Social network development in java , Computer Network Security

Social Network development in Java:

Project Title: SUGGESTLOCAL (Nov 2006-April 2007)

Role             : Developer

Domain        : Social Network

Client          : Zytes Technologies Pvt. Ltd.

Environment : Java, J2EE, Yahoo Location Search Engine, JavaScript, AJAX, HTML, XML, CSS, Tomcat, Sql Server 2000, Eclipse, Windows XP, CVS, ANT.

Description:

                   Project is super-easy collaboration engine that allows busy people to arrange get-togethers and discuss and decide what to do or buy. SuggestLocal enables to find the right place to meet up with family and friends or get reviews and suggestions from people you trust and also it makes online collaboration to Discuss & Decide, simple, fast and secure.

Responsibilities:

  • Involved in designing and coding of Local Venue Search.
  • Involved in designing and coding of Own item suggestion.
  • Involved in designing and coding of Viewing the search results on map.
  • Involved in designing and coding of Add Notes feature.
  • Involved in designing and coding of Only for discussion feature.
  • Implemented the yahoo calender for Proposed date and time.
  • Involved in designing and coding of Sending messages.
  • Involved in designing and coding of Forwording suggestion.
  • Involved in designing and coding of Add New Item feature.
  • Implemented Jajah.com feature for allowing the user to make a phone call to his friends.

 

Posted Date: 12/24/2012 5:20:39 AM | Location : United States







Related Discussions:- Social network development in java , Assignment Help, Ask Question on Social network development in java , Get Answer, Expert's Help, Social network development in java Discussions

Write discussion on Social network development in java
Your posts are moderated
Related Questions
a) Wireless local area network (WLAN) technologies constitute a fast-growing market introducing the flexibility of wireless access into office, home, or production environments. G

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

Problem 1: What does the SNMP access policy show? SNMP community diagram SNMP access policy Problem 2: Does there exist any formal functional specificat

Packet Filtering Firewall Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interco

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi