Sort by
Refine Your Search
-
documentation Understanding of HTTP, HTTPS, IPV4, POE, DNS, DHCP, WINS and TCP/IP Ability to work independently in a team environment with minimal supervision Ability to follow escalation procedure within IT
-
University of California, Los Angeles | Los Angeles, California | United States | about 11 hours ago
365, Office 2016, Office 2019, Outlook, Exchange, and Outlook Web Access Understanding of project plans, presentations, procedures, diagrams and other technical documentation Understanding of HTTP
-
in social media, encrypted messaging, artificial intelligence, and online gaming. The Center has published in-depth research reports on these issues and has used these reports as the basis
-
, to preserve video confidentiality, we plan to study the encryption or obfuscation of variables in the latent space, after quantization but before the entropy coder. In this context, the PhD candidate will
-
, including supervisory experience. Preferred Experience Experience with various computer operating systems, third party applications, network protocols, encryption reporting applications, mobile devices and
-
implementing and maintaining endpoint security solutions. Assists in the management of endpoint protection, encryption, and compliance for university-managed Windows and macOS devices in accordance with
-
in the area of IT Service Support, including supervisory experience. Preferred Experience Experience with various computer operating systems, third party applications, network protocols, encryption
-
projects and a joint doctoral training program. Subject The Special Scientist - PhD position DC5 focuses on developing provably robust coding and encryption approaches for securing real-time control systems
-
: • Operating Systems support in a network environment, including VLANs, network interface configuration, and various internet protocols (e.g. TCP/IP, UDP, ICMP, DNS, HTTPS, SMTP, NTP); • File systems
-
of concurrent players, Load balancing, auto-scaling, and server instance management. Expertise in securing a multiplayer game network system. Knowledge of encryption techniques to ensure data in transit remains