I will make all the graphics (buttons, logo, general UI) and I will give you a basic functional flow with description of each step. Main Features: - User registration - Android + iOS - Simple back-office for content management - A/R functionality with live camera - Geolocation of user
We need a document to be translated from English to Arabic
I designs a logo for a club. I listen to ur opinion and make logo for u
I have an existing logo, but need them to be resized for Instagram, Facebook and LinkedIn. I'm a 501 (c)3
Need someone has excellent English. I appreciate if you are available to rewrite few paragraphs for me. Are you available to start right away.
Programmatis started out as just Joe. His work through freelancer.com gave him the opportunity to tackle diverse challenges and projects and solidify his reputation as a talented Full Stack Engineer who was doggedly committed to providing each client with the cutting edge solutions to take their online presence to the highest level. Today, he's curated a Web Designer and Web Developer team of...
Our website is a platform for connecting people : people who need a dog-sitter, a babysitter, teachers, senior support and people who offers these services. To complete our website, we need : - a perfect connection and presentation of ads between users. So we need that the search,, the presentation of ads, work perfectly between the same type of users. People looking for a pet sitter with a perso...
The goal of this project is to create a “reflector” which will relaunch attacks sent to a given IP address and ethernet address to the IP address that sent the attack. This acts as a mirror, such that when an adversary is ports canning a network, they will actually be port scanning themselves. When they launch an exploit at the reflector, the attack will be reflected back at them. To a...