Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
nodes in coordination with ARC system administrators and DCE staff. Diagnose, troubleshoot and assist with component-level hardware repair or replacement of failed nodes or subsystems. Manage unracking
-
Notification: Pursuant to the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, the Annual Security Report (ASR) is also now available for viewing at https://www.sjsu.edu/clery
-
. This includes installation, configuration, and support of all hardware and software related to Microsoft Windows Server, MS SQL Server, Epic Clarity Databases, Epic Caboodle Databases, SlicerDicer, Cubes, Epic
-
Library. Additional Department Summary: Serves as the night facility coordinator for Rodgers Library. Assists with desk coverage in Bruno and Gorgas libraries as needed. Secures the buildings at closing
-
procedures and monitor compliance with university fiscal, academic, and human resources policies and procedures. Participate in the development, implementation, and maintenance of computer hardware and
-
replace hardware in bathroom stalls. Minimum Education and Experience High School diploma or GED and a 1 year experience in job related repair work. Must have a valid Texas driver’s license with
-
research landscape, data is increasingly recognized as a strategic asset. However, its value depends on the ability to securely reuse data and perform analyses across organizational and disciplinary
-
space ambitions, delivering tangible, measurable and long-term impact for future missions. You are encouraged to visit the ESA website: http://www.esa.int Field(s) of activity/research for the traineeship
-
College, Kodiak High School Extension, Matanuska-Susitna College, Prince William Sound College, and Prince William Sound College - Cordova Extension) Online: https://www.uaa.alaska.edu/students/safety
-
technology meet regulatory requirements of accrediting agencies, affiliated hospital systems, and the University of Colorado including security of software and hardware systems. · Apply data standards