My weakness jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    1,230 my weakness jobs found, pricing in USD

    ...the past 3 years. Part 7: Financial analysis conclusion: (one paragraph) Determine the strengths and weaknesses of the company based primarily on the trends in items discussed from the income statements, balance sheets, common size income statements, and common size balance sheets, as well as the comments on cash flow. Create a table that indicates whether each financial fact is a strength or a weakness. Determine the overall financial strength of the company based on the financial facts included as strengths or weaknesses. Categorize the overall financial performance of the company as strong, neutral, or weak. Justify your conclusion based on the table you created....

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    39 bids

    I am in search of a professional editor to assist me in editing my non-fiction book proposal. I've just completed a 99,000 word non-fiction manuscript on eliminating extreme poverty and inequality using the power of finance and charity, along with the book proposal of 23 pages (6117 words). My primary focus is more on enhancing the effectiveness/marketability of the proposal and less on overall structure and organization, grammar and punctuation, and proofreading. I'm starting to get feedback from my first batch of agents that I sent months ago. They all rejected my query without feedback on the writing itself. I think my biggest weakness is the author's platform. I'm not attaching my proposal here. I will only send i...

    $119 (Avg Bid)
    $119 Avg Bid
    93 bids

    ...techniques, find the following details: a. Details on the live machine/machines b. List of open ports c. List of Operating Systems 3. Using Enumeration techniques, find the following details: a. List of shared folders b. system's valid usernames c. machine names d. IP tables 4. With reference to at least one popular Vulnerability Scoring Systems and Databases such as Common Weakness Enumeration (CWE), provide details on the following vulnerabilities: a. SQL Injection. b. Cross-Site Request Forgery (CSRF) c. Cross-Site Scripting (XSS) d. Session Fixation e. Local File Inclusion (LFI) 5. Gain access to the target’s web site in the virtual environment which is provided to you using: a. SQL injection b. Cross-Site Scripting (XSS) ...

    $195 (Avg Bid)
    $195 Avg Bid
    13 bids

    -Blockchain development - -Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods -Knowledge of cryptography is required -Provide investigative/analytic support for extremely complex, technical, and highly sensitive investigations and initiatives pertaining to cryptography -Prepare in-depth summaries of data from extensive research and analysis - Work with law enforcement bodies all around the world to achieve cooperation and help in solving international investigations and fraud cases. - Work with high level blockchain investigation tools - Knowledge of and/or passion for blockchain/cryptocurrency

    $825 (Avg Bid)
    $825 Avg Bid
    16 bids

    ...for professionals looking to get back into the workforce after a break. If you're passionate about tech and ready to take on a challenge, we want to hear from you. Here's what we're looking for: 1. Tell us a bit about yourself, including your educational background and department. 2. Let us know which internship opportunity you're most interested in and why. 3. Share your biggest strength and weakness, so we can get a sense of your work style and potential areas for growth. This is an online internship, so you can apply from anywhere in the world. Please note that the first three months will be unpaid, but if you perform well, you'll have the opportunity to earn a paid internship for the next three months. Plus, we'll provide you with an internship...

    $97 (Avg Bid)
    $97 Avg Bid
    8 bids

    ...for professionals looking to get back into the workforce after a break. If you're passionate about tech and ready to take on a challenge, we want to hear from you. Here's what we're looking for: 1. Tell us a bit about yourself, including your educational background and department. 2. Let us know which internship opportunity you're most interested in and why. 3. Share your biggest strength and weakness, so we can get a sense of your work style and potential areas for growth. This is an online internship, so you can apply from anywhere in the world. Please note that the first three months will be unpaid, but if you perform well, you'll have the opportunity to earn a paid internship for the next three months. Plus, we'll provide you with an internship...

    $10 (Avg Bid)
    $10 Avg Bid
    6 bids

    I am Service Director at a ...that allows us to also text our customer updates, send them videos of their vehicle being worked on by a technician, allows us to process payments, record calls, and has a full-blown scheduling system that integrates into our DMS, ect. My goal is to be their direct competition with a couple other improvements that I will disclose later. I would prefer you to familiarize yourself with the companies I have detailed above because I would love to take their strengths and make it better and identify their weakness and improve upon them. I have 1 big improvement in my opinion that could really take this to the next level and connect with our customers allowing as much transparency as possible.

