...the user is offline the user will get a email notification about the unread message, user has to login to read and reply to the admins message. Admin end Admin has full control over all users Admin can view users profile, Block, delete users Admin can view order forms the users have completed and more the order as completed and this will update
...Centre Representative We are software developer who specializes in video games development and creation of new innovative decisions for the entertainment industry with over 15 years of business experience. Currently our company is present in multiple states and are looking to expand in the US market. Responsibilities • Conduct outbound market research
...encryption and data authentication. Specifically, write a program which on the command “Encrypt” does the following: 1. Encrypts a text file on a randomly generated key using AES-256 in the counter mode (CTR). 2. Appends to the resulting ciphertext its HMAC-SHA256 authentication tag (you will need another random key for the MAC). 3. Uploads the ciphertext alongs
...product placement scenarios (make it easier to understand where to place each received stock item, material, based on planograms). For the main office, this system will allow to control the work of each store's staff more efficiently, because each task will be accompanied by the execution time, and there will be a report, which will have to be returned to
...have Distributed Control Systems, Historian Databases and Data Virtualization skills Experience Required Two plus years of proven track either on job or self-paced training projects. Technical & Functional Skills Overall end-to-end data warehousing architecture, from tools to middleware to data quality to orchestration software Skills in digging through
Hi, As a business we currently use online excel sheets to manage our weekly schedules. This inc...staff and working schedules. I am exploring the options of creating bespoke software catered to our needs which we can roll out to international locations. Please contact me in more detail to discuss - must be able to provide previous work examples.
... It is an international chain of programming schools for kids. We now need a translator to translate one of our websites to Portuguese (Brazilian version). Here is the website. [login to view URL] I will provide you with a word document with all texts copied in there. So you will have to transalte in MS Word or Google Docs. The scope
...where two types of role based users can login. And monitor the status of their desired activity. Below is the requirement, 1. Role Based Access Control a. Role-based access control enables system admins to control access permissions of users and allow only required permission to the user. b. The software should provide the facility to have different roles
...looking for a Software Developer to help us enhance and further develop our systems. The business team has great ideas that you can help us convert into code. In this position you’ll participate in application development using Java and related open source technologies. You’ll work with the software engineering team, follow our software development principles
Write a C program to implement the Dining Philosopher algorithm. Use threads to implement three versions of the Dining Philosophers problem. One of the programs must be free from both deadlock and starvation. One of them should be vulnerable to deadlock, and the last should Q0 be vulnerable to starvation.
..."Panic In DC" on it...and separate text saying Patriots Are Now In Control...maybe in a way that you can see the word panic again with the first letters of each word...use your imagination!! Look forward to seeing what y'all come up with! This will be to go on the front or back of a shirt and i would need it for a white and black shirt. Thanks in...
...services we’re selling b) Registration forms in ‘careers’ and ‘services’ c) Staff login – multiple user roles d) Updated plug-ins and extensions Milestones will be as follow: 1. Planning: Site Map, user Flows, tech specs, features list and creative brief (40%) 2. Launch and Execution (20%) 3. Performance and control (20%) 4. Closure (20%)
...for connecting to IBM MQ. The code will be picking up all configuration from a json object passed to the function. Based on the configuration, it will initialize the data structures and do the connectivity, and start picking up messages. Once a message has been picked, it will call functions to do the processing and then get a response. The response
...Buy, Sell, Repair for Retail and Warehouse/Bulk orders (Mobile Phones, Tablets, Smartwatches, Accessories, Spare Parts, etc. There are two keen sides to look at; 1) Stock Control / Management 2) Managing Profit & Loss (Cash Management) However, there are other important features to include as well. 1) Barcode generation & scanning 2) Repair job
Performs Intermediate to advanced data entry duties. Can support multiple data entry tasks in various systems. Involved in managing confidential and sensitive information. Will be requested to provide guidance to staff once they have a solid background in the work. Makes decisions and recommendations within established guidelines, procedures or polices
...must read a JAM file and program the FPGA configuration memory using the JTAG interface, which is bit-banged from the MCU pins. Deliverable is a C/C++ program for the JAM programming and a short description of the code. Developer will hand off to internal team for final integration. The dev hardware can be NXP Freedom K28F board (K28+16Mb DRAM) and any
I have program in java.. i want to run it on IntelliJ IDEA editor . And create test cases for it to show statement coverage and control coverage it must be 100% Write detailed report for how choose test cases what techniques ? Boundary value and equivalence partition and so on Record video also during solving 3 days Excellent english
