Informatica mdm işler
...an existing, valid in-house (enterprise) certificate. What I need from you • The .p12 file for an Apple enterprise certificate (with its password) • A distribution provisioning profile that allows installation of my single app or a wildcard profile, whichever you prefer How I will use it I will sign the IPA in Xcode/Fastlane and host it for over-the-air installation through our internal MDM. No App Store submission is involved. Minimum requirements • Certificate must be issued by Apple’s Enterprise Program and remain active for at least twelve months. • Provisioning profile must install on any corporate device running the current iOS version. • I will verify by installing the signed build on several test devices before releasing pay...
Ho bisogno di un supporto strategico per avviare una raccolta pre-seed nel settore deep tech e informatica. L’obiettivo principale è mettere in luce la forte componente di innovazione e tecnologia della startup e ottenere presentazioni mirate a venture capitalist e angel investor in linea con questo focus. Mi occorre: • Creazione da zero di un pitch deck chiaro e convincente, completo di problema, soluzione, vantaggio tecnologico, modello di business, go-to-market e metriche chiave. • Ottimizzazione del messaggio per evidenziare l’innovazione e l’impatto di mercato. • Identificazione di VC e angel europei o internazionali specializzati in deep tech. • Introduzioni calde o organizzazione di call con gli investitori selezionati. P...
Estoy por arrancar una migración con Informatica PowerCenter y necesito apoyo directo en la construcción de los procesos ETL. El conjunto de datos con el que trabajaremos está en Oracle y lo extraeremos desde una base de datos SQL; el objetivo es una migración limpia, controlada y auditable hacia el nuevo esquema. Qué espero de ti • Diseñar y desarrollar mappings, sesiones y workflows en PowerCenter que cubran todo el flujo de extracción, transformación y carga. • Incluir manejo de errores, validaciones de calidad y registro detallado de eventos. • Documentar cada mapping en el repositorio y entregar un pequeño manual de despliegue/rollback. Aceptaremos el trabajo cuando: - Todos los procesos s...
...has provided final answers only, with no clear working shown. I require complete, step-by-step worked solutions that clearly explain the reasoning and methodology so I can use them as a study and revision guide. Key Topics Covered 1. Flexibility Method (Force Method) • Degree of static indeterminacy • Clear identification and justification of redundant forces 2. Moment Distribution Method (MDM) • Full moment distribution table • Stiffness factors (K) • Distribution factors (DF) • Carry-over moments 3. Plastic Analysis • Collapse mechanism diagrams • Calculation of plastic moment capacity (Mₚ) and/or load factor 4. Asymmetric Bending • Calculation of principal axes • Orientation of the neutral axis 5. Materials Scie...
...scripts/workflow so another operator can step in without downtime. Acceptance criteria 1. At least 95 % of accounts remain unflagged after a seven-day stress test. 2. Target volume of likes/comments per account achieved with <5 % action errors. 3. Data exports arrive on schedule and match TikTok back-end numbers within a 2 % margin. If you already have experience juggling large fleets with ADB, MDM suites, or custom Python/Node automation, let’s talk; I’m ready to move quickly....
...JumpCloud. Because no formal SOPs exist yet, the first milestone is to document a lightweight but complete runbook that covers onboarding, off-boarding, patch cadence, escalation paths, and routine health checks. Once that foundation is in place, the work shifts to ongoing weekly maintenance, ad-hoc support, and quarterly reviews of the security posture. Tooling JumpCloud Admin Portal, built-in MDM/patch features, plus any complementary scripting (PowerShell, Bash) you find useful. Git or a shared drive can hold the living documentation. Acceptance criteria 1. Runbook delivered in shareable format and agreed upon. 2. All current PCs report 100 % policy compliance and up-to-date software within the first two weeks. 3. A clear change log maintained for every account or...
