My overriding objective is to use my dedication to quality and value to provide my clients with professional product deliverables. From ghostwriting to SEO article copywriting or data analysis to financial reporting, my primary goal is customer satisfaction. I treat all my clients' projects as if they are my own, ensuring that what you receive is the best possible product. Experienced in academic writing, editorial writing and creative writing, I couple that talent with skills learned during my career with Fortune 500 insurance companies to bring business solutions to the creative field with a level of professionalism rarely seen in freelance communities.
Get Your Database Modeling Projects Started Today!
Hire a freelance database modeling developer to build your database with the latest in formal data modelling techniques. Experienced database administrators manage data as a resource using hierarchical database models, entity-relationship models, object-relational databases, Microsoft Access, database schema and other database modeling software.
Database modeling is a process employed by data modelers to provide consistency, function and efficiency to databases. On oDesk, the world’s largest online workplace, database modeling experts use the latest in conceptual, logical and physical data models to assist small businesses, researchers and other professionals in creating powerful data management systems.
Database Modeling Job Cost Overview
Typical total cost of oDesk Database Modeling projects based on completed and fixed-price jobs.
oDesk Database Modeling Jobs Completed Quarterly
On average, 21 Database Modeling projects are completed every quarter on oDesk.
Time to Complete oDesk Database Modeling Jobs
Time needed to complete a Database Modeling project on oDesk.
Average Database Modeling Freelancer Feedback Score
Database Modeling oDesk freelancers typically receive a client rating of 4.53.
I'm a professional part-time English/French translator. I'm a native speaker of both English and French, and as such, I can translate both ways. Please have a look at my website at: http://www.jntraductions.fr. I have experience translating, editing and proofreading, as well as copywriting, that is, adapting/rewording based loosely on an original draft, with a lot of effort put into making things sound as smooth as possible. I enjoy and take pride in delivering top-notch translations, and therefore, my prices are higher than the amateurs you'll see here on oDesk: I don't cut corners, I take time to edit and proof-read my translations carefully at least twice, and I pay a lot of attention to making it sound just right, so that no one can even tell that it's a translation. A good translation can't be prepared in a hurry, and that's why my price per word, for non-technical translations, is $0.12 / word.
Fourteen years proven success in end-to-end web development, technical architecture, and management. Fluent in PHP, MySQL, .NET, SQL Server, Flex, Access, Excel, jQuery, HTML, CSS. Native English speaker, clear and responsible communicator.
Hardworking individual with a bachelor degree in computer science and electrical engineering. Have worked on very serious projects, and also have worked on projects for world famous companies like Texas Instruments. The job is always finished.
Designer, Developer, Contributor, Collaborator, Individual, Team Graphic Fine Art Technical Article Blog Correspondent Copy Creative Writer Writing Office Lyx Adobe Microsoft Oracle Opensource Cloud Computing SalesForce Commerce CMS SEO Portal Microsoft VS Linux GNU Lamp CMS Drupal Concrete Joomla Wordpress Wiki Perl Python Ruby Rails Lisp C C++ SVN JAVA GUI ModBus Embedded Controller SQA
I am a PhD student in University of Portsmouth, UK. My major expertises including academic writing, data analysis (advanced level), doing social research. My native language is Vietnamese, but I have spent four years studying in the UK so I am kind of confident about the fluency of my English. I am good at using computer software for writing and analysis from very basic level (Word, Excel, Powerpoint .v.v..) to advanced level (data analysis: SPSS, MLwin). Please advise my LinkedIn profile for further details : https://www.linkedin.com/pub/hai-ngoc-nguyen/93/690/3
I have 6 years of experience as a Network Security Consultant. Previously I worked as a Data Modeler and Object Oriented Designer. I liked my past jobs. But my current job is different, it is more intellectually satisfying because it puts me at a direct competition with the hackers who want to steal datum from the network security systems that I designed. I have to be smarter than my opponents to prevent them from winning our duel. As a Network Security Consultant, I was doing the following: Was partitioning databases in such way that there were no Internet connections to the most sensitive datum. Was determining where to install firewalls and how to configure them. Was establishing the rules of data sharing and transmission, which is essential to successful functioning of intrusion detection software packages. Was monitoring computer networks for the purpose of determination if there were hackings. If necessarily, was redesigning databases to make sure that the probability of data theft was minimized. In case there was a suspicion about the hacker software operating inside a network, was designing and implementing strategies aimed at identification of hostile software. Was advising clients how to use the VPN (virtual private network) for secure data transmission. Was working in the field of NAC (network access control) to integrate various data protection techniques such as host intrusion prevention, antivirus software, vulnerability assessment, etc. Currently I am working on the book, How to Protect Your Computer Network from Hackers. Chapter 1 of the book presents an overview of network protection methods. Overview of existing data protection methods. The most heavily advertised data protection method is data encryption. Indeed, some companies offer complicated schemes of data encryption that even the most sophisticated hackers cannot crack. But they do not have to -- they can break into your network by exploiting software glitches and then use your decryption programs to decipher the encrypted data. For example, both Sony and Target had their credit card numbers data encrypted. But the encryption did not prevent their datum from being stolen. The encryption approach creates false sense of security, and we do not recommend relying solely on it. If you have one or two data entry points into your network system, and a small number of customers, a strong firewall may be the best solution for you. But if you have hundreds of points of entry and thousands of customers, you should consider additional means of protection working in conjunction with your firewalls. Modern intrusion detection tools capable of data mining are very good, although they have two weaknesses: a) usually, it takes several weeks to detect a malicious software; b) you need employees with a specific kind of training to use these tools successfully. This doesn’t mean that we do not recommend using intrusion detection packages; on the contrary, we believe that you should use them together with the method that we will be describing in this book. Finally, in this chapter we are going to briefly mention the most powerful method of data protection, and will elaborate on this topic in the subsequent chapters. Ideally, this method of design of network systems and their databases makes data theft impossible. However, a comprehensive design meeting this goal might cost plenty of money and not every company can afford it. Fortunately, there are many less expensive ways of keeping possibility of extraction of valuable data close to zero. In some cases the ideal result can be reached without major investment of money. Take power plants, for instance -- there were reports of hacking into their computer networks. But this could have been easily avoided if instead of using the Internet to transfer the data the power companies were using standalone networks to control their plants, which is an achievable goal because a power plant is a classic example of an isolated facility that doesn’t need access to the Internet. Frankly, only a fool would use the Internet to run his power plant. The core of this method is a redesign of a computer network and its database in such way that most of the vital data is beyond the Internet’s reach. Of course, every network is unique, and there is no universal solution applicable to all systems. However, it is possible to discern certain properties that are common to a large number of networks, and use the experience acquired during the design of some of them to the others.
