Job Not Found
Sorry we couldn't find the job you were looking for.
Find the most recent jobs here:
I need proofreaders for the ebooks. I'm having typed data in notepad that has to be cross checked with the given pdf file.
I need you to create a mining pool for the coin Zano (that uses the algo ProgPowZ) using a framework. one example of mining framework is: [login to view URL] but this only works for CryptoNote coins. I need it to work for Zano coin with algo ProgPowZ
Hello I would like to know the best solution to be able to create and use several facebook and gmail accounts. I would like to know the best anti-detection browser that can allow me to use several dozen facebook and gmail accounts without. How to install a proxy and not let Facebook find out that it's me.
I'm looking for an article writer. Article length would be 1000-2000 words. The article would have to unique, informative, engaging with a friendly tone. How much would you charge for one 1000-1200 words article? I'll provide the topic and keyword for each article. The type of articles would be for various ''Home Improvement Product Reviews''. Write the quoted sente...
Academic writer on data analysis- SPSS. Healthcare domain
for insurance business: Similar to the one on this website - [login to view URL]
We have a need to create an App for a dry-cleaning service that will primarily service the Metro New York City area. The App will be for the purpose of scheduling appointments to have laundry and dry cleaning picked up and dropped off. We seek proposals and relative prices for the development of this App.
QE&D is a ISO certified and a CPD Accredited training company. We offer courses like Transaction Quality, Six Sigma Green belt and Six Sigma Black belt certifications with accredited cetificates. We need sourcing agents that can sell our courses to students or anyone interested in doing thee courses. Sourcing agents should target and convert a lead to enrol for any of the 3 courses (Transact...
Need to know the following topics for this project : (a) An XML bomb. (b) BlueSmack. (c) Mydoom. (d) Torpig. (e) Hashing and more