Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
- Medical Sciences
- Computer Science
- Economics
- Engineering
- Biology
- Business
- Science
- Materials Science
- Mathematics
- Psychology
- Education
- Electrical Engineering
- Environment
- Sports and Recreation
- Chemistry
- Arts and Literature
- Humanities
- Law
- Social Sciences
- Philosophy
- Earth Sciences
- Physics
- 12 more »
- « less
-
-based file sharing, videoconferencing, calendaring, Wikis, virtualization technologies, cloud-based data analytics, network activation, and print services. Support on-premises infrastructure in support of
-
-based file sharing, videoconferencing, calendaring, Wikis, virtualization technologies, cloud-based data analytics, network activation, and print services. Support on-premises infrastructure in support of
-
Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description The recruited person will be responsible for developing a protocol to detect
-
California State University San Marcos | San Marcos, California | United States | about 21 hours ago
layer conflicts with campus voice/data network systems and the protocols they use. Position Summary Network and Communications Analyst II This is a full-time, exempt position, which will lead toward
-
, firewalls, Voice over Internet Protocol (VoIP), and/or wireless and wired access layers. Participates in a team responsible for optimal network performance in a 24/7 environment. Knowledge of Extreme Networks
-
, firewalls, Voice over Internet Protocol (VoIP), and/or wireless and wired access layers. Participates in a team responsible for optimal network performance in a 24/7 environment. Knowledge of Extreme
-
field. Strong background in network security and privacy, particularly in communication protocols and distributed networked services. Demonstrated expertise in software development and programming
-
. Establish and use protocols to monitor network systems for availability, error conditions, space allocation, backup integrity, and performance. Perform root-cause analysis of problems, poor performance, and
-
, optimizing complexity to scale with network demands. ● c) Optimizing key reconciliation protocols: Efforts will focus on maximizing throughput and minimizing key discard rates by fine-tuning reconciliation
-
optimize advanced network protocols, including IPv6, BGP, and OSPF. Cybersecurity and Compliance Deploy and manage zero-trust network architectures to protect sensitive data and ensure compliance with