Design requirement: - Design high penetration of PV connected with grid ( at least 1 MW ). - Connect D-STATCOM with the system. - Test the VOLTAGE system during steady state condition and during three phase fault with STATCOM and without STATCOM. - Test the harmonics in the system with STATCOM and without STATCOM
Design requirement: - Design high penetration of PV connected with grid ( at least 1 MW ). - Connect D-STATCOM with the system. - Test the VOLTAGE system during steady state condition and during three phase fault with D-STATCOM and without D-STATCOM. - Test the harmonics in the system with STATCOM and without STATCOM. STATCOM can improve the voltage
...method you would want or prefer. Also you would be needed in closing the lead. The lead can be from any domain e-commerce, payments, etc. Services we provide: - Penetration testing - PCI compliance check - GDPR UK compliance - Automated trainings - Phishing Simulation - Infrastructure scanning - vulnerability assessment We also provide
We use an agile methodology with user stories and associated tasks defined in VSTS. We require test cases to be created an run to validate that each user story is delivered. You will have experience of using Microsoft VSTS (TFS) and Microsoft Test Manager to run manual test cases and raise bugs / improvements as necessary. You will have a keen eye for detail to compare designs to developed apps. ...
EXPERT TELEPORTATION is testing heavy industry market of Los Angeles (construction, plants, utilities, aeronautics…) for 6 weeks and require help for aggressively generating appointment by cold calling. We are a startup making a visio-software on smartglasses ([url removed, login to view]) What will you be doing? Based on a provided list of targeted
...steel construction for a two- story single family home and also include the use of facades in various areas in whole building. An energy efficient home with more sunlight penetration and the use of insulation methods that would allow daylight heat to warm the home on cold nights. Include a 2 car garage and outdoor pool and playground. Home is constructed
I need a pen test for a self developped cloud solution. You need to make automatic test an manual test. I need to know if the system can get hacked and how to solve the problems, if any. FULL PEN TEST NEEDED INCLUDING REPORT! MANUAL AND AUTOMATIC.
1. Experience in blackbox pentesting, offensive vulnerability scans, social engineering, hacking a. People who currently work at tech-positions for penetration testing companies, cyber-security companies, infosec auditing, competitive intelligence, vulnerability research, malware research b. People who studied computer engineering, computer science
I am looking for a performance testing online training on Loadrunner. Please contact me if you are interested.
... [url removed, login to view] Application development 2, Expert in Etereum Blockchain [url removed, login to view] contract development and auditing 4. Expert level in Token design, development and penetration testing. For you to be selected you MUST HAVE A LINKEDIN PROFILE as I will add you to my development team. PLEASE NOTE: Do not bid if you are an agency or do not have...
...security programs and Information Security Management Systems "ISMS)"in line with international standards ISO 27001 - We do cyber security testing -> internal and external penetration testing, application testing and source code reviews - Review your compliance with new legislation -> Mandatory data breach response -> policy building, data govern...
A Gnu Radio Flowgraph (parameter based) for LimeSDR is needed: TX Side: ...other) -> BPSK/QPSK demodulation (carrier +clock recovery- Costas loop included) ->CCSDS decoding (descrambling included)->TCP/IP Sink "LimeSDR ownership is needed for testing" Only a working project will be accepted. Please don't deliver a project with dropping frames.
...CYBER SECURITY ISN’T ONE-SIZE-FITS-ALL. Secondary Tagline: Let us craft a customized package that fits your organization. Services List: • Network and WebApp Penetration Testing • Wi-Fi Security Assessments • Social Engineering • Covert Entry Assessments • Incident Response • Digital Forensics • Malware Analysis &bul...