    $15700 (Avg Bid)
    NDA
    $15700 Avg Bid
    65 bids

    ...English Description As a security architect, you will be responsible for designing, building, testing, and developing security services within. The security architect will provide Enterprise information systems with advanced architecture and engineering support. The Security architect’s responsibility includes reviewing current security measures, recommending enhancements, and identifying areas of weakness. The architect needs to be able to take lead in pre-studies, develop security services and have project management skills. Key Responsibilities: • A thorough understanding of Information technology and IT architecture. • Planning, researching, and designing security architectures. • Create and maintain advanced IT security documentation, processes, proce...

    $38 / hr (Avg Bid)
    $38 / hr Avg Bid
    6 bids

    ...need a PCB design expert to help me with a project involving an STM32 device. My device needs to function reliably in a noisy environment, so it's quite important that I ensure it's highly resistant to EMI interference. I understand that there are potential sources of interference in my device's environment, and I need to take this into account. Since physical shielding isn't an option, I need a PCB design that includes effective shielding and suppression on the board itself. In short, I need a PCB design expert who can incorporate effective noise suppression into the next iteration of my device, to ensure it can handle the potential sources of interference in its environment. If successful, this should make my device much more reliable ...

    $1189 (Avg Bid)
    $1189 Avg Bid
    6 bids

    Homepage: List all available Pokemon with pagination (20 Pokemon per page). Display each Pokemon's image, number, name, and types. Refer to for layout inspiration. Statically render the first three paginated pages at build time. Render the remaining pages in real-time. Pokemon detail page: Display name, image, height, weight, classification, type, weakness, and resistance of the Pokemon. Include a button to open a popup showing the Pokemon's evolutions. Query evolution data only when the button is clicked, not beforehand. Refer to for an example of a Pokemon detail page. Statically render the detail pages for the first 20 Pokemon at build time.

    $13 (Avg Bid)
    $13 Avg Bid
    3 bids

    ...about 26 million barrels, of which 16 million are used for leased storage. We also operate five marine terminals located along coastal waterways with an aggregate storage capacity of approximately 26 million barrels. Analysis: Create a SWOT analysis for Magellan Midstream in comparison to three of our competitors in the energy sector. Please identify three to five examples of a Strength, Weakness, Opportunity, and Threat. Be prepared to present these examples in your interview and answer questions related to your answer. You must identify 3-5 of Magellan Midstream Strengths, Weaknesses, and Opportunities. (3-5 of each) Then you must identify these 3 competitors Strengths, Weaknesses, and Opportunities to Magellans (1-2 examples of each company). What could Magellan d...

    $278 (Avg Bid)
    Urgent NDA
    $278 Avg Bid
    22 bids

    Hi, We are looking for someone skilled in Revit to rebuild our Sketchup model of a 2 bedroom 2.5 bathroom home in Revit. The home is a very simple modern design, please check out the screenshots below and review the link to the Sketchup fil...photorealistic renders of the home from Revit model Sketchup model: Skills 3D modeling of structure Understanding of mechanical, electrical, pluming, structural systems Rendering of home Please reply to this job with a short response of why you believe you would be a good fit. Tell us about your strengths, any weakness, a realistic timeframe, and a few examples of your work, as well as a link to your portfolio. Looking forward to hearing from you, Seth

    $1500 - $3000
    Featured Sealed
    $1500 - $3000
    39 bids

    I am looking for a freelancer to conduct a qualitative value chain analysis on Mengniu, with a focus on identifying potential weaknesses for each category: outbound logistics, marketing and sales and service. This analysis should have a moderate level of detail, providing insights on the areas. 2 points each for each category's weakness with some elaboration. So there should be 6 points with elaboration. It is a really v short writing so im looking to negotiate to less than 10

    $21 (Avg Bid)
    $21 Avg Bid
    13 bids

    ...for Authentication by Challenge-Response Authentication Mechanism. The authentication type associated is called CRAM-MD5 and the full protocol is named SMTP-CRAM . However, CRAM-MD5 only allows the server to verify the client and doesn't provide any server authentication, therefore its usage is limited and less preferable than other stronger mechanisms. To demonstrate CRAM-MD5 indeed has its weakness, the eavesdropper should be implemented and a MitM attack can be performed. On the high level, the following needs to be implemented: All programs are capable of: Log all socket transactions in a specific format and output to stdout . The SMTP-CRAM server is capable of: i. Prepare for any incoming client connection. ii. Receive emails from a client and save to disk. iii. A...

    $132 (Avg Bid)
    $132 Avg Bid
    7 bids
    Trophy icon Catholic shirt design Ended

    Hello, I am starting a catholic apparel line. It is called "One two nine". i want a shirt designed with the following bible verse. 2 Corinthians 12:9-10 But he said to me, “My grace is sufficient for you, for my power is made perfect in weakness.” Therefore I will boast all the more gladly about my weaknesses, so that Christ’s power may rest on me. That is why, for Christ’s sake, I delight in weaknesses, in insults, in hardships, in persecutions, in difficulties. For when I am weak, then I am strong. i have also attached my logo but feel free to be creative.

    $35 (Avg Bid)
    Featured Guaranteed Top Contest
    $35
    218 entries

    - Experience in C++, Python - Principle of Symmetric & Asymmetric Cryptography, Hands-on, Technical, Problem Solver. -Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods for efficient handling of Cryptic process -Knowledge of cryptography is required -Provide investigative/analytic support for extremely complex, technical, and highly sensitive investigations and initiatives pertaining to cryptography - Prepare in-depth summaries of data from extensive research and analysis Work with law enforcement bodies all around the world to achieve cooperation and help in solving international investigations and fraud cases. - Work with high level bl...

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    8 bids

    1. Describe the business of Shell & Saudi Aramco- Identify the extent in which both firms are correlated. 2. carry out a financial statement analysis (Dupont analysis) of both firms - Describe the relative strength and weakness of both firms - Highlight strategic differences 10 Page power point A Sample power point is provided All financial statements, ratio analysis, and multiples are provided.

    $82 (Avg Bid)
    $82 Avg Bid
    37 bids

    Briefly interview a family member, a close friend, and finally, a co-worker concerning your listening skills. Ask them to identify your greatest strength as a listener and then your greatest weakness. Based on these interviews, write a one-page essay in which you discuss your listening strengths and your listening weaknesses and provide an action plan for improving your areas of weakness. Use one paragraph to discuss your strengths, one paragraph to discuss your weaknesses, and at least one paragraph to discuss your action plan. The specificity of your self-assessment and action plan, as well as any spelling and/or grammatical errors, will impact your grade.

    $13 (Avg Bid)
    $13 Avg Bid
    18 bids

    I am looking a expert reverse engineer who have high skills on assembly , x64 86, c , c++, languages , and windows applications , to help me to find my program weakness points and improve it,

    $10 - $30
    Sealed
    $10 - $30
    4 bids

    I am looking a expert reverse engineer who have high skills on assembly , x64 86, c , c++, languages , and windows applications , to help me to find my program weakness points and improve it,

    $10 - $30
    Sealed
    $10 - $30
    4 bids

    want to hire expert reverse engineer who have high skills on assembly , x64 86, c , c++, languages , and windows applications , to help me to find my program weakness points and improve it, and do some tests

    $569 (Avg Bid)
    $569 Avg Bid
    26 bids

    ... behavioral leadership • trait theory of leadership 1. Evaluate three strengths of your leadership, using the chosen scholarly leadership theory, including how each strength relates to the theory. Support the evaluation of your strengths with at least one scholarly source. 2. Evaluate three weaknesses of your leadership, using the chosen scholarly leadership theory, including how each weakness relates to the theory. Support the evaluation of your weaknesses with at least one scholarly source. 3. Recommend three actionable items to improve the effectiveness of your leadership, including how each actionable item relates to the chosen scholarly leadership theory. Support the recommendations of actionable items with at least one scholarly source. Note: A scholarly ...

