Example cpi hash jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 example cpi hash jobs found, pricing in USD

    I need a minimal flutter example app for android. The app must scan Bluetooth Ibeacons. I do not need a complete UI, simply a button to start scan and another to stop scan. The information obtained from beacons can be showed in a textbox. The monitoring of beacons mut be "Ranging" (each transmition of beacon must be received and showed) Is very important the scan continue in background. When the app is minimized or out of focus, the app must launch a foreground service (or the foregrounn service can be allways active on all the life of app) when te foreground service is running, a permanent notification must be showed (android policy to allow foreground service). The app must request all permitions required to user on start. When the app is minimized, and the foreground...

    $17 (Avg Bid)
    $17 Avg Bid
    11 bids

    I am looking for an experienced Flutter developer to create a minimal example that can effectively scan iBeacons for Android. This should be a simple, text-based UI that can display the UUID, major & minor values, as well as signal strength of iBeacons. Furthermore, it's important that the scanner remains functional in the background via a foreground service, providing a simple text notification when interacted with. The detection process must be constant (ranging). Key requirements for the project: - Develop a minimal Flutter app for Android - Ability to scan iBeacons and display UUID, major and minor values, and signal strength - The app should continue to work in the background - Use a foreground service for background function - Provide a simple text notification from...

    $265 (Avg Bid)
    $265 Avg Bid
    27 bids

    I'm looking for an expert C# developer to create a software that can hash CDs for the purpose of file integrity. The primary use of this software will be to compare the hashed data with other CDs. Key Points: - The software should be designed to hash CDs at a speed that outperforms the hashing process in PowerShell, ensuring efficiency and time-saving - The primary focus of the hashing is to maintain the integrity of files on the CD, so I need a developer who understands the importance of this and can ensure the software is reliable in this regard - The software should be user-friendly, with a preference towards a fully automated process to make it as easy as possible for end-users. I'm looking for a skilled C# developer who has experience in creating high-speed ...

    $3990 (Avg Bid)
    $3990 Avg Bid
    26 bids

    I'm in need of a C# program that can hash files as quickly as PowerShell does. The program should be able to hash image files and all other types of files at the same speed, while utilizing the SHA-256 hashing algorithm. Additionally, it would need to read and write data efficiently. Key requirements: - Develop a C# program to hash files. - Implement the SHA-256 hashing algorithm. - Ensure the program reads and writes data smoothly.

    $25 (Avg Bid)
    $25 Avg Bid
    2 bids

    i will be creating a website like the given hellman example

    $107 (Avg Bid)
    $107 Avg Bid
    1 bids

    I need a C# program that hashes text strings using SHA-256 hashing algorithm. The current program I have was designed to hash data, but I've noticed it does so in a different order than PowerShell. This is problematic for my workflow, as I need the two to hash data in the same order for consistency. Key Requirements: - Make the C# program hash data in the same order as PowerShell using SHA-256 - Ensure the program is efficient and secure - Document the changes made for future reference Ideal Skills: - Proficient in C# programming - Expertise in working with hashing algorithms, especially SHA-256 - Prior experience with data consistency issues - Strong understanding of security protocols and best practices Please include your relevant experience and approach in...

    $46 (Avg Bid)
    $46 Avg Bid
    18 bids

    I have a C# co...that's currently designed for file manipulation but I really need it to work like Powershell for data processing. - Task: I'm specifically working with text files and need to perform a hashing operation on them. - The end goal: The code needs to be able to read through the text files and hash them in a way that's similar to what one can do with Powershell. The ideal freelancer for this job should have: - Proficiency in C# programming, especially in the context of data processing. - A good understanding of hash functions and how to implement them in a C# code. - Familiarity with text file handling in C# is a plus. I'm looking for an efficient and smooth solution that's able to process large text files quickly. Your experience in...

    $39 (Avg Bid)
    $39 Avg Bid
    36 bids

    ...The key focus of this project demands: - Experience in hashing algorithms, notably SHA-256 - Proficiency in data authenticity verification - Familiarity with video formats, particularly MP4 - An understanding of how to match video-recorded audit logs with original hashed data It's crucial to know if the hash data from the video recording matches the original hash of the audit logs for data authenticity purposes. Please note that the audit logs are text-based and believed to contain a hash of the original file. Your role is to confirm this authenticity. This task requires a comprehensive understanding of data security and integrity checks. If you have prior experience in this area, your input would be greatly appreciated. The video files are about 1.3 gigs...

    $91 (Avg Bid)
    $91 Avg Bid
    13 bids

    Example style: We - LigoWave provide easy-to-use wireless networking solutions for businesses and communities, ensuring reliable connectivity with advanced technology. We will be releasing new product and we want video showing the highlight features with "Mike" as our older videos had. We no longer have the contacts of older team who did those videos. I am looking for a talented animator to produce a high-quality 2D video that is under two minutes long. Key requirements are: • Skilled in 2D animation. This is a must as it is the style we have chosen for this video. • An ability to produce engaging and captivating content within a short span of time. The video is less than a 1.30min . • An understanding and ability to work

    $150 (Avg Bid)
    $150 Avg Bid
    59 bids

    Hi I need to very basic example on how to call a rest api from Aveva using a put command. It should be build importing .net libs.

    $131 (Avg Bid)
    $131 Avg Bid
    30 bids

    Hi, we need help compiling and running SDK example C code.

    $116 (Avg Bid)
    $116 Avg Bid
    16 bids

    I'm looking for a skilled developer to create a script that will pass hash value from the parent page to an iframe, and use the hash value as part of the iframe's URL. Key Requirements: - Extract the hash value from the parent page's URL. - Pass the extracted hash value into the iframe. - Utilize the hash value as part of the iframe's URL. Ideal Skills: - Proficiency in JavaScript, particularly working with iframes and URL manipulation. - Strong understanding of web security principles. The successful candidate for this project will have a keen eye for detail and the ability to create a robust, secure solution that meets the specified requirements.

    $65 (Avg Bid)
    $65 Avg Bid
    27 bids

    I'm looking for a talented and innovative graphics designer to create a logo from existing example.

    $20 (Avg Bid)
    $20 Avg Bid
    43 bids

    I'm in need of a reliable freelancer to find a sample medical file from the USA that includes a police report from an accident. The file should be at least 200 pages and can contain doctor notes, insurance claim documents, police report, treatment plans, medication and treatment prescribed, and bills for services and costs. This can be a completely fake file, as I need it to test software I am using. Otherwise, it can be filed publicly or filed as part of a lawsuit. This should not be from a real person who has not given consent, unless it is already make public. It should not contain redactions.

    $22 (Avg Bid)
    $22 Avg Bid
    19 bids

    Hello, i need someone good programmer who is able to modify ASF CDC echo example for atsamd11d14 mcu. When receive '1' by CDC -> set 2 pins of mcu When receive '0' by CDC -> reset these 2 pins of mcu And i would like device to be visible in Device Manager or Linux like 'USB CDC'

    $111 (Avg Bid)
    $111 Avg Bid
    7 bids

    ...database. Here’s what the project involves: - Functionality: The add-on must copy user registration data from Xenforo into a separate database (for a start a simple sqlite3 file database). The password must be hashed and salted, similar to MyBB standards. ( this requires us to do it on every registration attempt because we only have the plaintext password at that moment and can only create a MyBB hash and salt at that time. Must Have: Xenforo Add-on dev env. I don't want to have to give you my license key for your xenforo development Ideal skills: - Xenforo knowledge: It's essential for you to have prior experience working with Xenforo software to ensure that the add-on can be comfortably integrated into our current forum. - Database management and replicati...

    $329 (Avg Bid)
    NDA
    $329 Avg Bid
    5 bids

    ...developer with solid experience in Rust to help bring to life a wrapper contract that will interact with a specific third-party contract. Key Responsibilities: - Implementing CPI calls: The primary function of this smart contract is to make CPI (Cross-Program Invocation) calls to a predetermined third-party contract. This requires an in-depth understanding of Solana's architecture and the Rust programming language. Ideal Candidate: - Experienced Solana Developer: Demonstrable experience in developing Solana smart contracts is essential. Understanding of the Solana ecosystem and network mechanics, including the use of CPI calls, is a must. - Proficient in Rust: Due to the project requirements, a strong command of the Rust programming language is a neces...

    $208 (Avg Bid)
    Urgent
    $208 Avg Bid
    5 bids

    As a founder of "", I'm taking on an advanced cryptography course selling project. This comprehensive course encompasses: - Symmetric Key Cryptography - Public Key Cryptography - Hash Functions and Digital Signatures I'm looking for candidates with a deep understanding of these concepts, given the course is of advanced level. Furthermore, an affiliate marketer with a knack for turning complex content into engaging, easily digestible information is ideal. This course should be marketed as moderately interactive, featuring occasional quizzes to keep learners engaged. Skills and Experience: - Advanced cryptography knowledge - Proven affiliate marketing success - Ability to simplify complex information The Course Costs 1330.33$ You will use the discount code &quo...

    $99 (Avg Bid)
    $99 Avg Bid
    8 bids

    ...reference articles we want to use and replicate some of the results, in addition to adding something new. We have a dataset for the given variables ready and an R code that need adjustments in order to run properly and fix some bugs. Key Project Details: - **Scope:** Your task will involve examining the impact of the following macroeconomic variables on Indian house prices (HPI): GDP growth rate, CPI, Interest rates, FDI, and REER. - **Time Period:** The analysis should cover both short-term and long-term trends, typically an ARDL model. We also would like to separate out the Covid years in order to see these effects. -**We have a dataset with the relevant variables, almost finished R script with explanations. But will need help to get all the code to work and produce result...

    $118 (Avg Bid)
    $118 Avg Bid
    26 bids

    Need after effect animation exactly same like that ribbon style with new text See animation and then placed the bid write " RIBBON " in the bid

    $26 (Avg Bid)
    $26 Avg Bid
    20 bids

    I need a tool using Microsoft Powershell that can fetch security patches and patch release information from the internet for various OS levels and applications using vendor websites. The tool should be able to download the patches and store them loca...severity level. Key requirements: - Fetching security patches for various OS levels and applications using vendor websites. - Downloading patches for specific applications only. - Storing the downloaded patches locally. - Collect patch information patch source, OS type, software impacted, software name, software description and the patch name and severity level - collect security hash from website and compare hash to ensure patch was not tampered with during download and output all of this data within the CSV file - export All...

    $518 (Avg Bid)
    $518 Avg Bid
    34 bids

    I'm looking for a skilled Python developer with experience in GPU programming using CUDA to assist in a project that involves image processing and data analysis. - I have a python code and I need to modify it to work with GPU the code takes an image changes its pixels one by one and each pixel change calculates new image hashes if images hash satisfies some specs it save image and code ends. this is whole python code is doing now. it is a 40 lines code. very simple for someone who knows how to code on cuda.

    $41 (Avg Bid)
    $41 Avg Bid
    7 bids

    I am seeking a developer with intermediate level experience IOS Swift. The task will be to help me get the example code working from the documentation at This is my first time working with IOS and the docs leave out some of the implementation. For example, in this code there is not map function, only "..." Bids under £70 only please. ``` var totalUsageByCategory: [ActivityCategory:TimeInterval] totalUsageByCategory = (…) ```

    $166 (Avg Bid)
    $166 Avg Bid
    38 bids

    I'm working with an API who giving the hash of a file, it returns a p7s digital sign in base64 who needs to be add it to the PDF dictionary. (It can be one or more signatures) What I want is, the ability to add the sign to the PDF in NodeJS (better if it's with typescript) and then open it in adobe acrobat and see the sign. I will provide the PDF sample, the hash of the file and the response of the API in base64 to be tested. Additionally I have an example in Java to better undestanding of the requeriments The flow of the file will be: 1. Give the hash and received the API response (this will be mocked) 2. The API response must be decoded (it's in base64) and add it to the PDF 3 A new PDF must be saved in the disk 4. When the new pdf is opened...

    $135 (Avg Bid)
    $135 Avg Bid
    34 bids

    I'm seeking an ethical hacker to help me enhance the security of my website. Key Requirements: - Identify vulnerabilities in the current system - Encrypt the website's hash data effectively using a secure algorithm - Provide ongoing support to ensure the system remains secure Ideal Skills: - Proficiency in ethical hacking - Experience with encryption algorithms (knowledge of AES, RSA, Blowfish is a plus) - Strong problem-solving and analytical skills - Excellent communication and collaboration abilities Please note, the key size for the AES encryption algorithm will need to be determined as part of this process.

