Social network development in java , Computer Network Security

Assignment Help:

Social Network development in Java:

Project Title: SUGGESTLOCAL (Nov 2006-April 2007)

Role             : Developer

Domain        : Social Network

Client          : Zytes Technologies Pvt. Ltd.

Environment : Java, J2EE, Yahoo Location Search Engine, JavaScript, AJAX, HTML, XML, CSS, Tomcat, Sql Server 2000, Eclipse, Windows XP, CVS, ANT.

Description:

                   Project is super-easy collaboration engine that allows busy people to arrange get-togethers and discuss and decide what to do or buy. SuggestLocal enables to find the right place to meet up with family and friends or get reviews and suggestions from people you trust and also it makes online collaboration to Discuss & Decide, simple, fast and secure.

Responsibilities:

  • Involved in designing and coding of Local Venue Search.
  • Involved in designing and coding of Own item suggestion.
  • Involved in designing and coding of Viewing the search results on map.
  • Involved in designing and coding of Add Notes feature.
  • Involved in designing and coding of Only for discussion feature.
  • Implemented the yahoo calender for Proposed date and time.
  • Involved in designing and coding of Sending messages.
  • Involved in designing and coding of Forwording suggestion.
  • Involved in designing and coding of Add New Item feature.
  • Implemented Jajah.com feature for allowing the user to make a phone call to his friends.

 


Related Discussions:- Social network development in java

What are the main objectives of a risk analysis, QUESTION 1 Risk ana...

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

Pgp encryption, Produce a short report of your experiences in installing an...

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items: A de

Introduction to risk management and its component, INTRODUCTION TO RISK MAN...

INTRODUCTION TO RISK MANAGEMENT Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed

Imap and pop functions, How does the POP functions? What are the advantages...

How does the POP functions? What are the advantages/benefits of IMAP over POP? POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protoc

Steganography-cryptography, Steganography It is a process of hiding info...

Steganography It is a process of hiding information in use for a long time. Most popular modern version of this process hides information within files appearing to contain digit

ISDN, Explain the architecture of ISDN.....?

Explain the architecture of ISDN.....?

CNSS Security model, "Using the CNSS Model, examine each of the cells and w...

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

Growth of lan technology, GROWTH OF LAN TECHNOLOGY The production of s...

GROWTH OF LAN TECHNOLOGY The production of shared communication channels (LANs) started in 1960s and early 1970. The basic idea behind was to reduce the number of connectio

Emerging threats related to use of networks, Question requires you to submi...

Question requires you to submit a proposal based on the research report topic you will be addressing in the second assignment.  Note:  before commencing research on the topic, y

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd