Web Development Using Flask - Part 2
On Login, Sessions, Flush Messages, and Custom Error Handlers in Flask
...password 2. Step-by-step hardware reset procedure for this specific model 3. Remote guidance to reset password via service mode 4. On-site visit if you're local (Egypt/Cairo area) **Ideal Freelancer:** - Experience with Mitsubishi CNC systems (M80, M70, etc.) - Knowledge of PLC programming and industrial automation - Access to GX Works3 or NC Configurator2 software - Understanding of CNC password encryption methods - Can provide references from similar work **Deliverables:** - Working system password OR - Unlocked system with password disabled OR - Detailed instructions to reset password ourselves **Payment Terms:** - Milestone 1 (50%): Successful method identified - Milestone 2 (50%): System unlocked and verified working **Urgency:** HIGH - Machine is in production, nee...
...Visualize expiring / expired courses o Manage automated notifications per course • Reporting & BI o Generate reports for students, companies o Filter by course, expiry, compliance status o Export to PDF/CSV • Audit & Security o Full audit trail of admin actions o Manage passwords, two-factor authentication o Data encryption at rest and in transit 11. Security & Compliance • NZ Privacy Act 2020 compliance • Secure storage of NSN, personal data, uploaded documents • TLS/SSL encryption • Role-based access control • Backup and disaster recovery plan • Multi-factor authentication for admin access 12. Mobile App (View-Only) • Displays all certificates: current and expired • Download/share certificates • View cour...
...calendars and MS Teams for virtual interviews. • Directly share CVs with clients from portal along with a short written message. • Send bulk emails/ WhatsApp / SMS with help of portal. 4. Technical & Infrastructure Requirements • Frontend: React.js or (Must be highly optimized for mobile/low-bandwidth). • Backend: Node.js or Python. • Database: PostgreSQL or MongoDB. • Security: SSL encryption and Indian data privacy compliance. • Analytics: Dashboard for management to track "Time-to-Hire" and "Cost-per-Hire" across different recruiters. Deliverables: 1. UX/UI Design: Clean, professional, and easy-to-use interface. 2. Functional Portal: Web application deployed on a secure server. 3. WhatsApp/SMS/Email API Integration:...
...information-security principles to learners aged 10–13, and I need the visuals to do most of the heavy lifting. Every chapter will be paired with bright, colourful, cartoonish illustrations that lighten the tone without dumbing down the content. Alongside those scenes, I want clear diagrams that translate logical security concepts into relatable, real-world analogies—think “firewalls as castle walls” or “encryption as secret codes passed in class.” You’ll get a detailed chapter outline plus style references, but I’m counting on your experience in educational art and your grasp of basic infosec ideas to keep everything accurate as well as fun. Consistency in palette and line work is important because the book should feel cohesive ...
...all incoming notifications (WhatsApp, SMS, etc.) from the child's phone to the parent's phone. Instant Alerts: Real-time alerts for low battery, geofencing (entry/exit), and restricted app attempts. Usage Reports: Detailed daily/weekly reports of app activity and screen time. GPS Tracking: Continuous location updates with geofencing. Technical Requirements: Security: Mandatory End-to-End Encryption (E2EE) using AES-256 for all media streams. Persistence: Expert implementation of Android Accessibility Services and Device Admin API to prevent the app from being closed or uninstalled by the child. Infrastructure: Full setup of TURN/STUN servers and signalling for reliable WebRTC connections. UI/UX: High-end, polished interface that matches the premium feel of the o...
...analysis. Key Responsibilities Perform static and dynamic analysis of the provided APK file Detect: Backdoors or hidden communication channels if any Malicious code or injected payloads Unauthorized data collection or transmission Hardcoded credentials or API keys Suspicious permissions usage Obfuscated or encrypted hidden logic Analyze network calls and backend communication endpoints Evaluate encryption implementation and secure storage practices Identify privilege escalation or root exploitation risks Provide a detailed vulnerability report with: Severity classification (Low / Medium / High / Critical) Technical explanation Exploitation risk Recommended remediation steps Required Skills & Qualifications Strong experience in Android security testing Proficiency in tools...
