Social network development in java , Computer Network Security

Social Network development in Java:

Project Title: SUGGESTLOCAL (Nov 2006-April 2007)

Role             : Developer

Domain        : Social Network

Client          : Zytes Technologies Pvt. Ltd.

Environment : Java, J2EE, Yahoo Location Search Engine, JavaScript, AJAX, HTML, XML, CSS, Tomcat, Sql Server 2000, Eclipse, Windows XP, CVS, ANT.

Description:

                   Project is super-easy collaboration engine that allows busy people to arrange get-togethers and discuss and decide what to do or buy. SuggestLocal enables to find the right place to meet up with family and friends or get reviews and suggestions from people you trust and also it makes online collaboration to Discuss & Decide, simple, fast and secure.

Responsibilities:

  • Involved in designing and coding of Local Venue Search.
  • Involved in designing and coding of Own item suggestion.
  • Involved in designing and coding of Viewing the search results on map.
  • Involved in designing and coding of Add Notes feature.
  • Involved in designing and coding of Only for discussion feature.
  • Implemented the yahoo calender for Proposed date and time.
  • Involved in designing and coding of Sending messages.
  • Involved in designing and coding of Forwording suggestion.
  • Involved in designing and coding of Add New Item feature.
  • Implemented Jajah.com feature for allowing the user to make a phone call to his friends.

 

Posted Date: 12/24/2012 5:20:39 AM | Location : United States







Related Discussions:- Social network development in java , Assignment Help, Ask Question on Social network development in java , Get Answer, Expert's Help, Social network development in java Discussions

Write discussion on Social network development in java
Your posts are moderated
Related Questions
Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Consider the details of the X.509 certificate shown below. a. Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the nam

QUESTION The major decision hierarchy for disclosing security problems is if the problem is with the product owned by the business or if it is used by the business. Although th

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

WIRELESS SECURITY TOOLS An organization which spends its time securing wired network and leaves wireless networks to operate in any manner is opening itself up for security brea

Problem: (a) Use a simple example to explain what is meant by a finite state machine. (b) Describe the time limit problem in an interrupt-driven system. (c) A certain m

You see two IP addresses. The IP address 192.168.58.130 is the one of Bt4. The IP address 192.168.58.133 has ports 135 and 445 open; which indicates that it is a Windows machine. S

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li