I'm a professional part-time English/French translator. I'm a native speaker of both English and French, and as such, I can translate both ways. Please have a look at my website at: http://www.jntraductions.fr. I have experience translating, editing and proofreading, as well as copywriting, that is, adapting/rewording based loosely on an original draft, with a lot of effort put into making things sound as smooth as possible. I enjoy and take pride in delivering top-notch translations, and therefore, my prices are higher than the amateurs you'll see here on oDesk: I don't cut corners, I take time to edit and proof-read my translations carefully at least twice, and I pay a lot of attention to making it sound just right, so that no one can even tell that it's a translation. A good translation can't be prepared in a hurry, and that's why my price per word, for non-technical translations, is $0.12 / word.
Get Your Database Modeling Projects Started Today!
Hire a freelance database modeling developer to build your database with the latest in formal data modelling techniques. Experienced database administrators manage data as a resource using hierarchical database models, entity-relationship models, object-relational databases, Microsoft Access, database schema and other database modeling software.
Database modeling is a process employed by data modelers to provide consistency, function and efficiency to databases. On oDesk, the world’s largest online workplace, database modeling experts use the latest in conceptual, logical and physical data models to assist small businesses, researchers and other professionals in creating powerful data management systems.
Database Modeling Job Cost Overview
Typical total cost of oDesk Database Modeling projects based on completed and fixed-price jobs.
oDesk Database Modeling Jobs Completed Quarterly
On average, 26 Database Modeling projects are completed every quarter on oDesk.
Time to Complete oDesk Database Modeling Jobs
Time needed to complete a Database Modeling project on oDesk.
Average Database Modeling Freelancer Feedback Score
Database Modeling oDesk freelancers typically receive a client rating of 4.53.
My objective is to help companies while also keeping my skills sharp. I am a quick learner and you can count on me to get the assignment done. I am a Chartered Accountant - Finalist (equivalent to CPA in US) from Institute of Chartered Accountants of Pakistan (ICAP) and Associated Certified Chartered Accountant (ACCA-Finalist) from UK. Holds Masters degree in Economics (Uok) and Advanced Diploma in Accounting and Business. I have working as Senior in Audit & Tax department in DL & Co CHARTERED ACCOUNTANTS in Pakistan. I have Three years of experience and I have good knowledge in Accounting Principles of US GAAP and International Financial Reporting Standards. I have expertise knowledge in all versions of Accounting Software of Quick books , Peach tree, MYOB, Sage, Quicken, Xero,IRIS, Tally .I have expert knowledge in in Excel also. My Expertise Fields: US Accounting -(Quick Books , Creative Solutions, Peachtree ,Quicken), Audit, Bookkeeping and Tax & Australian Accounting - MYOB, Quick books, Xero.
Over last 7 years I have been involved in teaching, training, writing articles, enterprise application development in Java, Hibernate, Spring, JDBC, JSP, Servlet, MySQL, PostgreSQL, Oracle, J2EE, QtC++. Though I am interested in any job as client may deem fit yet my particularly interested is in article writing and software development I also have experience in software design, database design, SQL, OOP, HTML.
I'm expert in MS PowerPoint, Spreadsheet Modeling and Adobe Photoshop. Here are the list of things I do on oDesk: • Elegant PowerPoint and Prezi slides • Making excel models/ financial models/ excel based tools • Editing photos/images • Retouching photos/images • Designing banners/posters/flyers/billboards • Writing reports • Working on Microsoft Excel • Creating letter heads and business cards
Designer, Developer, Contributor, Collaborator, Individual, Team Graphic Fine Art Technical Article Blog Correspondent Copy Creative Writer Writing Office Lyx Adobe Microsoft Oracle Opensource Cloud Computing SalesForce Commerce CMS SEO Portal Microsoft VS Linux GNU Lamp CMS Drupal Concrete Joomla Wordpress Wiki Perl Python Ruby Rails Lisp C C++ SVN JAVA GUI ModBus Embedded Controller SQA
I have 6 years of experience as a Network Security Consultant. Previously I worked as a Data Modeler and Object Oriented Designer. I liked my past jobs. But my current job is different, it is more intellectually satisfying because it puts me at a direct competition with the hackers who want to steal datum from the network security systems that I designed. I have to be smarter than my opponents to prevent them from winning our duel. As a Network Security Consultant, I was doing the following: Was partitioning databases in such way that there were no Internet connections to the most sensitive datum. Was determining where to install firewalls and how to configure them. Was establishing the rules of data sharing and transmission, which is essential to successful functioning of intrusion detection software packages. Was monitoring computer networks for the purpose of determination if there were hackings. If necessarily, was redesigning databases to make sure that the probability of data theft was minimized. In case there was a suspicion about the hacker software operating inside a network, was designing and implementing strategies aimed at identification of hostile software. Was advising clients how to use the VPN (virtual private network) for secure data transmission. Was working in the field of NAC (network access control) to integrate various data protection techniques such as host intrusion prevention, antivirus software, vulnerability assessment, etc. Currently I am working on the book, How to Protect Your Computer Network from Hackers. Chapter 1 of the book presents an overview of network protection methods. Overview of existing data protection methods. The most heavily advertised data protection method is data encryption. Indeed, some companies offer complicated schemes of data encryption that even the most sophisticated hackers cannot crack. But they do not have to -- they can break into your network by exploiting software glitches and then use your decryption programs to decipher the encrypted data. For example, both Sony and Target had their credit card numbers data encrypted. But the encryption did not prevent their datum from being stolen. The encryption approach creates false sense of security, and we do not recommend relying solely on it. If you have one or two data entry points into your network system, and a small number of customers, a strong firewall may be the best solution for you. But if you have hundreds of points of entry and thousands of customers, you should consider additional means of protection working in conjunction with your firewalls. Modern intrusion detection tools capable of data mining are very good, although they have two weaknesses: a) usually, it takes several weeks to detect a malicious software; b) you need employees with a specific kind of training to use these tools successfully. This doesn’t mean that we do not recommend using intrusion detection packages; on the contrary, we believe that you should use them together with the method that we will be describing in this book. Finally, in this chapter we are going to briefly mention the most powerful method of data protection, and will elaborate on this topic in the subsequent chapters. Ideally, this method of design of network systems and their databases makes data theft impossible. However, a comprehensive design meeting this goal might cost plenty of money and not every company can afford it. Fortunately, there are many less expensive ways of keeping possibility of extraction of valuable data close to zero. In some cases the ideal result can be reached without major investment of money. Take power plants, for instance -- there were reports of hacking into their computer networks. But this could have been easily avoided if instead of using the Internet to transfer the data the power companies were using standalone networks to control their plants, which is an achievable goal because a power plant is a classic example of an isolated facility that doesn’t need access to the Internet. Frankly, only a fool would use the Internet to run his power plant. The core of this method is a redesign of a computer network and its database in such way that most of the vital data is beyond the Internet’s reach. Of course, every network is unique, and there is no universal solution applicable to all systems. However, it is possible to discern certain properties that are common to a large number of networks, and use the experience acquired during the design of some of them to the others.
I am a person who is always motivated by the desire to do a good job at whatever position I am in. I have 14 years in administration support. I have performed a variety of duties with which I have developed a broad range of skills. I am a fast typist wit the speed of 60WPM+ and I have advanced skills in Microsoft Office Package. I am looking for opportunities where my experience and skills will enable me to contribute to your objectives.
Over the last 12 years I have developed a wide range of OO applications in small or medium size projects or alone, most of them in Java. I'm a SUN (Oracle) Certified Java Programmer. My core competencies are Java SE, Java EE and Python. My speciality is website scraping (in Python or Java) and performance tuning. I have also experience in the following areas: Flex/ActionScript 3, SQL, Hibernate, Spring Framework, JSP, web service developement, PHP, C#, C++, SmallTalk, database modelling, UML, XML, Tapestry 5, Scala, Ruby, Liquibase, DDD, BDD. If I need to do a professional writing (Copywriting, Project Description, Project Summary, Technical Concept, etc.) I prefer LaTeX as tool so you have a well-formed, syntax-highlighted and print-ready document in your hands. Besides these PDF documents open with the same layout on every machine. I translate texts (casual or professional) from/to English, German and Hungarian. Because I like writing I'm capable to create blog and journal content for your homepage in almost any category. I'm an ISTQB Certified Tester. I have experience in designing and writing test cases, test execution. I'm familiar with JUnit, TestNG and Mercury (HP) Quality Center, TDD.
Softronix (Pvt) Ltd. Agency Contractor
Softronix is one of the largest software companies in Pakistan, working in 100 cities, providing services to more than 1200 satisfied customers. Softronix offers a variety of services and products with in the country and abroad. Over the last 12 years the company has been involoved working on different projects in different platforms and technologies such as : Visual Basic, VB.net, radML, MS-SQL, ORACLE 10g, mySQL, ASP, JSP, J2EE and developed following projects: * Softronix GinBASE (Software for Ginning industry, now have 300 clients) * Softronix Flour Ace (Software for Flour mills, now have more than 60 clients) * Pharma Suite (Software for pharmaceutical indutry, now have more than 200 clients) * ComputRice (Software for Rice Mills now have more than 50 clients) * OilBASE (Software for Oil mills, now have more than 20 clients) * Archivist One (Softwarefor Schools now have more than 100 clients) * ElectroBiz (Software for Electronic Goos menufacturers) * Softronix IntelliBiz (Software for Suply Chain Management, more than 100 Clients) * Softronix BizTalk (Software for General Trading- More than 50 Clients) * First Shipping website ([www.first-shipping.com]) * First shippers B2B web application, [www.first-shippers.com], * Website for Chenab College, [www.chenab.edu.pk] * Mobylux web site ([www.mobylux.com]) * Softronix financials 3 (developed in a new technology called radML) * And Dozens of customized applications. Now we want to prove our skills and professional working style in the international market by using the latest technologies. Offshore Work Division is a separate division with in the company, that handles all kinds of offshore projects, This division provides humar resource for all kinds IT and administrative type of projects. : http://www.first-shipping.com : http://www.first-shippers.com : http://www.chenab.edu.pk : http://www.mobylux.com