...JavaScript calls remain unchanged. Key feature set • Biometric user authentication via Face ID / Touch ID • Periodic front-camera face capture and screen-grab callback • Continuous audio listening for multiple-speaker events or prohibited sounds • Real-time screen activity monitoring to detect app switching or overlays • Location / background detection to flag “out-of-exam” states • Local encryption and secure upload hooks identical to the Android flow Deliverables 1. Swift-only static or dynamic framework (no Objective-C requirement) 2. React Native bridge module with matching method names & event emitters 3. Demo React Native project proving integration and feature parity 4. Step-by-step setup / integration gui...
I need a robust web server configured specifically for storing and managing transaction records. The entire environment must meet recognized industry standards such as PCI DSS, so every layer—from operating system hardening to database encryption and network configuration—has to align with those controls. Here is what success looks like to me: • Provision a scalable server (cloud or on-prem, your recommendation) built for high-volume transaction data. • Implement advanced encryption at rest and in transit, with key management that satisfies PCI DSS. • Configure access controls, logging, and monitoring so audit trails are complete and tamper-proof. • Provide clear documentation of the architecture, compliance checkpoints, and any scripts ...
...generate and print labels for unbranded items. C. Data Synchronization & Security ● Bi-Directional Sync: Local-to-Cloud (sales, logs) and Cloud-to-Local (new products, price changes). ● Conflict Resolution: Automated logic to handle data discrepancies between multiple offline terminals. ● Role-Based Access Control (RBAC): Distinct permissions for Cashiers, Store Managers, and Super-Admins. ● Local Encryption: Encrypted local database to protect sensitive business data. D. Reporting & Back-Office ● ● Automated EOD: End-of-day (X/Z) reports generated locally. Cloud Dashboard: Centralized web view for owners to monitor multiple branches. ● Exporting: One-click exports for accounting (CSV, Excel, PDF). 3. Technical Requirements ● ● ● ● Architecture: Offline-first using a loca...
Developer will reverse engineer the AIS Utility (Java JAR) to identify 2025-26 encryption standards, salts, and key derivation, document the logic, and provide full source code. Build a standalone microservice with secure POST API to decrypt payloads and return structured JSON. Deploy on Ubuntu with Nginx, provide Swagger docs, integration guide, and full ownership of code and decryption documentation.
...services using Python and Django Develop scalable and secure APIs following API-first design principles Build and maintain backend logic, integrations, and platform services Work with data technologies such as Elasticsearch, MongoDB, and Kafka Collaborate with infrastructure teams for deployment and environment readiness Implement security best practices including authentication, authorization, encryption, and auditing Optimize application performance, scalability, and reliability Support backend architecture improvements and platform enhancements Required Skills Strong experience in Python and Django framework Solid backend development and system design experience Experience in API development and microservices architecture Working knowledge of AWS environments Understanding of ...
Our coaching sessions at Waziram and Vism Institute are streamed in the of...platforms can tap a “Download” button on any lecture and watch it later with no network connection. • Videos remain playable only for the account that downloaded them; file sharing or direct extraction is impractical. • A brief technical hand-over document explains the chosen encryption or DRM method, any server endpoints added, and the steps needed for future maintenance. If there are backend limitations, please outline alternative approaches—such as proxy caching, progressive download wrapped in encryption, or third-party services like AWS MediaConvert—that still honor login-based access control. I’m ready to supply any app builds, API keys, or test ac...
I’m bringing my health-focused website up to full HIPAA compliance and need an experienced securit...server configuration and third-party plugins against HIPAA’s Security Rule, then patch any gaps you find. • Document the changes and supply a simple compliance checklist I can keep on file for auditors. I’m on a Linux VPS running Nginx with a Laravel backend; you’re free to use Let’s Encrypt, Cloudflare Origin certs or a commercial SSL as long as renewal is automated and HSTS is enabled. Any encryption libraries you choose must be widely supported and up-to-date (OpenSSL 3+, libsodium, etc.). The work is complete when the site passes Qualys SSL Labs with an A grade, automated tests confirm data at rest is encrypted, and you’ve walked me th...
