Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
California State University, Northridge | Northridge, California | United States | about 3 hours ago
offer. If this sounds like you, you’ve come to the right place. Learn more: https://www.csun.edu/about-csun . Major Duties Under general supervision, the Lecture Capture Coordinator provides consultation
-
/emerging computer hardware and software technologies, possess a deep understanding of software architectures and experience in turning such technologies into practical, state-of-the-art systems. A close
-
About Sandia: Sandia National Laboratories is the nation’s premier science and engineering lab for national security and technology innovation, with teams of specialists focused on cutting-edge work
-
- Participate in F&S wide projects such as platform migrations, or hardware modernization efforts. Evaluate tools, methods, and emerging technologies to enhance F&S ITS operations Maintain user guides and support
-
The UCLA Information Security team enables UCLA?s mission by providing leadership and expertise that assures the confidentiality, integrity, safeguarding, and availability of the university?s digital
-
mechanisms, and security devices. Installs, maintains, and repairs door hardware, weather stripping, kick plates, and various pneumatic closing fixtures. Disassembles locks and locking mechanisms to repair and
-
purchases comply with University procurement policy and budgetary constraints. 2. Coordinate and manage procurement of hardware, software, subscriptions, and technology-related services. Evaluate purchasing
-
high security facility, housing sensitive data, providing mission critical services and support life safety operations. Answer customer phone calls and emails in a professional manner. Receive and
-
, open call submissions processing, wall labels, signage, curation, and other tasks as assigned. 30% Art loans: Art About Agriculture artworks can be loaned out to secure, safe, and publicly accessible
-
to an unprecedented variety of hardware, software, and other resources, all relevant to cybersecurity and privacy research, connected by user-configurable network substrate, and protected by a set of security policies