...confirmations with Apple MDM workflows so a newly sold device is instantly and automatically unlocked for the customer. Scope – Design the end-to-end automation using n8n or another self-hostable low-/no-code platform of your choice (no SaaS lock-in). – Implement the API logic: listen to Stripe webhooks from the POS, validate payment, then hit the Apple MDM/DEP/ABM endpoints to push the “fully unlock device” command - you can suggest MDM provider if you have past experience. – Ensure the flow is scalable and easy to extend later to SumUp or other payment providers. – Deliver concise technical documentation covering install, environment variables, key nodes, and how to add future triggers. What I’m bringing &b...
...privacy-preserving transformations so that multiple parties can collaborate on sensitive datasets without risk. What I expect from you is a focused, hands-on transfer of know-how rather than a generic primer. Walk me through real-world patterns, preferred storage layers, and the way you wire up connectors and workflow engines. If you have battle-tested approaches using platforms such as Apache NiFi, Talend, Informatica—or any equivalent stack—please weave those in, but feel free to recommend superior alternatives if they serve the clean-room model better. Deliverables • 3–4 live or recorded sessions (screen-share) illustrating architecture, pipeline setup, and governance checkpoints • A concise reference document summarising the clean-room componen...
Project Description We need a person to work on ETL development, Informatica IDMC) Work Type Full-time or Part-time 3–5 days per week Around 4 hours per day Remote work Required Skills Informatica PowerCenter & IDMC ETL development SQL Payment Payment based on work More pay if performance is very good
Project Title Data Integration & Visualization Specialist Project Description We need a person to work on ETL development, Informatica IDMC) Work Type Full-time or Part-time 3–5 days per week Around 4 hours per day Remote work Required Skills Informatica PowerCenter & IDMC ETL development SQL Payment Payment based on work More pay if performance is very good
...iPhones should be able to dial or message it either. I’m open to whatever approach you believe is most reliable—an MDM configuration profile created with Apple Configurator or Jamf, a carrier-level restriction, or another verifiable method—so long as it stays in place and can be rolled out to each handset without physically collecting them. Deliverables • A working solution that blocks the target number for calls and messages on every device involved • Step-by-step deployment instructions (plus any configuration profiles or scripts) so I can repeat the process on new iPhones • A quick test plan we can run together to confirm the block is airtight Experience with Apple’s MDM framework, Apple Configurator, Jamf, or equivalen...
Project Title: Data Integration & Visualization Specialist for ETL, IDMC, Informatica & Qlik Project Description: We are seeking an experienced Data Integration & Visualization Specialist for a project involving ETL development, Informatica, IDMC, and Qlik. The goal of the project is to design, implement, and maintain data pipelines and dashboards for seamless data processing and reporting. Responsibilities: Design and develop ETL pipelines for data extraction, transformation, and loading. Work with Informatica PowerCenter and IDMC to manage and optimize data workflows. Develop and maintain Qlik dashboards and reports for data visualization. Ensure data quality, accuracy, and consistency across systems. Collaborate with project stakeholders to meet r...
I need help fully removing a Mobile Device Management (MDM) profile from my Android handset that is still operational and in daily use. I suspect the profile is giving someone unauthorized access, so the job isn’t just about clearing a configuration—my goal is to regain complete control and ensure there are no lingering admin privileges or hidden backdoors afterward. The ideal approach will: • Safely disable and delete the existing MDM profile without triggering a factory reset (unless absolutely necessary). • Verify that all device-admin, work-profile, or enterprise-enrollment remnants are gone. • Provide a concise list of any follow-up steps I should take (patches, settings, or security apps) to keep the phone clean. Please outline the met...
...an existing, valid in-house (enterprise) certificate. What I need from you • The .p12 file for an Apple enterprise certificate (with its password) • A distribution provisioning profile that allows installation of my single app or a wildcard profile, whichever you prefer How I will use it I will sign the IPA in Xcode/Fastlane and host it for over-the-air installation through our internal MDM. No App Store submission is involved. Minimum requirements • Certificate must be issued by Apple’s Enterprise Program and remain active for at least twelve months. • Provisioning profile must install on any corporate device running the current iOS version. • I will verify by installing the signed build on several test devices before releasing pay...