HOURLY PROJECTS ONLY, Please! And no time wasters too, please! I work ONLY with clients that have both a professional attitude as well as a prompt payment ability. Hi: Thank you for taking a few moments to glance over my oDesk profile. I possess an excellent command of English (it happens to be my native language!), verifiable accredited U.S. qualifications, authentic Fortune 10/100 work experience, as well as a powerful portfolio of specializations, skills, experience, and capabilities. Although I've passed over 90 oDesk tests and more than 27 Brainbench tests, I regularly add new skills to my portfolio. AREAS OF EXPERTISE: Advanced Project, Program and Portfolio Management (SCPM - Stanford) Business Consulting - Leadership, Management, and Technnological Management of technology Organizational Behavior Organization Design General Management Business Analysis Systems Analysis Marketing: Penetration of new market segments Design of Tests and Examinations - including Psychometric Evaluation Quality Management (CMQ/OE: ASQ Certified Manager of Quality / Organizational Excellence) Quality Engineering (CQE: ASQ Certified Quality Engineer) Software Quality Assurance (CSQE: ASQ Certified software Quality Engineer) CMMI ISO 9001, SPICE, TickIT and other Quality Standards SDLC / Agile Software Development Methodologies Software Technologies and Development Environments Multidisciplinary Training - Individual and Groups GRE and GMAT Examinations Coaching I have a working knowledge of a broad range of software across a wide range of industry segments (general management, international quality systems standards formulation, market penetration, manufacturing, financial services, customer service, training, software development, systems implementation, systems analysis, systems certification and accreditation), together with primary and secondary research capabilities. As far back as 1994, I designed, developed and successfully implemented across several sites, a Refinanced Loan Management System (RLMS) while serving as the joint Management Information Systems Expert and Computer systems Specialist for the SFLCP project funded by the International Fund for Agriculture of the United Nations (UN / IFAD) and the Canadian International Development Agency. During the relatively short period of July 1996 to September 1997, I designed, developed, and successfully implemented what was probably the world's first ISO 9001-compliant Quality Management System that allowed new technology platforms to be added without the need for immediate re-certification. What all this means to you is that you finally have the ability to economically hire someone who is quite comfortable delving into even the smallest details while simultaneously monitoring the "big picture," ensuring you get the most from whatever your assignment requires. Of course, I prefer to work with clients who look forward to taking their companies to the next level in terms of performance, profitability, as well as corporate responsibility. Stay tuned for new skills, technologies and achievements that I will be adding to my portfolio in the very near future. Sincerely, Prasanna L.L. Prasanna Ranatunga SCPM(Stanford) AICM ASQ CSQE CMQ/OE CQA CQE Member, Executive Survey Panel, McKinsey & Co., New York First Country Counselor for Sri Lanka, American Society for Quality (ASQ) Chief Proctor, ASQ Examinations in Sri Lanka Senior Member, American Society for Quality (ASQ) SCPM (Advanced Project/Program Management), Stanford University, CA, U.S.A.: ASQ Certified Software Quality Engineer (CSQE) ASQ Certified Manager of Quality / Organizational Excellence (CQM/OE) ASQ Certified Quality Auditor (CQA) ASQ Certified Quality Engineer (CQE) SLSI Certified and experienced ISO 9000 Consultant (multiple industry segments) AICM(Sri Lanka) - Credit Management SSI Certified in Java-based Web Technologies (SSI / APTECH India) GRE / GMAT / SAT Examinations Coach
Stuart Whitmore Agency Contractor
You and your company can benefit in multiple ways from my unique professional history and diverse set of skills and talents. With a career that includes military service, computer programming on platforms ranging from handheld devices to clustered VAX computers, Web development in multiple environments, and producing a regularly-scheduled cable TV program, and with experiences in multiple countries and in a wide variety of team sizes and styles, you will find that I am ready to adapt quickly to meet your needs. My current focus is on video and audio production, but I am comfortable assisting you with comprehensive consulting on Internet-related issues, as well as graphics, Web development, writing, and more.