    $52 (Avg Bid)
    $52 Avg Bid
    16 bids

    I need presentation about vulnerability management in cybersecurity. What is vulnerability management ? How to improve it? How to know the weakness?

    $27 (Avg Bid)
    $27 Avg Bid
    47 bids

    I would like you create images using Midjourney that can be added to a slideshow for a presentation I will be giving on leadership lessons. Please turn the below words into 8 different images to use. They can be animation images or more dark moody images like the one attached. This is a rushed contest and will only be open for 48hr...below words into 8 different images to use. They can be animation images or more dark moody images like the one attached. This is a rushed contest and will only be open for 48hrs! You can be inspired by the Freelancer logo and use the paper crane as an inspiration Lead by example Hire the right people Empowering your team Be Adaptable Keep learning and growing Vulnerability is a strength, not a weakness Lead with courage and embrace failure Lead from...

    $200 (Avg Bid)
    Featured Urgent Guaranteed Top Contest
    $200
    343 entries

    ...Valuation Please ensure, model is clean, easy to scan and dynamic i.e. we can change forecast assumptions to see the effect on the intrinsic value. Keep it short/simple but highlight your sources clearly Explain your assumptions in brief (add comment in respective cells) used to forecast financials Write-up Please create a short Company Profile for PepsiCo, highlight its investment strength and weakness, and a short commentary on the latest earnings results. Keep your views short and brief. Please use publicly available information only and ensure that the content is not plagiarized....

    $40 (Avg Bid)
    $40 Avg Bid
    11 bids

    ...Valuation Please ensure, model is clean, easy to scan and dynamic i.e. we can change forecast assumptions to see the effect on the intrinsic value. Keep it short/simple but highlight your sources clearly Explain your assumptions in brief (add comment in respective cells) used to forecast financials Write-up Please create a short Company Profile for PepsiCo, highlight its investment strength and weakness, and a short commentary on the latest earnings results. Keep your views short and brief. Please use publicly available information only and ensure that the content is not plagiarized....

    $26 (Avg Bid)
    $26 Avg Bid
    7 bids

    hi guys i work for security system and i need android development for security system test weakness points and Full knowledge of the Android system

    $2771 (Avg Bid)
    $2771 Avg Bid
    90 bids

    hi guys i work for security system and i need android development for security system test weakness points via zero click technology and create client and apk server

    $3700 (Avg Bid)
    $3700 Avg Bid
    54 bids

    * Experience in Matlab , C++, Python * Principle of Symmetric & Asymmetric Cryptography, Hands-on, Technical, Problem Solver. * Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods for efficient handling of Cryptic process * Experience seeing the entire lifecycle of software products is crucial. Strong experience working with engineering and product development teams.

    $649 (Avg Bid)
    $649 Avg Bid
    7 bids

    hi guys i work for security system and i need android development for security system test weakness points via zero click technology ethical hacking growth hacking

    $2757 (Avg Bid)
    $2757 Avg Bid
    13 bids

    hi guys i need android development for security system test weakness points ethical hacking growth hacking

    $2770 (Avg Bid)
    $2770 Avg Bid
    47 bids

    ...rejects the article and you are unable or unwilling to make the required changes, I'll pay a fixed price of $10, leave no feedback and not assign future articles to you. The articles I need describe either: (1) The attractiveness of particular high-dividend stocks and ETFs that are identified by an Algo I've developed. The Algo is based on a mean reversion strategy -- in other words buy on weakness, sell on strength. I run this Algo all day long and it identifies two or three buy situations a week, more in down markets, less in up markets. (2) The sell recommendations, again based on the Algo. These are current holdings that we are selling to lock in profits after price appreciation. One of the most difficult and time-consuming aspects of writing investment articles...

