October 29th, 2010, 02:19 PM
Post Count Number #1
www.conjoinix.com Chandigarh : Web Designer
Web Designers
Required Web Designers with minimum 2 years experience in Web Designing. An ideal candidate should have complete knowledge of Web Designing and hand-on experience in Abode Photoshop, Macromedia Flash, Macromedia Dreamweaver, HTML, Javascript, etc.
Number of Openings : 2
Job Location : Chandigarh
Web Developers
Required Web Developers with minimum 2 years experience in Internet Application Development. An ideal candidate should have complete knowledge of Software Development cycle and hand-on experience in ASP, Perl / PHP, MS SQL, SQL, MySql, Access. Knowledge of JSP, Java and other Development tools / Database would be added plus.
Number of Openings : 1
Job Location : Chandigarh
Software Engineers
Required Software Engineers with minimum 2 years experience in Software Application Development. An ideal candidate should have complete knowledge of Software Development cycle and hand-on experience in Visual C++/Visual Basic, C/C++, Perl, MS SQL, SQL, MySql, Access. Knowledge of Java would be added plus.
Number of Openings : 1
Job Location : Chandigarh
Email your Resume to : careers@conjoinix.com
About us :
Conjoinix, with an aim to develop World-class, competent High Quality solutions at competitive low cost price through its competent, focused, dynamic, hard working and prosperous team of Professionals, currently operates from Punjab, India.Conjoinix , a sister concern of the Himachal Wire Group of Companies , is led under the able guidance of highly experienced Business professionals.
Contact us :
Conjoinix
InstaXS Internet & Data Centre Services Conjoinix
SCO 91-92-93, Sector 34A,
Chandigarh - 160034
UT, INDIA
Phone : (+91) 172-5017541, 5003541
http://www.conjoinix.com
July 28th, 2011, 11:14 AM
Post Count Number #2
IJT addict
Name : Sivasubramanian.A
Email : siva_528 AT ymail.com
Designation / Skillset : c,c++,java
Resume
Resume :
Objective :
To build a successful career in the field of Information Technology Industry, utilizing my analytical, problem solving, communication and interpersonal skills and fast learning abilities. .
PROFESSIONAL SKILL SET :
Operating System Win 98, Win NT,DOS
Languages C, C++,Java
Databases SQLServer2000, MS-Access
Side Courses :
- Diploma in [Computer Programming] from [Trec-Step, Trichy] with “C” grade[60.00%] in [February 2007 – April 2007]. [Promoted by : Department of Science and Technology, Govt. of India, New Delhi].
- Diploma in [Computer Hardware] from [Systec, Trichy] in [July 2007 – Augest 2007].
Education :
- MCA in [Computer Application] from [Sathyabama University, Chennai] with First class in [April 2011].
Aggregate : 69% .
- B.SC in [Computer Science] from [Jamal Mohammed College, Bharathidasan University, Trichy] with First class in [April 2008].
Aggregate : 64%.
- HSC Passed in Second class, [56. 00%] from [St.Joseph’s Hr.Sec.School, Cuddalore] in [March 2005.]
- SSLC Passed in First class, [77.00%] from [St.Joseph’s Hr.Sec.School, Cuddalore] in [March 2003.]
Curriculum Project :
Project Title : “User Authentication for USB (USB PROTECTOR)”.
Client : Sindoori Faber, Chennai.
Duration : 4 months (December 2010-April 2011)
Team Size : 1
Environment : Java
Brief Overview of Project :
USER AUTHENTICATION FOR USB (USB PROTECTOR) is a Hardware based project. It is used to protect the USB devices connected to the USB Port on the System such as printer, keyboard, mouse, etc and the mainly this project used to protect the removable storage device such as pen drive, flash memory, etc. The port protection can be applied before manually through the disabling the USB Hub, but it can be enabled when connecting the new USB device to the System so to overcome this procedure the USB hub can be disabled on the Window System Registry. USB Device Check it can be done on the entire network system and display the systems having the USB device, from this the one more option is added to the list and Mapping Network Drive, if the USB device is removable storage device then that can be defined by drive letter so the Mapping option is also give to the USB device search. When Mapping the Network Drive the system can convert to Hash code this can be accomplished by the Encrypt and Decrypt the password so the others may not find it. Depending upon the User accessing the USB device the Access Permission to the User can be set. The USB devices can have two types Input type and Output type depending upon that type the User can access the USB devices..
Declaration :
I consider myself familiar with COMPUTER SCIENCE AND ENGINEERING Aspects. I am also confident of my ability to work in a team. I hereby declare that the information furnished above is true to the best of my knowledge.
Date :
Place :
(Sivasubramanian.A)
-------------------------------------------------------
More Information about this submission and submitter :-
___________________________________________________
Submission ID : 4379855
Date & Time : 17th Jul 2011 5:59 AM (UTC)
IP Address : 116.203.219.128
Browser Info : Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Predicted Country : --