Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
and improve the trade-offs between high-performance (connected) and high-security (isolated) configurations? Resilience Limits: What severity of cyber-attack or hardware fault can a system tolerate
-
University of North Carolina at Charlotte | Charlotte, North Carolina | United States | about 14 hours ago
hardware for compliance with established baselines. Provide security best practices and advise on security-related matters. Minimum Education/Experience Bachelor’s degree in computer science, computer
-
ecosystem. You will apply your technical expertise to fast-paced, production and development environments housing thousands of servers and petabytes of storage. Join our team to support the design, security
-
electronic access components. This includes but is not limited to door hardware, automatic door operators, electronic locks, card readers, access control devices, and related security systems. The technician
-
device configuration and management, and the maintenance and troubleshooting of various hardware, software, and peripherals. The role requires knowledge of and proficiency in troubleshooting Windows, macOS
-
of UCS server hardware management ensuring robust and high-performing systems in the primary and colocation datacenters. Exchange Mail Systems: Manage Exchange email, mail routing, hygiene, and security
-
prototypes. You will work at the interface of AI and photonic-, semiconducting-, and superconducting quantum hardware. Your work will span across materials, sub-component, and system levels modelling to build
-
technology budget. Manage help desk staff and ensure proper resolution of daily technical issues. Monitor network capacity issues relating to planned area projects. Perform hardware/software needs analysis
-
Oversee software licensing compliance and renewal processes Coordinate hardware purchasing and vendor management activities Develop and maintain documentation for all IT processes and systems 4. Security
-
networking and related protocols. An understanding of desktop/laptop security tools and applications. The ability to keep abreast of new technologies including computer software and hardware, smart phones, and