    $32 / hr (Avg Bid)
    $32 / hr Avg Bid
    25 bids

    ...English language, likes to write, knows at least a little about investing in stocks, and can write clearly and concisely. I need a series of articles - 2 or 3 a week, each taking about 2 hours to write -- that describe the attractiveness of particular high-dividend stocks and ETFs that are identified by an Algo I've developed. The Algo is based on a mean reversion strategy -- in other words buy on weakness, sell on strength. I run this Algo all day long and it identifies two or three buy situations a week, more in down markets, less in up markets. One of the most difficult and time-consuming aspects of writing investment articles for platforms like Seeking Alpha is deciding what to write about. In this case, the Algo takes care of that. I just need someone to explain why, ...

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    40 bids

    ...user requirements. Creating timeframes and work schedules to meet deadlines. Communicating effectively with clients and teams. Debugging websites and ensuring software documentation is updated. Establishing strong professional relationships with clients and other professionals. Conducting research and keeping abreast of social media marketing trends. Supervising web developers, analyzing areas of weakness, and scheduling training sessions accordingly. Requirements: 3-5 years of experience in web development. Practical experience with content management systems. Experience with wireframe and diagnostic tools. Leadership and management skills. Excellent customer service and research abilities. Willingness to work overtime when required. Superb interpersonal, written, and verbal...

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    17 bids

    1. would you be able to give me a scenario in which you have different opinions with your teammate and you convinced your teammate? 2. Tell me a time when you dive deep 3. Tell me a time when you ... Tell me a time when you sacrifice short for long goal [think big] 4. Tell me a time when you get challenges from customers [Customer Obsession, Earn Trust] 5. Tell me a time when you notice an issue with your project and fix it by yourself 6. Tell me a time when you quick adapt when you don’t have sufficient Info 7. Tell me about a time that you failed 8. How do I answer “what’s your biggest weakness”? Can I say lack of experience and domain knowledge? 9. What’s your biggest strength? can you take a look at the above behavior interview questions and see if...

    $50 (Avg Bid)
    $50 Avg Bid
    1 bids

    ...This includes preforming an external analysis via PESTEL and 5 Force analysis to assess a firm’s strategic fit with its environment; an internal analysis using VRIN and weighted competitive strength assessment to determine the extent of a firm’s competitive advantage; and a diversification analysis using a 9 cell matrix to determine the attractiveness of a firm’s portfolio. At least one major weakness or problem is identified and recommendations are given to address this issue. Finally, explain how the recommendation(s) may be carried out and how it can be controlled, altered or adjusted if necessary. Format of the Team Report: - Introduction/ Executive Overview: gives general overview of the company’s key issues or problems and recommendations. - Mission/...

    $118 (Avg Bid)
    $118 Avg Bid
    39 bids

    The Lifters have been established in the  year 2022, we  have done extensive market studies in the  Elevator business and have invaluable  insight into  the strengths and weakness of the elevatorsof different local and international  companies.  Furthermore, we have a strong team of technical staff, including mechanical/electrical and electronics engineers. We’re hiring a salesman who has good connections in the building industry.  This work will  be a  free  time&nbs...

    $1249 (Avg Bid)
    $1249 Avg Bid
    2 bids

    The title of the project is : Applied Chemistry. The purpose of this presentation is to persuade higher management to accept not only the opening of the Department in September 2022 but to commit in the search of budget...quality control. This laboratory can be sustainable by doing service of food quality control to the private and public 3) the student that graduate from the environmental chemistry since they study subjects related to resources, the environment, and recycling. These three courses are classified in such a way that students can choose classes according to their interests and future careers . The weakness of this project is that the program after 2 years in 2025 will need a state of the art instrumentation but I am positive that we can obtain funding from several...

    $21 (Avg Bid)
    $21 Avg Bid
    21 bids

    I intended to replace the windows I have in the kitchen to patio doors and the doors to a window. Having looked at the windows they are separated by a cement column which could be a lintel. We have a lintel above the windows which will not be touched but want to be sure that we will not be causing any structural weakness to the property a we are a ground floor flat. I therefore need to find out if removing this pillar will cause a problem.