...Access Control Configure company-managed user identities (Microsoft Entra ID / Azure AD or equivalent). Enforce: Multi-Factor Authentication (MFA) Strong password policies Account lockout and session controls Ensure only compliant, managed devices can access company email, files, and repositories. Prevent adding personal email or cloud accounts to company devices or browsers. 2️⃣ Device Management (MDM) Enrol all 3 Windows laptops into a central device-management platform (preferably Microsoft Intune or equivalent). Enforce: Full disk encryption (BitLocker) Screen lock and inactivity timeout OS and security updates Baseline security configuration policies Enable remote lock and remote wipe for lost or off-boarded devices. 3️⃣ Endpoint Security Deploy and configure enterpris...
I need to raise our overall security posture before a forthcoming SOC 2 audit and the fastest way there is to tighten every endpoint. Our fleet is an even split of MacBooks and Windows laptops, all licensed for Microsoft 365 Business Premium. Intune is switched on but only lightly configured—my goal is to make it the single source of truth for MDM, with full macOS support, rock-solid Windows policies, and seamless Defender integration. Alongside the Microsoft stack we already use NinjaRMM for monitoring and HaloPSA for ticketing, so any solution has to fit neatly into that workflow. A background in an MSP environment will help you understand the operational pressure and documentation detail I expect. Key outcomes I’m after: • A SOC 2-aligned hardening baseline a...
...confirmed. The core workflow is straightforward: the user registers a repayment schedule, the app monitors due dates, sends an email reminder ahead of each one, and—if no payment confirmation is received—activates a lock screen that limits access to non-essential apps until the account is up-to-date. Key behaviour I need implemented: • Lock phone on missed payments – preferably by leveraging Apple MDM / DeviceManagement or the Guided Access API so the solution stays within Apple’s security guidelines (no jailbreak work-arounds). • Email payment reminders – configurable lead time (e.g., 1 day, 3 days). • Usage reports – daily and monthly CSV or PDF summarising lock events, total restricted hours, and reminder history. ...
I need a full-scale Android EMM/MDM platform built from scratch with device security as its core mission. The solution must let an administrator enrol phones and tablets, push policies instantly, and—most critically—perform a remote wipe the moment a device is lost or compromised. Continuous, real-time threat detection has to run quietly in the background, reporting anomalies to a central console and triggering automated counter-measures without user intervention. Authentication starts simple: every managed device must, at minimum, enforce a Password or PIN at the lock screen and for any privileged action inside the agent app. Keep the design flexible so we can layer other factors later if we choose. Back-end and dashboard • Cloud-hosted (I’m open on stack...
Boot directly into kiosk app Android TV WINDOWS (Enterprise-grade) MDM Authority (Intune-style) Azure AD / Local AD binding Auto-enroll on first boot Lockdown BitLocker (TPM required) Secure Boot enforced BIOS/UEFI password Boot from USB disabled 3. User Restriction Remove local admin rights Disable CMD, PowerShell, Registry Disable Windows Recovery reset Block safe mode access 4. Remote Control Remote lock Remote wipe Device compliance check Tamper alert All Platform neded Server Side Policy engine (JSON-based) Command queue (offline supported) Certificate lifecycle management Device heartbeat & integrity report Security Mutual TLS Certificate pinning No hardcoded secrets API rate limiting MUST Device Owner / Supervised Factory Reset Block
...hardening and security baseline User separation and permission model Secure RDP configuration Firewall and network isolation Controlled Internet access (Owner only) Toolchain installation Logging and audit configuration LAN-only file transfer for Owner Documentation and acceptance testing Final handover and verification Excluded (unless explicitly agreed) Software licenses Enterprise DLP solutions MDM / Intune Source code migration Ongoing maintenance after delivery 3. Architecture (Required) Recommended Architecture (Preferred) VPN + RDP (no public RDP exposure) VM does NOT expose RDP to the Internet Access is allowed only through: VPN (WireGuard / OpenVPN / IPsec), or Bastion / jump host RDP listens only on internal/VPN interface This is the preferred and expected solution. Al...
...pause/stop/delete) Background operation (silent & invisible) Secure upload to server Centralized admin access Scalable for 100s–1000s of users Legally compliant & auditable 3. System Architecture (High Level) Android Device ├─ Call Listener (Telephony API) ├─ Call Recording Service (Foreground + Background) ├─ Local Encrypted Storage (Temporary) ├─ Auto Upload Service └─ Device Lockdown (MDM / Admin) ↓ HTTPS (TLS) Cloud / On-Prem Server ├─ REST API (Auth + Upload) ├─ Audio Storage (Encrypted) ├─ Database (Metadata) ├─ Admin Web Dashboard └─ AI Processing (Optional) 4. Android Application – Detailed Scope 4.1 Call Recording Functionality Recording Mode Records both incoming and outgoing calls Starts automatically when call...
...Palette opens for any action across PC. Deliverables MVP (8–10 weeks) Global hooks, context detection, overlay, and Command Palette. Support for Chrome, Edge, Slack, WhatsApp Desktop, File Explorer, Teams, and basic Office apps. Pro version (additional 8–12 weeks) Gamified learning, user analytics, team dashboards, and cloud sync. Enterprise (optional future phase) Centralized deployment (MDM/Intune), telemetry control, advanced automation recipes. Ideal Candidate Deep Windows development experience (C++/Rust/Win32/UIA) Experience with overlay or input‑hook based applications Familiar with Electron app integrations (Slack, WhatsApp) Knowledge of browser extension APIs (Chrome, Edge) Experience shipping performance‑sensitive desktop apps Application Inst...
This proposal covers a fixed-price Bitrix24 implementation delivered as a two-phase project. The objective is to implement Bitrix24 as a central platform for multiple legally independent...preparation • GDPR-compliant configuration and ERP data migration • Architecture prepared for multi-company and on-premise use • Technical documentation PHASE 2 – MULTI-COMPANY ROLLOUT • Rollout to 4–5 legally independent companies/branches • Data separation, pipelines and permissions • Extension of warehouse structures • Optional Bitrix24 On-Premise setup (EU server) • Integration preparation (PIM/MDM, n8n, AI, e-invoicing) • Validation and updated documentation The project is delivered via two fixed-price milestones. Optional support an...
...confirmed. The core workflow is straightforward: the user registers a repayment schedule, the app monitors due dates, sends an email reminder ahead of each one, and—if no payment confirmation is received—activates a lock screen that limits access to non-essential apps until the account is up-to-date. Key behaviour I need implemented: • Lock phone on missed payments – preferably by leveraging Apple MDM / DeviceManagement or the Guided Access API so the solution stays within Apple’s security guidelines (no jailbreak work-arounds). • Email payment reminders – configurable lead time (e.g., 1 day, 3 days). • Usage reports – daily and monthly CSV or PDF summarising lock events, total restricted hours, and reminder history. ...
...upgrades, or enhancements. Ensure high levels of system availability, performance, and security. Required Skills & Experience Technical Expertise Deep knowledge of Salesforce platform (Sales, Service, Marketing, Experience Clouds) and development. Strong understanding of Apex, Lightning Web Components, SOQL/SOSL, and Salesforce APIs. Experience with integration platforms (MuleSoft, Informatica, Dell Boomi, etc.). Architecture & Design Proven track record in designing large-scale, complex Salesforce solutions. Familiarity with enterprise architecture principles and frameworks. Knowledge of data modeling, security architecture, and performance optimization. Leadership & Communication Strong ability to engage with executives, business users, and technical teams. Excell...
...verifies the code before opening the main dashboard. No email or social logins are required. I will provide: • Database credentials and table structure • Access to our SMS gateway for OTP delivery • UI wireframes showing the three main screens (login, task list, task detail) You will deliver: • Full Android Studio project (Java or Kotlin) • Signed APK plus install guide for our in-house MDM • Brief setup notes explaining how the connection string, OTP endpoint and any required ports are configured Acceptance criteria 1. Successful connection to the local SQL Server when the device is inside our LAN. 2. Tasks can be created, edited, filtered by status and synced instantly. 3. OTP flow completes in under 15 seconds, locking the use...
