Designing and coding of job search mechanism, Computer Network Security

Designing and coding of Job search mechanism:

Project Title: FREEHIVE (Sep 2005- Nov 2006)

Role             : Developer

Domain         : Social Network

Client          : Zytes Technologies Pvt. Ltd.

Environment : JAVA, J2EE, Struts, Hibernate, JavaScript, HTML, XML, CSS, Tomcat, Sql Server 2000, Eclipse, Windows XP, CVS, ANT.

Description:

                   Project is developed for creating and improving the career networking among his friends, colleagues, and relations.· Site provides to improve the communication in all the wide range between the friends, and site is used to convey his/her thinking and the way of his work, and user can also do the job postings for the current requirement and the improvement of the carrier. Also site provided to maintain their relation and can also put their effects in the word.

Responsibilities:    

  • Involved in designing and coding of Job search mechanism.
  • Involved in designing and coding of Job search result pagination.
  • Involved in designing and coding of Registration module.
  • Involved in designing and coding of getting the contacts from CSV file.
  • Implemented the TinyMCE editor in comment section.

 

Posted Date: 12/24/2012 5:21:50 AM | Location : United States







Related Discussions:- Designing and coding of job search mechanism, Assignment Help, Ask Question on Designing and coding of job search mechanism, Get Answer, Expert's Help, Designing and coding of job search mechanism Discussions

Write discussion on Designing and coding of job search mechanism
Your posts are moderated
Related Questions
In broadcast topology there are further two types 1) SATELLITE\RADIO 2) RING TOPOLOGY In a radio or satellite topology every computers are connected to each other via radio o

(a) Mention the five main security services. (b) What is a passive attack? Give an example of passive attack? (c) What four types of active attacks and mention their respecti

QUESTION a) Compare and contrast between static and dynamic routing. b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

Techniques for combating Spam mails Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to

There is another probing methods i-e Trace Route. To get more detail it is used     As given in the figure about the route to DANDELION-PATCH.MIT.EDU was looked out a

Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

QUESTION: a) Explain four issues that are generally addressed in the Needs Analysis phase in the building-block approach to network design. b) Sketch a typical hybrid star-b

QUESTION (a) Compare and contrast phishing and pharming attacks (b) Nowadays, web defacement may not always be visual (i) Explain web defacement (ii) What is the main

Discuss the risks of having a single root user