Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
, and replacement of all types of locks and integrated security systems, access control devices, and other types of lock hardware such as latches, door checks, and panic bars, including changing of lock
-
undergraduate students take one or more courses at the department each year. You can find more information about us on the Department of Information Technology website . The doctoral student will join the Secure
-
a required course for Information Technology majors. Course description: INFO 1101- Computer Concepts and Technology introduces the concepts of computer hardware organization and operating systems. A
-
to exit detectors, CCTV cameras and other security systems related to hardware. Perform in field testing of the installed hardware and resolve hardware failures quickly and efficiently. Support systems
-
to provide hardware and software support as well as training for desktops, laptops, mobile devices, printers, AV equipment ,IOT devices, and a variety of other endpoints. The Client Services Support Specialist
-
will work at the intersection of operating systems, compilers, software security, and software-hardware co-design, developing new systems and toolchains with real-world impact. The research will focus
-
hardware preferred. Additional Posting Information: JMU’s Dual Career and Community Resources Program is available for candidates that will be relocating to the area. For more information, please visit https
-
) Working knowledge of Class A construction, UBC, OSHA, fire codes, construction procedures and ADA requirements (ADA/Fire hardware and installation). (Required) Working knowledge of standard safety practices
-
High School Diploma or GED required. 5 years of experience with commercial electronic access control security systems including auto door operators, access control systems, and electronic door hardware
-
, spike-based computation, and attention-inspired mechanisms can be combined to achieve accurate and timely predictions while explicitly considering hardware constraints, including latency, memory usage