...multi-company structure for at least three independent companies/branches within one Bitrix24 instance (separate pipelines, data separation, permissions), and, depending on your expertise: either set up a new Bitrix24 On-Premise installation in the EU and migrate structures/data from Phase 1, or gradually migrate the existing cloud setup to On-Premise, optionally add further integrations, such as: MDM / product data system (e.g. Pimcore or similar), automation with n8n, AI-based workflows (text, translation, summarization), e-invoicing (e.g. ZUGFeRD, X Invoice) as far as feasible with Bitrix24 and add-on tools. The overall project explicitly includes both phases; implementation and billing can be split into two stages if needed, without re-negotiating the base contract. ...
I'm looking for an expert to set up Microsoft 365 Intune for Mobile Device Management (MDM) across various devices, including Windows PCs, iOS devices, Android devices, Apple PCs, and printers. Key Requirements: - Configure MDM in Intune for the specified devices. - Implement security policies to protect company data. - Ensure seamless device enrollment and management. - Provide documentation for ongoing management. Ideal Skills and Experience: - Proven experience with Microsoft 365 Intune. - Strong knowledge of MDM and security policies. - Experience with a variety of device types and operating systems. - Good documentation skills
...content and user data fully internal, I need the app distributed privately with Apple-approved in-house certificates rather than through the public App Store. Here’s what I’m after: • Guidance (or full setup) of an Apple Developer Enterprise Program account, including certificate and provisioning profile creation. • A signed IPA that my employees can install over the air or through a preferred MDM solution—whatever keeps the install process smooth and secure. • Clear, step-by-step documentation so we can renew certificates, push future builds, and add or retire devices without outside help. • A quick hand-off session to confirm everyone can install the build successfully on their iPhones and iPads. If you have already handled priv...
I have a brand-new Samsung S25 FE that was financed through my Bajaj EMI Card. During setup I discovered Bajaj’s Mobile Device Management (MDM) profile is pre-installed and actively blocks features such as Dual Messenger. I need detailed, fool-proof instructions to eliminate this MDM so the phone runs as a normal retail device without alerting Bajaj Fintech. Preferred approach – A complete, step-by-step guide I can follow myself. – No remote access sessions; everything must be executed locally on the handset or via my own PC. Key points to address • Proven method for fully removing or permanently disabling the MDM profile, concealing any traces that would flag a compliance check. • Compatibility with the S25 FE’s current An...
...remotely carry out—the complete unlock, factory reset, and fresh configuration of both units, then sideload and activate the Google Play Store so I can sign in with a new account. I’m open-minded about loading extra apps later, but for now the priority is simply getting each device clean and Play-ready. Because I have no credentials for the existing account, your solution must bypass or remove the FRP/MDM lock without compromising future OTA updates. Once finished, the devices should boot straight to a standard Android home screen, show Play Store in the app drawer, and pass basic Play Protect checks. Deliverables • Both devices operational, free of previous locks, and logged out of any old Google IDs • Google Play Store installed and working on each uni...
...implementations. We now need an additional senior engineer who will work closely with our lead developer and implement the low-level system components for the remaining platforms: Android: VpnService/TUN integration, tun2proxy pipeline, system networking APIs, DNS handling, per-app routing, performance optimization iOS: Network Extension (NEPacketTunnel and NEAppProxy), Per-App VPN, DNS proxying, Keychain and MDM integration Linux: iptables, nftables, TPROXY, eBPF or TC integration, per-user routing, Netlink communication, systemd services, packaging This requires a developer with real platform expertise so that the implementations reach a stable and professional level comparable to Proxifier. Why one senior developer (or a very small specialist team) is ideal for all three platf...
