Ibm customer jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    3,531 ibm customer jobs found, pricing in GBP

    ...preferences Compiling and analyzing statistical data using modern and traditional methods to collect it Job brief We are looking for a methodical Market Research analyst to survey customer preferences and statistical data in order to support customers during their decision-making process regarding business needs, prices, and promotions. The successful market

    £10 / hr (Avg Bid)
    £10 / hr Avg Bid
    9 bids

    We are working with IBM on a sensor which needs to be scanned by the phone camera with something like QR and display the data and sent automatically to the server. We need some modifications on the free APK ( no algorithms changes - link below) to eliminate the options they have and choose the only ones we are interested. If this is doable using

    £296 (Avg Bid)
    £296 Avg Bid
    33 bids

    Need someone to assist in completing the build of IBM Domino / XPages system. The Developer must have proven experience developing web interfaces for IBM Domino v9.0.1, XPages, Java, HTML, and CSS for desktop as well as mobile user interfaces.

    £15 / hr (Avg Bid)
    £15 / hr Avg Bid
    8 bids

    I need to enable SSL on an integration service hosted on IBM IIB V10

    £164 (Avg Bid)
    £164 Avg Bid
    3 bids

    We are looking at developing an AI model using IBM, Microsoft or AWS cloud to recognise invoices, bank statements, receipts, etc. and post to the right categories in our chart of accounts automatically. The project will help us to reduce the reliance of teams of account clerks and make data entry more accurate.

    £4927 (Avg Bid)
    £4927 Avg Bid
    15 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids
    Project for Yuan N. 22 hours left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £199 (Avg Bid)
    £199 Avg Bid
    1 bids
    Project for Jin C. 22 hours left

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £451 (Avg Bid)
    £451 Avg Bid
    1 bids

    ...Intelligence (AI) that decides if the device is receiving or is running a compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural

    £441 (Avg Bid)
    £441 Avg Bid
    1 bids

    I am looking for IBM lotus approach expert.

    £18 / hr (Avg Bid)
    £18 / hr Avg Bid
    4 bids

    ...and Assessment 1. Evaluation of the current IBM Websphere Install 2. Make recommendations based upon assessment of environment 3. Design of new environment Task #2 Description: - Install Process Buildout of new virtual machines 1. OS install and tuning 2. Install of Prerequisites. 3. Install of IBM Websphere 1. Migration of Ques to new environment

    £1668 (Avg Bid)
    £1668 Avg Bid
    1 bids

    Experience in quantum computing basics. can demonstrate grover's algorithm on IBM Q. Modify the Grover's search black box for 2 qubits (shown in the YouTube video) to be able to perform Grover's search for 4 qubits Modify the Grover's search black box for 2 qubits (shown in the YouTube video) to be able to perform Grover's search for 4 qubits

    £14 (Avg Bid)
    £14 Avg Bid
    2 bids

    An acronym is a word formed from the initial letters of a name, for example the word IBM is formed from the initial letters of the name: International Business Machines.

    £21 (Avg Bid)
    £21 Avg Bid
    7 bids

    Looking for a script to extract contact information from a Word Document and save it in a IBM Lotus Notes database.

    £23 (Avg Bid)
    £23 Avg Bid
    10 bids

    ...trainers and skilled resources , predominantly In Oracle BI, Oracle Data Integrator, Hyperion Product stack, Oracle Middleware solution, Oracle SOA, AIA Informatica, IBM Datastage and IBM Cognos. BISPhas footprints virtually across the USA, CANADA, UK, SINGAPORE, SAUDI ARABIA, AUSTRALIA and more by providing live virtual support services from India for

    £346 (Avg Bid)
    £346 Avg Bid
    3 bids

    ...trainers and skilled resources , predominantly In Oracle BI, Oracle Data Integrator, Hyperion Product stack, Oracle Middleware solution, Oracle SOA, AIA Informatica, IBM Datastage and IBM Cognos. BISPhas footprints virtually across the USA, CANADA, UK, SINGAPORE, SAUDI ARABIA, AUSTRALIA and more by providing live virtual support services from India for

    £138 - £413
    £138 - £413
    0 bids

    2.1. Comparison of data collection between QRadara and your SIEM solution Write a paragraph (150-250 words) to describe how data collection is being done in QRadar and your SIEM solution and compare both. 2.2. Comparison of data processing between QRadara and your SIEM solution Write a paragraph (150-250 words) to describe how data processing is being done in QRadar and your SIEM solution an...

    £35 (Avg Bid)
    £35 Avg Bid
    28 bids

    I want to use Ibm spss software on my PhD theses

    £292 (Avg Bid)
    £292 Avg Bid
    1 bids

    I need a Python programmer to adapt an existing script that uses Google ...SpeechRecognition (for API to the service), PyAudio (for microphone). This simple script can be used or the programmer can write it from scratch. As an alternative to Google, also IBM Watson or Microsoft API can be used if the programmer has more experience with these services.

    £25 / hr (Avg Bid)
    £25 / hr Avg Bid
    25 bids

    ...trainers and skilled resources , predominantly In Oracle BI, Oracle Data Integrator, Hyperion Product stack, Oracle Middleware solution, Oracle SOA, AIA Informatica, IBM Datastage and IBM Cognos. BISPhas footprints virtually across the USA, CANADA, UK, SINGAPORE, SAUDI ARABIA, AUSTRALIA and more by providing live virtual support services from India for

    £292 (Avg Bid)
    £292 Avg Bid
    9 bids

    ...Companies in US who have implemented following services: 1. Adobe Campaign(Adobe marketing cloud) 2. Unica(IBM Campaign) 3. SAS(Modules: Visual Analytics, Customer Intelligence, Enterprise Miner) 4. Watson Campaign Automation(WCA) also called Silverpop(An IBM company) Let me know if you could provide list of companies and Information of top level executives

    £141 (Avg Bid)
    £141 Avg Bid
    2 bids

    Small project with IBM ILOG CPLEX optimization studio

    £2 - £6 / hr
    £2 - £6 / hr
    0 bids

    ...the existing system (volunteer management). Specifically, I am looking for IBM Watson's certificate to be IAM only, and to modify IBM Watson's module (PHP) published on [login to view URL] to be IAM-compliant one. Final product is a set of IAM-compliant source code of Drupal's IBM Watson (Speech to Text) module below. Perhaps it is probably necessary to ref...

    £154 (Avg Bid)
    £154 Avg Bid
    13 bids

    We are working with IBM on a sensor which needs to be scanned by the phone camera with something like QR and display the data and sent automatically to the server. We need some modifications on the free APK ( no algorithms changes - link below) to eliminate the options they have and choose the only ones we are interested. If this is doable using

    £276 (Avg Bid)
    £276 Avg Bid
    14 bids

    We are a data analytic company and wanted to read and write spss data files through c# via api. We also wanted to make sure there is no licencing issue from IBM SPSS.

    £92 (Avg Bid)
    £92 Avg Bid
    4 bids

    We had a server installed , set up for a small net work , IBM small server using windows 2012 server and VM ware . However the system crashed couple of times and the IT person who set it up did have a back up systems on HDD but to our dismay we found out the back up was not being done and the also the Raid within the server were not mirroring . As a

    £559 (Avg Bid)
    £559 Avg Bid
    14 bids