    $471 (Avg Bid)
    $471 Avg Bid
    43 bids

    * Experience in C++, Python * Principle of Symmetric & Asymmetric Cryptography, Hands-on, Technical, Problem Solver. * Can easily crack hash & decrypt strong encryption * Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods for efficient handling of Cryptic process * Knowledge of cryptography is required.

    $1525 (Avg Bid)
    $1525 Avg Bid
    8 bids

    I have attached an csv file of ~1500 unicorns. I need to have the fields 'sector', 'business model', 'advantages', 'disadvantages' filed. The data in these fields must be concise, but comprehensive. Only a few words to describe the information. The information contained in : - 'sector': the industry sector of the startup: fintech, medtech, e-commerce, etc., - 'business m...comprehensive. Only a few words to describe the information. The information contained in : - 'sector': the industry sector of the startup: fintech, medtech, e-commerce, etc., - 'business model': the business model of the startup, or the way they make money: freemium, direct sale, advertisment, etc., - 'advantages': competitive advantage...

    $152 (Avg Bid)
    $152 Avg Bid
    47 bids

    ...fails to connect to the internet the s2s VPN connection from IP a to IP c breaks, then we make the script below, which is run on crontab/cronjob on unix every 1 minute: if ping -I WAN -c 3 8.8.8.8 &> 0 then clish -c "set static-route 3 disabled true" else clish -c "vpn tu del x.x.x.x" clish -c "vpn tu del x.x.x.x" clish -c "vpn tu del x.x.x.x" clish -c "set static-route 3 disabled false" fi The weakness of this script is that if the condition fails it will do an else which will repeat itself. which makes every 1 minute run clish -c "vpn tu del x.x.x.x", now what we want is clish -c "vpn tu del x.x.x.x" done only once as long as IP a fails to connect to the internet or 8.8.8.8 explanation: if ping -I ...

    $135 (Avg Bid)
    $135 Avg Bid
    8 bids

    I have a task to compare media samples from different media producers and I would like to hire an expert to give me a comprehensive review & Comparison in a very creative way showing all points of strength and weakness from the samples I will provide

    $23 (Avg Bid)
    $23 Avg Bid
    11 bids

    prepare an overview analysis about the strengths, weakness, oportunites and threads of metaverse in education 5-6 pages

    $29 (Avg Bid)
    $29 Avg Bid
    44 bids

    Goal: Paddle OCR is an open source DeepOCR We would like to find out if it performs well on European characters and if it fits into ...open source DeepOCR We would like to find out if it performs well on European characters and if it fits into our current architecture As a first proposal we see following steps needed: Align approach with team - most likely: Get local copy Install Paddle OCR Create Test Set for benchmark (European characters, semi-structured docs) Present benchmark to the team Try to train Paddle OCR for a found weakness and see if it learns accordingly Summarize your findings and write a report OPTIONAL: If OK -> integrate Paddle OCR into our architecture (separate service and impl. of given interface in C#) Re-run our service with Paddle OCR with a given set of ...

    $42 / hr (Avg Bid)
    $42 / hr Avg Bid
    15 bids

    ...Plan community-building efforts for the year and coordinate the team to execute well to drive our KPIs ** Design our content strategy to support the customer journey, including creating the best customer experience, increasing referrals and retention, maximizing lifetime value, etc. ** Support the CEO in tracking KPIs across social and email marketing channels to identify areas of opportunity, weakness, etc. ** Support the marketing team to ensure everyone has the training and collaboration from leadership and teammates they need to excel in their performance This is a leadership role more than an executing role, and we are looking for someone with solid and experienced writing / creative direction skills. You will need a good understanding of the various roles within a marketin...

    $2194 (Avg Bid)
    $2194 Avg Bid
    9 bids

    * Experience in Matlab , C++, Python * Principle of Symmetric & Asymmetric Cryptography, Hands-on, Technical, Problem Solver. * Can easily crack hash & decrypt strong encryption * Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods for efficient handling of Cryptic process * Knowledge of cryptography,Hash is required. * Experience seeing the entire lifecycle of software products is crucial. Strong experience working with engineering and product development teams.

    $1507 (Avg Bid)
    $1507 Avg Bid
    7 bids