1. Project Overview The EMI Mobile Locker & Device Protection System is a cross-platform (Android + iOS) security application designed for Retail Mobile Shop Owners who provide smartphones on EMI. The system gives sellers the ability to remotely lock, track, restrict, and monitor buyer devices until EMI payments are completed. The solution functions similar to an MDM/DPC (Device Policy Controller) system with remote control features, tamper protection, and real-time monitoring, ensuring devices cannot be misused or reset until payments are cleared. The complete system includes: Android & iOS Buyer App Central Admin Web Dashboard Backend API, Authentication & Cloud Services The app uses Phone Number + OTP login, ensuring secure and smooth onboarding for buyers. 2....
1. Project Overview The EMI Mobile Locker & Device Protection System is a cross-platform (Android + iOS) security application designed for Retail Mobile Shop Owners who provide smartphones on EMI. The system gives sellers the ability to remotely lock, track, restrict, and monitor buyer devices until EMI payments are completed. The solution functions similar to an MDM/DPC (Device Policy Controller) system with remote control features, tamper protection, and real-time monitoring, ensuring devices cannot be misused or reset until payments are cleared. The complete system includes: Android & iOS Buyer App Central Admin Web Dashboard Backend API, Authentication & Cloud Services The app uses Phone Number + OTP login, ensuring secure and smooth onboarding for buyers. 2....
1. Project Overview The EMI Mobile Locker & Device Protection System is a cross-platform (Android + iOS) security application designed for Retail Mobile Shop Owners who provide smartphones on EMI. The system gives sellers the ability to remotely lock, track, restrict, and monitor buyer devices until EMI payments are completed. The solution functions similar to an MDM/DPC (Device Policy Controller) system with remote control features, tamper protection, and real-time monitoring, ensuring devices cannot be misused or reset until payments are cleared. The complete system includes: Android & iOS Buyer App Central Admin Web Dashboard Backend API, Authentication & Cloud Services The app uses Phone Number + OTP login, ensuring secure and smooth onboarding for buyers. 2....
Busco redactores de artículos especializados en B2B para el sector de tecnología y conectividad. Los artículos son para un blog y deben tener entre 500 y 1000 palabra...redacción de contenido B2B - Conocimiento profundo de tecnología empresarial y soluciones de conectividad - Habilidades de investigación y redacción excepcionales - Capacidad para cumplir con plazos estrictos Temas * Conectividad Avanzada, Internet Empresa, 5G * Business Intelligence / Geodata / Indicadores móviles * Mobile Marketing * Gestión Vehicular GVT * Gestión de Fuerza en Campo * Seguridad – MDM, Lookout, Secure Mobile, Norton * Servicios Cloud – Microsoft 365, Google Workspace, Hosting * Comunicación empresarial &ndash...
I have a fresh Ubuntu VPS with WireGuard already running and tested. Next step is to stand up an open-source MDM so I can push a WireGuard VPN profile and manage installed apps on enrolled phones and tablets. Here’s the workflow I have in mind: • Install and fully configure a production-ready open-source MDM (Flyve-MDM, SOTI alternatives, or any other GPL-friendly stack you are comfortable with) on the server. • Enable application management: I need to be able to silently push, update, or remove APK/IPA packages from a web console. • Build an MDM configuration profile that delivers the existing WireGuard settings to Android and iOS devices on first enrollment, so users connect through the tunnel automatically. • Hand over a conc...
1. Project Overview The EMI Mobile Locker & Device Protection System is a cross-platform (Android + iOS) security application designed for Retail Mobile Shop Owners who provide smartphones on EMI. The system gives sellers the ability to remotely lock, track, restrict, and monitor buyer devices until EMI payments are completed. The solution functions similar to an MDM/DPC (Device Policy Controller) system with remote control features, tamper protection, and real-time monitoring, ensuring devices cannot be misused or reset until payments are cleared. The complete system includes: Android & iOS Buyer App Central Admin Web Dashboard Backend API, Authentication & Cloud Services The app uses Phone Number + OTP login, ensuring secure and smooth onboarding for buyers. 2....