In our company, we control the devices connected to our wifi network by ensuring that everyone submits their mac addresses to be added to the DNS system sitting on a windows server. At the moment, we do this manually by adding the device details to a MS Access database and then run a powershell script to automatically read the database assign a free
I have a set of VR gloves that I need a program developed for. This progr...manufacturer SDK to correctly track inside the VR program, and also must overlay/interlace with another simulation program. Simulation program is Lockheed Martin Prepar3D. C Programming, Visual Basic, Software Architecture, Unity 3D, Software Development, Unreal Engine
... 1. Speed control circuit. This will essentially monitor the speed of the generator to control the voltage supply that determines the speed of the generator. 2. The voltage Regulator circuit---This is your traditional voltage regulator, ensures a constant voltage for all acceptable load on the generator 3. Digital display and control unit--- This
We need a PCB design with 3 main componenets: - WIFI module/controller (ESP8266 or any recommendation): this will control whole system and send requests if wifi is available. It will also control power usage to improve battery life. - SIM7000A: will be sending post requests every 15 minutes about sensor details. - Must have 3 input pins (analogue
...containing data structures the I need to be able to convert to and from json. I have an existing framework/base class that is based on RapidJson that simplifies the process and matches my needs. Most of the data structures are fairly simple. There are a few that are more involved and have embedded arrays or other embedded structures. The base class
We’re academic researchers seeking humorous monologues of around 200 words. Monologues should focus on a single specific issue (gun control, immigration, taxes, health care, etc.) and seek to change the audience’s mind about it. We don’t care what the issue is or about the partisan direction of the message; it can be liberal, conservative, libertarian
I want to create classifieds website and it's android and iso app Please mention if you have any ...Please bid the price amount only website? and Please bid the price amount apps and website? inbox more details . please write me in details how do you implement this project, I meat which script/cms/ programming language will you use. Thank you
Hi All, I have 5 basic questions related to Secure Programming, which you need to solve. It won't take much time. Please bid if you can do it by tomorrow morning. Pre-requisites : - Knowledge of C programming - Knowledge of Security practices in C I have attached the questions, please go through them. Please bid low (500-600 INR) as there are only
...36. Our project is based on "signals" (i.e. information with an intended destination) which can be in any form (i.e. analogue, binary, base 36, or an even larger base of say 1,000,000 levels). Alan Turing defined all of that Mathematically in the UK in the 1940s and 1950s. This project, which carries on the aims of his work, is not expected to complete
Hello, This Thursday I have an exam in Algorithms and Data Structures and need some problems solved. I can give you an example of the problems.
We need a devloping team to create a mlm website. Mlm website in which users complete daily tasks like watch videos and ads seen and we share some fixed revenue to our users. And they earn daily by completing these tasks daily. And after 12 am the tasks reset. And in these some pages .Front pages of website like home,about us, t& c, top earners , registration
...option to user to insert response (press RIGHT or LEFT arrow on keyboard). 4. Receive and store the response by the user. 5. Control the display time of images according to the response by the user 6. Record statistics and export in a csv 7. Check if termination criteria are met _________________________________________________________________________________
Hello, I am looking to mimic the below Java code to PHP which I want to give my clients PSK and encrypted string so they can use this method and their key to ...can use this method and their key to decode and take the string Expectation that the clients will need only PSK and the encrypted string The can decrepit using their own programming language
We need implementation for a research project. Implementation of Idea is MUST in any programming (Java/Python/etc). Clustering(supervised/unsupervised) would be required as part of this work, using any clustering algorithm. Implementation work should defend and backed by Literature review. PFA Document for further details. Let us know if you have
...and mysql server installed in the computers to work Features of the Software Provided • The desktop and admin software have a login procedure • The desktop software is integrated with the SDK of the LDR Scanner to extract the data info of the ID and Driver Licenses • The picture of the documents is saved in the database in a longblob field • The deskto...
Hello, We are looking for an experienced ...examples of our websites so you could figure out the model. We are providing content structures for each review (chapters, notes, keywords, etc) Each review should be about 2-3k words. Kind regards, Atanas Tanev p.s to be sure u are not a bot, please include in your msg the following: "I AM NOT A BOT"
Hello!!! A parental control app where the parents will be able to control their child devices and will be able to add more than 1 device in a single account and also will be able to block or unlock different apps ,block internet ,block in app purchases, adult content etc. Also parents will be able to set schedule for their kids for their homework
...being told what the other player has inputed. The goal for both the players is to enter a word or a phrase that has been submitted by the other as soon as possible. Obviously, in order to maximise the chance of getting a match, the two players would better to enter words that describe the image well, since it is the only information shared by both of