...before opening new files. Technical Preferences Frontend: React, Vue.js, or Angular for a responsive, modern UI. Backend: Node.js (Express), Python (Django/FastAPI), or PHP (Laravel). Database: PostgreSQL or MongoDB (must be secure and scalable). Document Processing: Integration with libraries like Docxtemplater, , or specialized APIs for document manipulation. Security: High-level encryption (AES-256), SOC 2 compliance standards, and multi-factor authentication (MFA). Freelancer Requirements Proven portfolio in SaaS or Enterprise Resource Planning (ERP) software. Experience with Document Automation logic or OCR (Optical Character Recognition). Knowledge of legal/accounting workflows is a massive plus. Willingness to sign a Strict Confidentiality Agreement....
...implementation: fluid animations, micro-interactions, and flawless native performance for iOS and Android. The Goal: A fully functional, polished V1.0 ready for App Store and Google Play Store submission. Core Scope for V1.0 Launch: 1. Security & Access: Robust Whitelist System (Domain-based & manual admin approval). Strict German GDPR (DSGVO) compliance with EU-based infrastructure and full data encryption. 2. Premium Discovery (Matching): Swipe-based logic for professional networking. Profile cards with multi-photo support, bios, and interest-based filtering. 3. Real-time Communication: High-speed 1-on-1 and Group Text Messaging (Attachments/File support, Emojis, Read-receipts). Note: Video/Voice and Stories are postponed to Phase 2. 4. Organization & Logistic...
...available. Deliverable 1. Step-by-step configuration (dial-plan snippets, conference profile, mod_conference settings). 2. Any Lua/ESL scripts needed to trigger recording and participant muting. 3. Quick validation session where we place a GSM call, add a SIP endpoint, verify audio both ways, start/stop recording, and toggle mute. 4. Brief notes on optional security add-ons (e.g., voice encryption) for future expansion. If you have hands-on experience blending GSM gateways with FreeSWITCH conferences, let’s get this done....
I have a Lenovo ThinkPad T480 waiting for a fresh, security-first Debian installation. The goal is a fully hardened, privacy-respecting daily-driver that ships with BOTH Mozilla Firefox and Brave, each pre-tuned for strong tracking-protection and fingerprint-resistance. This is an ADVANCED hardening job. Beyond the base install I’ll need full-disk LUKS2 encryption, secure boot/Libreboot if the hardware permits, locked-down BIOS settings, kernel and sysctl tweaks, AppArmor (or comparable MAC), DNS proxy with encrypted queries, and a firewall configured to best practice levels. I did not select a specific firewall in the form, so feel free to recommend whether UFW, iptables or firewalld is the right fit for an always-on laptop that roams between trusted and untrusted networks. ...
...related email accounts. I have the full DNS records in front of me; what I need now is an expert who can step in, talk through the options with me, and then implement a clean, secure solution. The core pain points are straightforward: restore reliable email access, align and tidy up all DNS settings, and bring these scattered platforms under one roof. Outlook feels like the right home for my mail—encryption is non-negotiable—and Gmail is definitely out. Once the current mess is resolved, I’d also like guidance on adding several new domains without breaking the setup. Deliverables I’m looking for: • Audit: Review GoDaddy, Wix, Bizee, and existing DNS records to map the current state. • Solution plan: Propose the simplest way to consolidate eve...
...courier assignment based on: Location proximity Availability Performance rating Vehicle type Manual override by admin 9. Multi-Branch / Multi-City Support Support multiple cities Support multiple operational branches Independent pricing per city/zone 10. Security & Technical Requirements Scalable cloud infrastructure API-based architecture Secure authentication (JWT / OAuth) Data encryption GDPR-compliant (if applicable) Admin activity logs Backup system 11. Performance & Scalability The system should support: High number of concurrent users Real-time updates Microservices architecture (preferred) Clean UI/UX design Deliverables Expected from Development Team Web Admin Panel Customer Website Courier App (Android & iOS) Customer App (optiona...
...engineer to migrate our existing Odoo 18 environment from to a Quebec-based private cloud. This project involves strict compliance, hardened security, and zero-data-loss migration. What You’ll Do Provision production & staging servers in Quebec Harden Ubuntu (firewall, Fail2ban, SSH, auto security updates) Deploy Odoo 18 Enterprise with Nginx, SSL/TLS, secure headers Configure PostgreSQL (encryption, tuning) Migrate database, filestore, and ~13 modules from Ensure full functionality across Accounting, CRM, HR, Sales, Inventory, Website, Manufacturing, etc. Implement encrypted daily backups (30-day retention) Provide DR and technical documentation Support testing and final production cutover Experience working in environments aligned with: Law 25 PIPEDA PCI DSS Sk...
...conversations. The goal is a lightweight, low-latency server that can authenticate users, deliver messages instantly, store chat history, and scale as the user base grows—all without the overhead of group or public room logic. I’m open to proven stacks such as Node.js with WebSocket/, Go with gRPC, or an equivalent solution that plays nicely with iOS and Android clients. End-to-end encryption, push-notification hooks (FCM / APNs), and a RESTful or GraphQL API for ancillary data are highly desirable. Deliverables • Production-ready server code with clear setup instructions • Secure user authentication and encrypted message transport • Message persistence (MongoDB, PostgreSQL, or similar) with indexing for quick retrieval • Simple admin endpo...
We are looking for an experienced full-stack developer or development team to build...board - Push notifications - SMS/Email integration - Polls & announcements 8. Reports & Dashboard - Defaulter report - Collection report - Expense report - Complaint summary - Admin dashboard with analytics Technical Requirements: - Web-based Admin Panel - Android & iOS App - Role-based access (Admin, Committee, Resident, Security, Accountant) - Cloud hosting - Secure login with OTP - Data encryption - Backup system Preferred Tech Stack (Open to Suggestions): - Frontend: React / Flutter - Backend: Node.js / Laravel / Django - Database: MySQL / PostgreSQL - Cloud: AWS / GCP Deliverables: - Complete source code - Deployment support - API documentation - 3 months post-launch support - ...
...Selenium, PyTest, Postman). • Familiarity with reverse proxy tools (NGINX, HAProxy, Envoy) and network traffic analysis. • Hands-on experience with Linux environments and shell scripting. • Graduate from a Top 50 engineering college in India as per NIRF 2025 ranking. Cloud & Security Awareness • Testing in cloud platforms (AWS, Azure, GCP) including virtualized environments. • Understanding of encryption, tunneling protocols, and digital certificates. • Exposure to DevSecOps pipelines and secure deployment practices. • Knowledge of OWASP Top 10 and vulnerability testing tools (e.g., Burp Suite, Nessus). Tools & Platforms • Jira, TestRail, Git, Jenkins, Docker • Monitoring tools (e.g., Wireshark, CloudWatch) • CI/CD integra...
...datasets o Privacy-preserving matching (hashed IDs, tokenization, etc.) o Controlled analytics and outputs only (no raw data sharing) 2. Evaluate Build vs Buy o Compare building from scratch vs existing solutions o Pros/cons, cost, scalability, vendor lock-in o Examples of real-world implementations 3. Technology recommendations o Cloud or hybrid architecture o Tools for privacy, access control, encryption o Possible use of BigQuery, Snowflake, AWS Clean Rooms, or custom stack 4. Security & Governance o Data access rules and roles o Auditability and traceability o Compliance-oriented design (financial / credit data context) 5. Deliverables o High-level architecture diagram o Recommended tech stack o Decision framework: build vs buy o Optional: roadmap for implementation Nice ...
...datasets o Privacy-preserving matching (hashed IDs, tokenization, etc.) o Controlled analytics and outputs only (no raw data sharing) 2. Evaluate Build vs Buy o Compare building from scratch vs existing solutions o Pros/cons, cost, scalability, vendor lock-in o Examples of real-world implementations 3. Technology recommendations o Cloud or hybrid architecture o Tools for privacy, access control, encryption o Possible use of BigQuery, Snowflake, AWS Clean Rooms, or custom stack 4. Security & Governance o Data access rules and roles o Auditability and traceability o Compliance-oriented design (financial / credit data context) 5. Deliverables o High-level architecture diagram o Recommended tech stack o Decision framework: build vs buy o Optional: roadmap for implementation Nice ...
...design and manage a high-quality website for our medical centre. Our goal is to build a strong local SEO presence that increases patient enquiries and online bookings while presenting a professional, trustworthy, and modern medical-grade brand. The website must have a clean, contemporary design, be fully mobile-responsive and user-friendly, and offer fast loading speeds with secure hosting and SSL encryption. It should be built on an easy-to-manage platform so our internal team can confidently update content when needed. We require a fully SEO-optimised structure, including technical SEO, on-page optimisation, schema markup, local SEO targeting, and well-written, compliant content. Following launch, we will need ongoing SEO services, performance monitoring, updates, technical sup...
...with comprehensive, end-to-end IT services. This would include setting up, managing, maintaining, and regularly updating all aspects of our IT infrastructure, including networks, servers (on-site and / or cloud-based), workstations, computers, printers, and all connectivity systems. We require ongoing management of firewalls, cybersecurity protections, antivirus and anti-malware systems, data encryption, secure remote access, backups and disaster recovery solutions, and proactive monitoring to prevent downtime. Support would also cover software installation and updates (including clinical and practice management systems - Best Practice), email systems, cloud services, data storage, compliance with healthcare data protection regulations, user access controls, hardware procurement ...
...with comprehensive, end-to-end IT services. This would include setting up, managing, maintaining, and regularly updating all aspects of our IT infrastructure, including networks, servers (on-site and / or cloud-based), workstations, computers, printers, and all connectivity systems. We require ongoing management of firewalls, cybersecurity protections, antivirus and anti-malware systems, data encryption, secure remote access, backups and disaster recovery solutions, and proactive monitoring to prevent downtime. Support would also cover software installation and updates (including clinical and practice management systems - Best Practice), email systems, cloud services, data storage, compliance with healthcare data protection regulations, user access controls, hardware procurement ...
...three forward-looking insights: predicted soil moisture over the next 6–24 h, likely weather changes in that window, and the water volume the system will probably consume. • Control logic that blends those predictions with simple rule-based safeguards (e.g., prevent watering during rain, pause if flow sensor detects anomalies). • MQTT or HTTP messaging between ESP32 nodes and the Pi, with basic encryption, plus a clear JSON schema so I can expand the network later. • Deployment scripts, pinout diagrams, and concise documentation that let me flash a fresh ESP32, drop it in the field, and see it register instantly on the Pi dashboard. Acceptance criteria 1. End-to-end simulation (sensor emulators are fine) proves that the pump and valves react correctly t...
...settings, and a clean mood-inspired interface round out the first release. What I’d like from you is a detailed project proposal that breaks down the phases, tech stack, and estimated timelines so I can judge feasibility at a glance. Feel free to suggest frameworks—whether you prefer Swift/Kotlin, React Native, or Flutter—as long as performance and native UX aren’t compromised. Security, data encryption, and compliance with each store’s policy on mental-health services are non-negotiable, so address those clearly in your plan. Acceptance criteria • Universal deployment to the App Store and Google Play, passing review. • Stable text, voice, and video sessions under average 4G conditions. • In-app purchase flow fully certified by...
...can log into from anywhere without relying on third-party subscription services. Your solution must work on the following: • Devices: Desktop, Mobile, Tablet • Operating systems: Windows, macOS Scope – Spin up and harden the VPN server (any reliable cloud provider or bare-metal host I supply). – Configure a modern, open-source protocol such as WireGuard, IKEv2, or OpenVPN with strong encryption. – Generate client profiles/installers so that connecting is a one-click experience on the platforms listed above. – Provide clear step-by-step deployment and maintenance documentation so I can recreate or scale the setup later. Acceptance Criteria 1. I can import or run the client configuration on Windows and macOS desktops, plus their mobile...
