Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
-clinical networks. The work will directly impact patient safety and digital resilience in some of the most vulnerable healthcare settings. If successful, your engineering will revolutionize the healthcare
-
for this Academic Year position). Status Full-time, Permanent, Academic Year Department Information Department Dean Nursing Contact(s) Please note: Job applications must be submitted directly online only at: (https
-
that supports innovation in laboratory imaging systems. Be Bold. What You’ll Do: - Develop software control and user interfaces for custom laboratory imaging devices. - Utilize Python, C++, hardware
-
equipment and supplies Manages the use of inventory by internal and external clients Services existing equipment and oversees equipment evaluations, hardware/software as it pertains to exhibitions, events
-
. For information about the Institute for Simulation and Training and the Orlando area, see http://www.ist.ucf.edu . We are seeking an Assistant In Embedded Training Researcher/Software Engineer with expertise in
-
, skills, and abilities). License/Certification: Valid Ohio driver's license with safe driving record. Knowledge Of: HVAC systems Energy management principles Networking principles Computer hardware and
-
://www.hopkinsmedicine.org/coronavirus/covid-19-vaccine/ and all other JHU applicants should visit https://covidinfo.jhu.edu/health-safety/covid-vaccination-information/ . The following additional vaccine requirements may
-
Please visit our Human Resources (HR) website at https://hr.utexas.edu/ to learn more about the total benefits offered when you join our team! Purpose The Technical Support Specialist position is one
-
: • Planning requirements and procuring and managing hardware and software. • Installing, configuring, and maintaining hardware and software equipment. • Managing and maintaining IP addresses and the IP
-
objectives. Systems administration responsibilities include: Review, implement, and maintain security standards for client workstations, peripherals, and servers. Conduct and verify successful hardware and