Designing and coding of job search mechanism, Computer Network Security

Designing and coding of Job search mechanism:

Project Title: FREEHIVE (Sep 2005- Nov 2006)

Role             : Developer

Domain         : Social Network

Client          : Zytes Technologies Pvt. Ltd.

Environment : JAVA, J2EE, Struts, Hibernate, JavaScript, HTML, XML, CSS, Tomcat, Sql Server 2000, Eclipse, Windows XP, CVS, ANT.

Description:

                   Project is developed for creating and improving the career networking among his friends, colleagues, and relations.· Site provides to improve the communication in all the wide range between the friends, and site is used to convey his/her thinking and the way of his work, and user can also do the job postings for the current requirement and the improvement of the carrier. Also site provided to maintain their relation and can also put their effects in the word.

Responsibilities:    

  • Involved in designing and coding of Job search mechanism.
  • Involved in designing and coding of Job search result pagination.
  • Involved in designing and coding of Registration module.
  • Involved in designing and coding of getting the contacts from CSV file.
  • Implemented the TinyMCE editor in comment section.

 

Posted Date: 12/24/2012 5:21:50 AM | Location : United States







Related Discussions:- Designing and coding of job search mechanism, Assignment Help, Ask Question on Designing and coding of job search mechanism, Get Answer, Expert's Help, Designing and coding of job search mechanism Discussions

Write discussion on Designing and coding of job search mechanism
Your posts are moderated
Related Questions
Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

Write Pseudocode for the password guessing algorithm: Consider the following authentication protocol: Client Transmission Host

Security Clearances For a security clearance in organizations each data user should be assigned a single level of authorization indicating classification level. Before approachi

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

In this assignment, you are required to emulate the operation of a link layer and network layer protocols in a small computer network. Your program should behave like a single node

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to di

Need Assignemnt help in Information security assignemnt

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.