Ibm lotus notes freelancer jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    7,413 ibm lotus notes freelancer jobs found, pricing in USD

    Our "New Release Notes" are overly technical in their writing and posted in a hidden subdomain of our user help site. We would like to feature them more prominently on our main website, in dynamic HTML, in visual accordance with the rest of our site. We will give one month's release notes as a paid starter project then award the rest of the work upon

    $116 (Avg Bid)
    $116 Avg Bid
    10 bids

    I have about 3,000 words handwritten on a document. I need someone to type it up today. I am willing to pay iwritter .com rate which is around $30-$40 for it done. DO NOT APPLY if you cannot start this today.

    $24 (Avg Bid)
    $24 Avg Bid
    119 bids

    I am a graphic designer who basically doesn't have the time to write the text for my own cv, plus I am terrible about...am a graphic designer who basically doesn't have the time to write the text for my own cv, plus I am terrible about writing my skills/quality... I need someone to take my notes and write a really well worded cv. UK applicants only

    $113 (Avg Bid)
    $113 Avg Bid
    27 bids

    Need someone to assist in completing the build of IBM Domino / XPages system. The Developer must have proven experience developing web interfaces for IBM Domino v9.0.1, XPages, Java, HTML, and CSS for desktop as well as mobile user interfaces.

    $19 / hr (Avg Bid)
    $19 / hr Avg Bid
    7 bids

    I need to enable SSL on an integration service hosted on IBM IIB V10

    $200 (Avg Bid)
    $200 Avg Bid
    1 bids

    Hello, We are design company, currently developing a registered app, first for iphones, and later, for android. The app is very simple, but we need it to be developed from zero. We have a detailed presentation with graphics and detailed functions, which can be used as a guide during the different stages of production. We are looking for an experienced app devoloper who is open to sign an intel...

    $674 (Avg Bid)
    $674 Avg Bid
    70 bids

    We are looking at developing an AI model using IBM, Microsoft or AWS cloud to recognise invoices, bank statements, receipts, etc. and post to the right categories in our chart of accounts automatically. The project will help us to reduce the reliance of teams of account clerks and make data entry more accurate.

    $7524 (Avg Bid)
    $7524 Avg Bid
    14 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    We are looking to build a new website to resell IT products and services to included manufacturers like Microsoft, Amazon, Oracle, IBM, Cisco, etc.

    $190 (Avg Bid)
    $190
    7 entries

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $251 (Avg Bid)
    $251 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $250 (Avg Bid)
    $250 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $568 (Avg Bid)
    $568 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    $555 (Avg Bid)
    $555 Avg Bid
    1 bids

    I am looking for IBM lotus approach expert.

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    4 bids

    ...and Assessment 1. Evaluation of the current IBM Websphere Install 2. Make recommendations based upon assessment of environment 3. Design of new environment Task #2 Description: - Install Process Buildout of new virtual machines 1. OS install and tuning 2. Install of Prerequisites. 3. Install of IBM Websphere 1. Migration of Ques to new environment

    $2100 (Avg Bid)
    $2100 Avg Bid
    1 bids

    Experience in quantum computing basics. can demonstrate grover's algorithm on IBM Q. Modify the Grover's search black box for 2 qubits (shown in the YouTube video) to be able to perform Grover's search for 4 qubits Modify the Grover's search black box for 2 qubits (shown in the YouTube video) to be able to perform Grover's search for 4 qubits

    $17 (Avg Bid)
    $17 Avg Bid
    2 bids

    I need you to fill in a spreadsheet with data.

    $16 (Avg Bid)
    $16 Avg Bid
    6 bids
    Retouch 3 Images With notes 20 hours left
    VERIFIED

    Retouch 3 Images with notes attached. [login to view URL]

    $23 (Avg Bid)
    $23 Avg Bid
    52 bids

    An acronym is a word formed from the initial letters of a name, for example the word IBM is formed from the initial letters of the name: International Business Machines.

    $27 (Avg Bid)
    $27 Avg Bid
    7 bids
    office 365 migration 9 hours left
    VERIFIED

    migrate from lotus notes to office 365

    $398 (Avg Bid)
    $398 Avg Bid
    7 bids
    Trophy icon Logo design Ended

    Name of the logo "TopNotch Events" need it nice and elegant. Look for nice Caliography type. preferred color Gold/ Rose gold could add Lotus flower (optional) The letter T pls check the image, need the letter font like the W on the image attached!

    $25 (Avg Bid)
    $25
    82 entries

    Job Description: Accountant to prepare all the year-end financial reports that will be submitted to the auditors. Financial year July 2017- June 2018. All transactions have already been keyed-in. The ledger will be sent in an Excel format. These are the ledgers that will be provided : Cash expenses (all transactions have been named into the various expenses categories together with amounts and da...

    $141 (Avg Bid)
    $141 Avg Bid
    113 bids

    I need to reach out to clients with personal messages, however emails often go unread. I need someone to handwrite my messages. Handwriting should be very attractive but not absurdly good to the point of being a calligrapher. (75-80 percentile) Often letters will be a few lines "congratulations on the new job! My name is Adam, and I'm the representative from X company for your area. ...

    $5 / hr (Avg Bid)
    $5 / hr Avg Bid
    59 bids

    I need you to write some articles or short notes of pages in hindi

    $14 (Avg Bid)
    $14 Avg Bid
    13 bids

    Looking for someone to help create the western notes for following Indian songs to play in violin [login to view URL] [login to view URL] [login to view URL] [login to view URL] I would like the video recording of playing

    $99 (Avg Bid)
    $99 Avg Bid
    4 bids

    Looking for a script to extract contact information from a Word Document and save it in a IBM Lotus Notes database.

    $29 (Avg Bid)
    $29 Avg Bid
    10 bids

    I am looking for someone with the knowledge in lotus approach.

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    3 bids