...Pools = grouped proxies with costs, limits, and health metrics. Automatic switching based on: Ban rate, volume limit, latency degradation Fallback pools Optional AI-assisted rule/pool editing and natural language commands 8. Enterprise Features Central management: organizations, users, roles (Owner, Team Lead, Member) Permission-based pool access Admin panel for pools, teams, usage Managed mode via MDM/Intune config files Silent install Platform-specific binaries only 9. Licensing, Security, Authentication Central license server with plans, usage limits, device binding Login + 2FA Encrypted communication, token-based API Local SQLite DB for proxies, rules, logs, settings Optional “send logs / contact support” feature 10. Platform Integration Windows: WFP driver for pe...
1. Project Overview The EMI Mobile Locker & Device Protection System is a cross-platform (Android + iOS) security application designed for Retail Mobile Shop Owners who provide smartphones on EMI. The system gives sellers the ability to remotely lock, track, restrict, and monitor buyer devices until EMI payments are completed. The solution functions similar to an MDM/DPC (Device Policy Controller) system with remote control features, tamper protection, and real-time monitoring, ensuring devices cannot be misused or reset until payments are cleared. The complete system includes: Android & iOS Buyer App Central Admin Web Dashboard Backend API, Authentication & Cloud Services The app uses Phone Number + OTP login, ensuring secure and smooth onboarding for buyers. 2....
I want to build a production-ready Android Enterprise Mobility Management / Mobile Device Management platform that lets administrators enroll devices, push policies and apps, and view real-time status through a secure web console. The scope covers two main components: • An on-device agent (Android 10+) that handles enrollment, applies Device Policy Manager rules, and communicates with the backend via FCM or a comparable messaging channel. • A cloud-hosted admin dashboard where policies, apps, and compliance settings are created and synced to enrolled devices. Role-based access, audit logs, and API endpoints for future integrations must be included.
...Governance operating model and stewardship (roles, RACI, workflows) • Policy set, standards, procedures, and evidence templates required for DMO establishment • Compliance mapping to official NDMO controls Required outputs: 1. Full gap assessment mapped control-by-control against NDMO requirements. 2. Complete policy and standards pack (data quality, privacy/security, classification, metadata, MDM). 3. Governance operating model with stewardship roles, RACI, and escalation flows. 4. Evidence pack containing sample filled templates, control records, classification examples, data-quality examples, and compliance proofs. 5. All artefacts must be audit-ready and aligned to how DMO programmes are executed in KSA. 6. Only respond if you have previously delivered DMO co...
1. Project Overview The EMI Mobile Locker & Device Protection System is a cross-platform (Android + iOS) security application designed for Retail Mobile Shop Owners who provide smartphones on EMI. The system gives sellers the ability to remotely lock, track, restrict, and monitor buyer devices until EMI payments are completed. The solution functions similar to an MDM/DPC (Device Policy Controller) system with remote control features, tamper protection, and real-time monitoring, ensuring devices cannot be misused or reset until payments are cleared. The complete system includes: Android & iOS Buyer App Central Admin Web Dashboard Backend API, Authentication & Cloud Services The app uses Phone Number + OTP login, ensuring secure and smooth onboarding for buyers. 2....
I n...Use proven stacks—Kotlin/Java with Firebase, or Flutter/React Native backed by Node/Express and Firestore/MySQL. GPS, FCM, Device Administrator / MDM APIs are a must for the remote-control features. Any AI layer can hook into Dialogflow or similar; keep it modular so future models swap in easily. Acceptance criteria 1. APK installs on Android 10+ without manual permissions hacks 2. All listed features demoed end-to-end on at least two test devices 3. Admin actions (lock, unlock, reset) execute within 10 seconds 90% of the time 4. Source code, build instructions and basic unit tests handed over on final milestone If you’ve built fintech, MDM or security apps before, you’ll ramp up fast. Let me know the stack you propose and any comparable proj...