...Secure payment handling with proper success/failure callbacks Order auto-update after payment confirmation 4. Security & Anti-Spam Requirements Security is a high priority. Mandatory Security Features: CAPTCHA (Google reCAPTCHA or equivalent) for: Login Registration Contact forms Protection against: Spam orders Bot attacks Unauthorized access Secure authentication (JWT / OAuth / Sessions) Password encryption HTTPS-ready deployment Basic rate limiting & input validation Admin panel access restricted by IP/roles (preferred) 5. Technical Requirements Developers are free to suggest tech stack, but must justify it. Preferred (not mandatory): Frontend: React / / Vue / Angular Backend: Node.js / Django / Laravel Database: PostgreSQL / MySQL / MongoDB Admin panel: Custom or fram...
Job Description We are looking for an experienced game development freelancer or ...limited to) following 5 -10 real-time multiplayer games: o Ludo o Snakes and Ladder o Bubble Shooter o Pool o Poker o Archery o Candy Blast o Rummy o Carrom • Web + Android and iOS support (Unity preferred) • Real-time matchmaking and multiplayer sync • Capable of rejoining on disconnection • Session management and leader boards sync. • Encrypted data movement across network channel • Configurable encryption and decryption keys for data movement • API integration (auth, score submit, game events etc.) • Configurable API endpoints (platform-agnostic design) • Bot detection and spoofing detection and handling. • Clean, reusable, well-documented code &b...
...card, then immediately sees two numbers for each card—total limit and current utilization—visualised in a simple progress bar or gauge. • A lightweight back-end (Node, Python, PHP or similar—your choice) that pulls the credit-limit data from either a mock data source I provide or an external API if you have one in mind, stores it safely, and refreshes it on demand. • Basic authentication and encryption best practices so no sensitive data is exposed. • Clear, commented code plus a short README telling me how to deploy the site and switch data sources. Acceptance is straightforward: after deployment on my hosting account I must be able to add a sample card, refresh the data and see an updated limit-vs-usage graphic with no errors. If this so...
...three forward-looking insights: predicted soil moisture over the next 6–24 h, likely weather changes in that window, and the water volume the system will probably consume. • Control logic that blends those predictions with simple rule-based safeguards (e.g., prevent watering during rain, pause if flow sensor detects anomalies). • MQTT or HTTP messaging between ESP32 nodes and the Pi, with basic encryption, plus a clear JSON schema so I can expand the network later. • Deployment scripts, pinout diagrams, and concise documentation that let me flash a fresh ESP32, drop it in the field, and see it register instantly on the Pi dashboard. Acceptance criteria 1. End-to-end simulation (sensor emulators are fine) proves that the pump and valves react correctly t...
I need a browser-based cricket betting platform that captures the look-and-feel and feature depth of while carrying my own branding. Core requirements are straightforward: • Secure user registration and login with strong encryption and KYC-ready user profiles • A full betting engine that supports multiple match markets, real-time odds updates and settlement logic • Live scores and match data pulled through a licensed third-party sports API, streamed instantly to the UI Beyond coding the site, I also need a clear, line-by-line cost estimate covering every expenditure tied to the project—development hours, API licence fees, hosting or cloud servers, SSL, maintenance, and any other predictable outlay. Please separate one-off costs from recurring ones and sug...
...speed test that pings every available VPN server, displays latency / throughput in real time and caches the latest results for quick comparison. • Implement automatic server selection that chooses the fastest available node at launch or whenever the current connection drops, with a seamless hand-off so the user never notices the switch. The existing codebase is in Swift and already handles encryption, tunnelling and basic server switching, so you’ll be extending rather than rewriting. Clean, modular code, Git-based commits and concise inline documentation are essential because the project is actively maintained by multiple developers. Deliverables will be a pull request that builds without warnings in the latest Xcode, passes our unit tests and is ready for TestFli...
The prototype was implemented cross-platform using React Native and Firebase as a backend. Fundamental implementation choices prioritized security and interoperability: Security: AES-256 encryption of data at rest; TLS for data in transit; role-based access by family members versus clinicians. Interoperability: A modular API with FHIR-compatible endpoints for eventual EHR/RPM integration. Offline capability: local caching and deferred sync to accommodate intermittent connectivity. Accessibility: large font toggle, voice prompts, and simple language; eventual localization into Swahili and French for pilot implementations in East Africa and West Africa. Care dashboard (daily/weekly view): Task list with confirmations and shared task assignment among multiple family caregivers. Tasks c...
