Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
, mobile computing, and client/server technology, as well as consulting services involving researching technology solutions for complex issues. For example, it may involve helping university research
-
, server/playback, etc.) and related supporting infrastructure in War Eagle Production facilities (Video routers and IP Networks, RF/fiber transmission, tally, signal processing gear, etc.). Depending
-
future career goals. Build your network! Interacting with faculty, staff, and fellow students can lead to valuable connections and potential mentors. Make a difference. Have the satisfaction of knowing YOU
-
principles and practices with the ability to apply that knowledge to perform complex and non-routine specialized information technology (IT) security analysis functions such as troubleshooting, advanced
-
decisions about your future career goals. Build your network! Interacting with faculty, staff, and fellow students can lead to valuable connections and potential mentors. Make a difference. Have the
-
Undergraduate Student Research Assistant An/Zhang Working Title (if different from Position Title) Job Summary The Complexities of Human-Environment Emergence & Resilience (CHEER) Lab, under the supervision of Dr
-
apply comprehensive IT knowledge, concepts, practices, and procedures, including hardware, software, networks as well as troubleshooting and documentation for the completion of complex assignments and
-
, application, and communication issues in an efficient and timely manner. Accurately documents request history and routes more complex second- and third-tier requests to the appropriate technical personnel
-
of Research Libraries (ARL), Association of Southeastern Research Libraries (ASERL), Hathi Trust, Coalition for Networked Information (CNI), and other organizations of academic institutions. The Libraries has
-
/cyber security principles and practices with the ability to apply that knowledge to perform complex and non-routine specialized information technology (IT) security analysis functions such as