...Governance operating model and stewardship (roles, RACI, workflows) • Policy set, standards, procedures, and evidence templates required for DMO establishment • Compliance mapping to official NDMO controls Required outputs: 1. Full gap assessment mapped control-by-control against NDMO requirements. 2. Complete policy and standards pack (data quality, privacy/security, classification, metadata, MDM). 3. Governance operating model with stewardship roles, RACI, and escalation flows. 4. Evidence pack containing sample filled templates, control records, classification examples, data-quality examples, and compliance proofs. 5. All artefacts must be audit-ready and aligned to how DMO programmes are executed in KSA. 6. Only respond if you have previously delivered DMO co...
...Open Source Project (AOSP) fork (Android 13 or later) • Secure boot, verified boot, encryption at rest • OTA update system for firmware and app layers • Custom launcher (Walki UI) — no app drawer, restricted settings • Whitelisted apps only, disabled Play Store and background data • Minimal Settings menu with Wi-Fi, Bluetooth, and volume only • Device management through parental control API or MDM layer Core Applications 1 Walki Voice Chat (Push-to-Talk): Real-time walkie-talkie messaging with voice replay, AI transcript summaries, and approved contact-only communication through parent portal authentication. 2 Voice / Video Call: Secure VoIP with three modes — push-to-talk, standard call, and video call — all encrypted and limi...
...others can be estimated later Core scope • Entra ID Plan 2 – set up Privileged Access Management with just-in-time elevation (PIM) and token protection policies so that high-value accounts stay locked down. • Microsoft Defender Plan 2 – onboard all Windows workstations and servers, plus Defender for Office 365 Plan 2 to cover email, SharePoint, OneDrive, and Teams. • Intune – create a single MDM/MAM framework that handles both company-owned and BYOD devices. This must include enrollment profiles, compliance baselines, Conditional Access, and PAM-aware admin workflows. • Data classification – deploy sensitivity labels, automatic and manual labeling rules, and the corresponding DLP policies. Cloud apps security for Microsoft and...
... Help design, build, and optimize ETL pipelines and data workflows. Troubleshoot and resolve performance or integration issues in real-time. Guide candidates through daily deliverables and project requirements. Ensure quality, accuracy, and timely completion of all assigned tasks. Technical Expertise Required: Strong proficiency in: Python, SQL, and Data Modeling. ETL Tools: Airflow, Informatica, AWS Glue, Azure Data Factory, or equivalent. Big Data Technologies: Spark, Hadoop, Hive. Cloud Platforms: AWS, Azure, or GCP (preferably Redshift, Snowflake, Databricks). Additional Skills: CI/CD pipelines, Git, data governance, performance optimization. Qualifications: Minimum 10+ years of experience in Data Engineering, ETL Development, or Data Pipeline Architecture. Stron...
...data pipelines, ETL processes, and data modeling. Optimize and maintain large-scale data systems and workflows. Support in performance tuning, debugging, and data migration activities. Offer guidance on data architecture, best practices, and real-time project execution. Technical Skills Required (any of the following): Programming: Python, SQL, PySpark ETL Tools: Apache Airflow, Talend, Informatica, or similar Cloud Platforms: AWS (Glue, Redshift, S3), Azure (Data Factory, Synapse), or GCP (BigQuery) Databases: PostgreSQL, Snowflake, MySQL, MongoDB Big Data Technologies: Hadoop, Spark, Databricks (preferred) Version Control / CI-CD: Git, Jenkins Ideal Candidate: Has 10+ years of experience in data engineering and related technologies. Strong in troubleshooting, archi...
...cybersecurity expert / fractional CISO / security engineer to architect and implement a modern, cost-efficient, low-friction security program using current best practices, preferably leveraging tools that are free/affordable for small teams (Apple Mac laptop PC’s /, GitHub, 1Password, Cloudflare, etc.). Scope of work (initial engagement): Device security & hardening for company laptops (disk encryption, MDM / remote wipe, OS security baselines, patch policy) Identity & access management (SSO where possible, enforce MFA, password manager rollout) Email security + phishing protection (DKIM / SPF / DMARC, anti-phishing rules, sandboxing / link scanning recommendations) GitHub / code security (branch protection rules, secret scanning, automated dependency scanning) Netw...