I have two signed Android APKs that share the same brand: a Chinese-language build that already handles user registration smoothly, and an English-language build that currently lacks this flow. My goal is to extract every user-management API call from the Chinese APK—endpoints, headers, payload structures, encryption or signing logic—and transplant that functionality into the English APK so both variants register users in exactly the same way. What I can provide: • The release APKs for both language versions • Valid test accounts and server access for live registration checks • Any additional assets the Chinese build relies on (native libraries, certificates, config files) What I need from you: • Decompile, inspect and document the Chinese APK (...
...experience. Pricing & Subscription System: Free Plan (basic CV builder, ATS check, limited templates) Professional Plan (advanced AI, premium templates, job portal, bulk emails) Enterprise Plan (unlimited usage, API access, white-label solution, dedicated support) Subscription management, upgrades, cancellations, and billing must be fully automated. Security & Compliance Requirements: Bank-level encryption (AES-256) GDPR-compliant data handling Secure authentication & authorization Role-based access control Scalable cloud infrastructure Preferred Tech Stack (Flexible): Frontend: React / Vue / Backend: Node.js / Laravel / Python Database: PostgreSQL / MySQL AI Integration: OpenAI or equivalent NLP models Hosting: AWS / GCP / DigitalOcean APIs: RESTful & scalabl...
...library • Member dashboard • Admin panel Members should receive ready-to-use TikTok, Instagram, and YouTube videos and templates every month that they can upload directly to their own channels. ⸻ Freelancer Responsibilities The freelancer will handle the full technical implementation: ⸻ 1. Website & Member Area • User registration and login system • Personal member account • Password encryption • GDPR-compliant setup ⸻ 2. Subscription System • Monthly subscription: €39.99 • 12-month initial term, then automatically monthly renewal • 1-month cancellation notice • Active/inactive status management ⸻ 3. Referral & Bonus System • Unique referral link for each member • Level 1 bonus: €1...
...OnlyOffice/Collabora ; and multi-channel notifications with conditional triggers (value thresholds, status changes). 3. AWS Deployment (cost-effective & secure) • Design an automated CI/CD pipeline similar to Project 1—deploying all updates automatically to AWS . • Use cost optimisation strategies (Spot Instances, Savings Plans) and scalability best practices . • Follow least-privilege IAM, encryption, secrets management, monitoring, and disaster recovery as above . 4. Content & SEO • All user-facing content, templates, and outputs must be fully bilingual (Arabic & English) with proper SEO meta data. 5. Security • Implement strict role-based access and audit trails. • Secure data flows, especially when handling financia...
...saving the recording to the patient file. High-level deliverables • Universal mobile & web clients connected to the same backend • Reliable device integration layer that ingests the listed vitals above without data loss • PDF/HTML reporting engine for on-demand or scheduled summaries • WebRTC-based calling module supporting call recording, screen sharing, and in-call chat • HIPAA-grade encryption for data at rest and in transit . • Will be sent to the certification and so must meet the guidelines and standard for certification. This app must be given access to patients in one side and the doctors from another side. 1) Flow at the patient side Patient must be asked to register for the first time usage (Answers predefined questions) Op...
Seeking an experienced full-stack/ML developer to build a secure, cloud-based web ...drag-and-drop upload, DICOM viewer (e.g., ), annotation overlays & heatmaps. • Python backend (FastAPI preferred) + secure auth, encrypted file handling, and cloud storage (AWS S3/GCP). • PyTorch/TensorFlow ML models (fine-tune YOLO/U-Net/MONAI on open dental datasets) for multi-label detection/segmentation. • Mandatory: Full anonymization on upload (pydicom/deid), end-to-end encryption, audit logs, compliance-ready (HIPAA/GDPR/APP principles), ethical transparency (e.g., explainability features). • Cloud deployment (AWS/GCP/Azure, serverless ideal). NDA required. Bid with experience in medical AI, proposed stack, and quote. Looking forward to ethical, privacy-first co...
