Designing and coding of job search mechanism, Computer Network Security

Designing and coding of Job search mechanism:

Project Title: FREEHIVE (Sep 2005- Nov 2006)

Role             : Developer

Domain         : Social Network

Client          : Zytes Technologies Pvt. Ltd.

Environment : JAVA, J2EE, Struts, Hibernate, JavaScript, HTML, XML, CSS, Tomcat, Sql Server 2000, Eclipse, Windows XP, CVS, ANT.

Description:

                   Project is developed for creating and improving the career networking among his friends, colleagues, and relations.· Site provides to improve the communication in all the wide range between the friends, and site is used to convey his/her thinking and the way of his work, and user can also do the job postings for the current requirement and the improvement of the carrier. Also site provided to maintain their relation and can also put their effects in the word.

Responsibilities:    

  • Involved in designing and coding of Job search mechanism.
  • Involved in designing and coding of Job search result pagination.
  • Involved in designing and coding of Registration module.
  • Involved in designing and coding of getting the contacts from CSV file.
  • Implemented the TinyMCE editor in comment section.

 

Posted Date: 12/24/2012 5:21:50 AM | Location : United States







Related Discussions:- Designing and coding of job search mechanism, Assignment Help, Ask Question on Designing and coding of job search mechanism, Get Answer, Expert's Help, Designing and coding of job search mechanism Discussions

Write discussion on Designing and coding of job search mechanism
Your posts are moderated
Related Questions
Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

IPV6 DATAGRAM FORMAT It is given in the figure below:


Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

types of firewall and backup

'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these: A suitable device (such as a mobile pho

Information and Network Security Part 1- Recovery of an encrypted `word' using a forward search attack. Complete and correct summary for part 1. Adequately commented, clea

Question: (a) Explain briefly the PCI Control Objectives which enterprises must meet to be compliant with the Payment Card Industry Data Security Standard (PCI DSS). Specify a

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif