Designing and coding of job search mechanism, Computer Network Security

Designing and coding of Job search mechanism:

Project Title: FREEHIVE (Sep 2005- Nov 2006)

Role             : Developer

Domain         : Social Network

Client          : Zytes Technologies Pvt. Ltd.

Environment : JAVA, J2EE, Struts, Hibernate, JavaScript, HTML, XML, CSS, Tomcat, Sql Server 2000, Eclipse, Windows XP, CVS, ANT.


                   Project is developed for creating and improving the career networking among his friends, colleagues, and relations.· Site provides to improve the communication in all the wide range between the friends, and site is used to convey his/her thinking and the way of his work, and user can also do the job postings for the current requirement and the improvement of the carrier. Also site provided to maintain their relation and can also put their effects in the word.


  • Involved in designing and coding of Job search mechanism.
  • Involved in designing and coding of Job search result pagination.
  • Involved in designing and coding of Registration module.
  • Involved in designing and coding of getting the contacts from CSV file.
  • Implemented the TinyMCE editor in comment section.


Posted Date: 12/24/2012 5:21:50 AM | Location : United States

Related Discussions:- Designing and coding of job search mechanism, Assignment Help, Ask Question on Designing and coding of job search mechanism, Get Answer, Expert's Help, Designing and coding of job search mechanism Discussions

Write discussion on Designing and coding of job search mechanism
Your posts are moderated
Related Questions
TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

What is one-time pad for encryption?  Describe how it offers both Confusion and Diffusion. Using the letter encoding discussed in class (along with one-time

Question: (a) Distinguish between Steganograhy and Cryptography. (b) "Playfair cipher is more secure than Monoalphabetic cipher." Justify this statement. (c) Various ap

Problem (a) As a forensic investigator, you are needed to trace the source of an email. It is suspected that the email header has been forged. Show how you would proceed to

An overall rise in mobility, coupled with the falling cost of Wi-Fi equipment, has led to a proliferation of Wi-Fi hot spots in public areas to provide Internet accessibility. Thus

Describe the salient features of the multimedia. Also explain the applications of it. Multimedia can be understood as follows: Multimedia is on the whole a media which makes

What is the concept of topology?

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

I need a help on how to write good assignment on the above topic

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t