Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
fiber optics, SFPs, and storage networking protocols. Familiarity with IT service management and operational frameworks, including working with ITIL‑aligned ITSM/ITOM tools, preferably within
-
obtained from patients participating in clinical oncology trials. This position requires comprehending and following protocols and laboratory manuals for a large number of clinical studies with a high
-
. Certifications: Relevant certifications such as CCNA, CCNP, ITIL, or equivalent are preferred. Technical Skills: Strong knowledge of network protocols, hardware, and software (e.g., routers, switches, firewalls
-
but not limited to: o Quantum error correction, fault tolerance, and resource optimization. o Entanglement dynamics, quantum control protocols, and hybrid quantum-classical algorithms. o Modeling and
-
, including supervisory experience. Preferred Experience Experience with various computer operating systems, third party applications, network protocols, encryption reporting applications, mobile devices and
-
… Requirements Research FieldComputer science » InformaticsEducation LevelPhD or equivalent Skills/Qualifications ✔️ You possess advanced skills in network protocols and cybersecurity. ✔️ You have experience with
-
Network HORIZON-MSCA-2024-DN-01 on Wind farm control and integration in sector-coupled power systems (WindConnect). This doctoral position is part of WindConnect ("Wind farm control and integration in
-
web protocols usch as HTTP and SSL/TLS. Strong understanding of Infrastructure as Code, automation, and configuration management principles. Strong analytical and problem solving skills. Experience
-
Prevention Research Center (PRC). The Project Manager A will work on the UPenn PRC and the UPenn PRC's Cancer Prevention and Control Research Network (CPCRN) Collaborating Center research project and network
-
in the area of IT Service Support, including supervisory experience. Preferred Experience Experience with various computer operating systems, third party applications, network protocols, encryption