...capability: advanced data analysis pipelines, automated machine-learning model training, and real-time data processing must all run exactly as they do today, the backlog shows the must have and like to have items. While you carry out the migration, I also have a strategic improvements folded in: a markedly stronger security layer to SOc2 standard. Think IAM best practices, VPC segregation, encryption at rest and in transit, and documented threat-model testing. Key deliverables • AWS infrastructure designed and provisioned as code (Terraform or CloudFormation) and fully documented • All current services, models and data pipelines ported, validated for functional parity and performance - provide guardrails around the AI to reduce hallucinations • Work wi...
...English), including RTL (Right-to-Left) support for the Arabic interface. : Complete, clean, and documented source code, including uploading to and ensuring acceptance on the Apple App Store and Google Play Store. Sixth: Security & Data: : Full compliance with the Personal Data Protection Law (PDPL) in Saudi Arabia and National Cybersecurity Authority (NCA) standards. 2.Encryption: Encryption of all sensitive data (customer info, addresses, payments) using advanced protocols (e.g., AES-256) and securing connections via SSL/TLS. Security: Securing endpoints against attacks (SQL Injection, XSS) and using Two-Factor Authentication (JWT). Residency: Commitment to local data storage within Saudi Arabia as per regulatory requirements. Testing: Delivery of
I’m building an end-to-end lending experience for iOS that feels as smooth as Slice or Moneyview. The job covers both sides of the stack: a sleek native iOS front end and a secure, scalable back end with the APIs that power it. On the user side th...migrations set up for user, loan, repayment, and audit tables. • API documentation so future teams can extend the platform. • Basic admin or Postman collection to verify every endpoint. I’ll provide UI references and the exact scoring rules once we start; everything else—architecture, tooling, CI/CD, and unit tests—should follow best practices and modern fintech security guidelines (OWASP, encryption at rest and in transit). If you have shipped at least one finance or payments product before, let&...
...I expect • Full remote-control of the host PC, including keyboard and mouse input, with smooth, real-time streaming. • Secure file transfer in both directions. • Single sign-on authentication so my team can log in with our existing identity provider rather than juggling extra passwords. Please focus only on Windows for the first release; 32- and 64-bit compatibility is required. Strong encryption, minimal latency, and a lightweight footprint are important, but persistence is critical—the host must not be able to quit or uninstall the service through normal user actions. Deliverables 1. Installer that registers the background service, configures auto-start, and supports silent deployment. 2. Admin console or web portal that lets me manage connectio...
...Processing Lambda (validation, rules engine) EC2 (stress testing engines, Monte Carlo) Glue ETL (transform pipelines) Step Functions (workflow orchestration) Streaming & APIs API Gateway (data submissions) Kinesis (real-time data ingestion) AI / ML SageMaker (fraud detection, early warning models) Neptune (graph AML network analytics) Redshift ML (ratio prediction) Monitoring & Security IAM / RBAC KMS encryption CloudTrail / GuardDuty CloudWatch Visualization QuickSight dashboards 4. CORE DATA INGESTION PIPELINE Institution → API Gateway → S3 Raw → Lambda Validation → S3 Processed → Glue → Redshift → Dashboards Validation must check: Schema correctness Duplicate submissions Logical consistency Submission manifest integrity 5. DATASETS ...
...conversations. The goal is a lightweight, low-latency server that can authenticate users, deliver messages instantly, store chat history, and scale as the user base grows—all without the overhead of group or public room logic. I’m open to proven stacks such as Node.js with WebSocket/, Go with gRPC, or an equivalent solution that plays nicely with iOS and Android clients. End-to-end encryption, push-notification hooks (FCM / APNs), and a RESTful or GraphQL API for ancillary data are highly desirable. Deliverables • Production-ready server code with clear setup instructions • Secure user authentication and encrypted message transport • Message persistence (MongoDB, PostgreSQL, or similar) with indexing for quick retrieval • Simple admin endpo...
On Login, Sessions, Flush Messages, and Custom Error Handlers in Flask
How safe is your online communications? Here are simple tips on how to get started on encryption.
Here are some nifty OTR (off-the-record) apps to beef up your mobile privacy and security