    $355 (Avg Bid)
    $355 Avg Bid
    13 bids

    I need an experienced freelancer to replicate the design, layout & structure from an existing website to serve as a starting point for our own site. Key tasks involve: - Implementing the structure or an an existing example website on Wordpress. This includes the pages, placeholders for posts, menu structure, etc. - Utilizing Spectra blocks/Kadence theme, contact form 7 Ideal candidate should have strong skills in Wordpress and Spectra/Kadence theme implementation. Please include examples of past work in your application. You will be working from a clean Wordpress install.

    $107 (Avg Bid)
    $107 Avg Bid
    106 bids

    University Assignment: Flask Web Application for Secure Authentication System ONLY BID IF YOU CAN DO IT. Go to Template Folder to see the code and use Docker to run it. It should take 2-3 hours to do it. Need it ASAP. Project Overview: I will give you a zip file with , login.h...Authenticator. - Enforce session security with HTTPS and consider HTTP Strict Transport Security (HSTS) for enhanced security. - Implement CAPTCHA verification to prevent automated attacks and manage session rate limiting effectively. Recovery Options: - Generate recovery keys using () with at least 20 bits of entropy. - Ensure recovery keys are delivered securely and are single-use. - Hash recovery keys using Argon2 with individual salts. - Explore implementing HSTS to prevent downgrade attacks.

    $24 (Avg Bid)
    $24 Avg Bid
    31 bids

    ...same exact name. Of course browsers often use the cached version instead. The files are big enough where I want the browser to cache them, but only until they change - then the browser needs to grab the new version from the server. The apache and .htaccess expire headers haven't done what I need. I read that some codebases exist that will assign a variable to the end of the URL based on a file hash. I thought this may be the way to go. The solution needs to be editable by me. I am more of a general IT person who can do some front end development and tweak some code. So markup and explanations are important or available documentation if we cab use a simple library. A follow up project might be to implement squid or some sort of automatic way of localizing those pdf a...

    $24 / hr (Avg Bid)
    $24 / hr Avg Bid
    89 bids

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    $113 (Avg Bid)
    $113 Avg Bid
    25 bids

    ...been to collect the forensic artefacts from the scene of the crime and has managed the integrity and continuity issues during collection and transportation. One of the forensic artefacts was a computer containing a single hard disk. A forensic imaging technician has created a forensic image of this hard disk and stored it securely on one of your organisations servers alongside a file containing the hash value of the image. Your task is to analyse the forensic image as part of the investigation and produce a report based on your management of the case, your analysis and your findings. You will have to: setup your forensic workstation for your analysis, which would include any forensic tools that you feel are appropriate for the job, download a copy of the forensic image from th...

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    17 bids

    ...the following structure: First line: The block header. Second line: The serialized coinbase transaction. Following lines: The transaction IDs (txids) of the transactions mined in the block, in order. The first txid should be that of the coinbase transaction Difficulty Target The difficulty target is 0000ffff00000000000000000000000000000000000000000000000000000000. This is the value that the block hash must be less than for the block to be successfully mined. Execution Create a file named that contains the command to execute your script. This file should ideally contain a single command like python or node index.js. Your script should autonomously perform all tasks when is executed, without requiring any manual intervention. Evaluation Criteria Your submission will be evaluat...

    $11 (Avg Bid)
    $11 Avg Bid
    3 bids

    ...hpn5B"/> <Params> <Token Type="string" Value="b6JnfGF7fXMjOjB79zVoLCJwZCIyICIvMTMjLCJp9ka18WRo9jIyICJnYWvnYSIrIkfgeWUjOjAjYkfx9j2iY62T8Ga5YkFreDMjLCJpejIyICJwezZoZ1FnIjpjfGouZSIyICIvNnE6NTm5NiIvIz7"/> <TransactionID Type="string" Value="9156174388"/> <WinReferenceNum Type="string" Value="17612298068"/> <WinAmount Type="int" Value="75"/> <GameReference Type="string" Value="bgor-cc-Showball3 "/> <Hash Type="string" Value="1b522defc135ef9bea631d94a99f587bcb1cb03ec08ca356de42fb77f4e3c4a4"/> <BonusWinAmount Type="int" Value="0"/> <GameStatus Type="string" Value="Pending"...

