Social network development in java , Computer Network Security

Social Network development in Java:

Project Title: SUGGESTLOCAL (Nov 2006-April 2007)

Role             : Developer

Domain        : Social Network

Client          : Zytes Technologies Pvt. Ltd.

Environment : Java, J2EE, Yahoo Location Search Engine, JavaScript, AJAX, HTML, XML, CSS, Tomcat, Sql Server 2000, Eclipse, Windows XP, CVS, ANT.

Description:

                   Project is super-easy collaboration engine that allows busy people to arrange get-togethers and discuss and decide what to do or buy. SuggestLocal enables to find the right place to meet up with family and friends or get reviews and suggestions from people you trust and also it makes online collaboration to Discuss & Decide, simple, fast and secure.

Responsibilities:

  • Involved in designing and coding of Local Venue Search.
  • Involved in designing and coding of Own item suggestion.
  • Involved in designing and coding of Viewing the search results on map.
  • Involved in designing and coding of Add Notes feature.
  • Involved in designing and coding of Only for discussion feature.
  • Implemented the yahoo calender for Proposed date and time.
  • Involved in designing and coding of Sending messages.
  • Involved in designing and coding of Forwording suggestion.
  • Involved in designing and coding of Add New Item feature.
  • Implemented Jajah.com feature for allowing the user to make a phone call to his friends.

 

Posted Date: 12/24/2012 5:20:39 AM | Location : United States







Related Discussions:- Social network development in java , Assignment Help, Ask Question on Social network development in java , Get Answer, Expert's Help, Social network development in java Discussions

Write discussion on Social network development in java
Your posts are moderated
Related Questions
QUESTION a) Compare and contrast between static and dynamic routing. b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First

I am ryan, i am looking for data security and network assignment help, Do you have experts in data security?

Electronic Mail: Electronic mail which is famous as e-mail, as it is known to its number of users, has been around for more than two decades. Before 1990, it was mainly used in

USING ICMP TO TEST REACHABILITY:  ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. P

Question: (a) Explain briefly the PCI Control Objectives which enterprises must meet to be compliant with the Payment Card Industry Data Security Standard (PCI DSS). Specify a

Australian government sites were mandated to conform to at least single 'A' level of the World Wide Web Consortium (W3C) Web Accessibility Initiative (WAI) standards, by the end of

TCP and UDP End-to-end delivery application is connection less. The basic function of connectionless service are as given: It adds extension of LAN abstraction. It has simp

doing coursework in Network Security to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design shou

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any