Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Employer
- The Ohio State University
- Blackhawk Technical College
- Boston University
- Monash University
- University of California
- University of Texas at Austin
- Austin Community College District
- Emory University
- European Space Agency
- Fairleigh Dickinson University
- George Mason University
- King Abdullah University of Science and Technology
- Nature Careers
- SUNY University at Buffalo
- University of British Columbia
- University of California, Los Angeles
- University of Dayton
- University of Miami
- University of Michigan
- University of New England
- University of Southern California
- University of Sydney
- 12 more »
- « less
-
Field
-
to, endpoint encryption, Antivirus, Antimalware, EDR and threat detection and prevention that adheres to the University Cyber Security Policies. 4. Assists with the development and management of Microsoft
-
will design quantum-safe threshold encryption and/or authentication algorithms. The expected outcome is the design of methods, techniques and their software prototype to implement quantum-safe threshold
-
technology: Image and deploy computers used by Library staff, students and patrons. Updating inventory records to reflect changes in technology used in the library. Makes hardware and software recommendations
-
for the delivery and operational support of desktop imaging, application packaging and delivery, and management of endpoint devices. Services are delivered through tools such as Azure Virtual Desktop Infrastructure
-
environments (AWS, Azure) to support cancer research applications and data pipelines. Support data integration, management, and analysis for large genomic, clinical, and imaging datasets. Including data
-
maintain automation scripts (Bash, Python, AppleScript) for deployment and compliance. Monitor and enforce security settings such as FileVault encryption and antivirus policies. Provide Tier 2/3 support and
-
, encryption/decryption and compression; use of microelectronics devices (including COTS); implementation, inference, verification and validation of algorithms** on processing hardware platforms for space
-
standalone system networks. • Configuration Management: Assist with laptop and desktop computer system configuration management, including imaging, encrypting, and performing software and hardware updates
-
, augmented virtual reality, voice assistance, and medical diagnosis. This new paradigm is further accelerated by AI chips and ASICs embedded on mobile devices, e.g., Apple’s Bionic neural engine. Compared
-
, Biology and Mathematics, Humanoid Robotics, Cognitive Science, Mechnotronics, Advanced Manufacturing, Cyber security, Encryption and decryption, Petroleum and Petro-Chemical Engineering, Science of Climate