    $29 (Avg Bid)
    $29 Avg Bid
    77 bids

    Hiring technical personnel can achieve complete development of the following code in practice. There may be something wrong with the code below, but there is project direction. pip install telethon Import TelegramClient from Import functions from # Create Telegram client with your API ID and API hash api_id = 'Your API_ID' api_hash = 'YOUR_API_HASH' Client = TelegramClient('session_name', api_id, api_hash) Asynchronous def send_dice(chat_id, dice_face): Asynchronously with client: result=awaitClient(( peer = chat id, Query id=0, id='robot command', silence=false, Scheduled Date = None, background=false, cleardraft=false, hide_via=true, selected=[dice_face] # 1-6 are ordinary dice )) print(result) # Fill in your account mobile

    $972 (Avg Bid)
    $972 Avg Bid
    59 bids

    I require an experienced R developer to retrieve and analyze specific financial indicators. Your role will encompass: - Code development using R to retrieve and implement financial data. - Deep understanding and familiarity with financial indicators, particularly with HPI (Housing Price Index), GDP (Gross Domestic Product), IR (Interest Rates), FDI (Foreign Direct Investment), CPI (Consumer Price Index) and REER (Real Effective Exchange Rate). - Advanced statistical analysis of retrieved data. - Delivery of comprehensible reports explaining the data analysis. - We need to extract the above mentioned data for India. The data will need to be processed, either on a quarterly or monthly basis. (Monthly is preferred). Run all the required tests on the data (autocorrelation, heteroskeda...

    $135 (Avg Bid)
    $135 Avg Bid
    22 bids

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    $208 (Avg Bid)
    $208 Avg Bid
    12 bids

    I'm seeking an expert in writing Splunk queries to detect threats, efficiently querying from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expert...from primarily CrowdStrike EDR telemetry data, but also other log sources. Key requirements from your expertise include: - Proven skills in extracting and analyzing data from logs - The ability to use Regex queries to extract additional, nuanced information - Proficient querying from CrowdStrike EDR telemetry. The information to be extracted comprises of EDR fields like: - Process Name - File Hash - Command Line I look forward to working with a detail oriented and security savvy professional who will utilize this data to help us identify potential security threats and ensure sy...

    $353 (Avg Bid)
    $353 Avg Bid
    19 bids

    I'm looking for a talented individual with proficiency in image processing and hash calculation. The primary aim of this project is to use these techniques for image modification. Ideally, I need someone adept in: - Image modification in such a way that its original concepts not changes - making image change so many time like a loop - calculating images hash The resultant processed images should be provided in JPEG, PNG, and GIF formats. A background in encryption and cryptography will be highly desirable. Your experience with these specific image processing techniques will be crucial to the success of this task.

    $123 (Avg Bid)
    $123 Avg Bid
    53 bids

    ...and need assistance to set up a Global TCP Passthrough Load Balancing to distribute my online traffic. The ideal bidder would have: - Extensive experience in setting up Load Balancing on GCP. - Solid understanding of routing and IP Hash distribution. -Each instance stores unique files, it is important there is the lowest latency possible, when a file is sent, it must go to the instance closest to who sent the file via TCP to the load balancing IP. -I can deploy as well, just need best practices on how to achieve this. Essentially, I need you to develop an IP Hash distribution strategy for distributing online traffic effectively. GCP certification is appreciated but not necessary as long as you have experience in networking and have worked on similar tasks before. A smoot...

    $145 (Avg Bid)
    $145 Avg Bid
    18 bids

    1- I need an update on my buy and sell bot that works on the Solana network through the Raydium pool, the bot has a mechanism for capturing variations in the chart and sending buy or...com/runtime/programs exemple : *jito priority documentation : *examples of program users that currently run within the Solana blockchain : user hash >program + jito = *example of priority in JITO + jupiter agregator user hash =

    $1049 (Avg Bid)
    $1049 Avg Bid
    137 bids

    ...stworzony. oto opis Developera który stworzyÅ‚ ten program:: Features Written in c++, best performance with multithreading Beautiful GUI, inspired in Blizzard All errors and exceptions throw user friendly messages International Multilanguage Fast download files Method of Hash (CRC32) default Banner in home (Promotion, Event, New Image, etc...) + News / Patch notes Initialize client with arguments Tool user friendly for generate serverlist hashs New config game for Metin built-in (Requirements: metin2client source) Available Hash method to choose Md4 Md5 Sha1 Sha224 Sha256 Sha384 Sha512 Sha3_224 Sha3_256 Sha3_384 Sha3_512 Available Languages This is extremely flexible when hiring you can add new languages or change existing since that helps me to translate co...

    $110 (Avg Bid)
    $110 Avg Bid
    56 bids

    I'm currently using PERL 5.10 system and requires a proficient expert to aid in modifying how passwords are hashed in my system. Initially, we employed SHA-256 but we're looking to switch to PBKDF2. Ideal Skills and Experience: - Proficient in PERL 5.10 - Familiarity with SHA-256 and PBKDF2 hashing methods - Prior experience in password re-hashing Task Objectives: - Identify current SHA-256 hashing method in the system - Modify hashing method to use PBKDF2 instead - Validate successful implementation of the PBKDF2 hashing method The project necessitates a strict focus on security and confidentiality given its sensitive nature.

    $13 (Avg Bid)
    $13 Avg Bid
    26 bids

    ...the following structure: First line: The block header. Second line: The serialized coinbase transaction. Following lines: The transaction IDs (txids) of the transactions mined in the block, in order. The first txid should be that of the coinbase transaction Difficulty Target The difficulty target is 0000ffff00000000000000000000000000000000000000000000000000000000. This is the value that the block hash must be less than for the block to be successfully mined. Execution Create a file named that contains the command to execute your script. This file should ideally contain a single command like python or node index.js. Your script should autonomously perform all tasks when is executed, without requiring any manual intervention. Evaluation Criteria Your submission will be evaluat...

    $13 / hr (Avg Bid)
    $13 / hr Avg Bid
    7 bids

    In need of a tech-savvy, innovative app developer well-acquainted with both iOS and Android system...innovative app developer well-acquainted with both iOS and Android systems. The ultimate goal is to create a cryptomining application that's user-friendly and efficient. Key Features Required: - User Registration and Login: A secure authentication method, protecting user's data and mining activity. - Real-time Mining Statistics: To keep users informed about their mining status, providing data like hash rate, earnings, and more. - Wallet Integration: Facilitate seamless transactions using popular crypto wallets. Proficiency in blockchain technology, crypto mining, and payment gateway integration is a must. We value security and user experience, so expertise in these area...

    $694 (Avg Bid)
    $694 Avg Bid
    16 bids

    More details: What is the purpose of the structures you want to build? Residential buildings How many different design variations do you want for the structures? One design What specific features are you looking for in your residential building's design? Glulam arches and connected roof

    $445 (Avg Bid)
    $445 Avg Bid
    23 bids

    I am looking for a person who will rewrite a few functions for me, preferably into a hash map or a vector, depending on what is faster and easier, it concerns objects on the map

    $144 (Avg Bid)
    $144 Avg Bid
    13 bids

    ...receive cycle with status return message of POP3 Server The SMTP and POP3 transmission should also be possible via SSL. SMTP and POP3 authentication should support standard authentication. SMTP Server and POP3 Server and account settings should be configurable. Email Subject should be configurable (but should also have a key to compute the cycle time in the otel receiver, like cyclekey=some number or hash ). Configuration should be done via yaml (in accordance to the opentelemetry standard) Skills and experiences required for this job: - Experience with - Experience with golang - Proficiency in SMTP and POP3 protocol - Ability to develop configurable systems - skills in data metrics and logs This project will require you to be detail-oriented, reliable, and have exceptiona...

    $109 (Avg Bid)
    $109 Avg Bid
    7 bids

    I am seeking a skilled graphic designer to revise the typography in my current logo. The specifics are as follows: - Typography Adjustment: This is the main requirement of this project. You should have extensive knowledge and experience in typographical design. It's not required, but if you have any style recommendations, such as serif, sans serif, or script, they would be appreciated. Importantly, this task is time-sensitive and I am looking to have the project completed as soon as possible. Expertise in rapid and efficient work will be an added advantage. Please ensure your bid reflects this urgency.

    $55 (Avg Bid)
    Featured Urgent
    $55 Avg Bid
    95 bids