Social network development in java , Computer Network Security

Social Network development in Java:

Project Title: SUGGESTLOCAL (Nov 2006-April 2007)

Role             : Developer

Domain        : Social Network

Client          : Zytes Technologies Pvt. Ltd.

Environment : Java, J2EE, Yahoo Location Search Engine, JavaScript, AJAX, HTML, XML, CSS, Tomcat, Sql Server 2000, Eclipse, Windows XP, CVS, ANT.

Description:

                   Project is super-easy collaboration engine that allows busy people to arrange get-togethers and discuss and decide what to do or buy. SuggestLocal enables to find the right place to meet up with family and friends or get reviews and suggestions from people you trust and also it makes online collaboration to Discuss & Decide, simple, fast and secure.

Responsibilities:

  • Involved in designing and coding of Local Venue Search.
  • Involved in designing and coding of Own item suggestion.
  • Involved in designing and coding of Viewing the search results on map.
  • Involved in designing and coding of Add Notes feature.
  • Involved in designing and coding of Only for discussion feature.
  • Implemented the yahoo calender for Proposed date and time.
  • Involved in designing and coding of Sending messages.
  • Involved in designing and coding of Forwording suggestion.
  • Involved in designing and coding of Add New Item feature.
  • Implemented Jajah.com feature for allowing the user to make a phone call to his friends.

 

Posted Date: 12/24/2012 5:20:39 AM | Location : United States







Related Discussions:- Social network development in java , Assignment Help, Ask Question on Social network development in java , Get Answer, Expert's Help, Social network development in java Discussions

Write discussion on Social network development in java
Your posts are moderated
Related Questions

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

INTRODUCTION TO CRYPTOGRAPHY Cryptography The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of

Confidentiality Confidentiality of information ensures that only those with sufficient privileges may access specific information. When unauthorized individuals can access inform

Screened Subnet Architecture This setup provides an extra security layer to screened host architecture by creating a perimeter subnet which further isolates internal network f

Systems-Specific Policy (SysSP) SysSPs are codified as standards and procedures which are used when configuring or maintaining systems. Systems specific policies fall into 2 g

The "Big Red Rocks" (BRR) mining company is based and operates in Western Australia. They are primarily an iron ore miner, but they also produce electricity through tidal power to

All references using actual quotes, paraphrase, or specific arguments, should employ page numbers. The essay is based on the unit content and should engage with the set readings, a