PowerJobs Website. Company name: Softwear Suit, Ltd. Students: Shiri Semo Tomer Mansur Technical advisor: Itzik.

Slides:



Advertisements
Similar presentations
RP Designs Semi-Custom e-Commerce Package. Overview RP Designs semi- custom e-commerce package is a complete website solution. Visitors can browse a catalog.
Advertisements

Presented by Brad Jacobson The Publisher on the Web Exploiting the new online sales channels.
Mastercard Internet Gateway Service (MIGS) – Test Demonstration
Extern name server - translates addresses of s messages - enables users to use aliases - … ID cards system - controls entrance to buildings,
09/04/2015Unit 2 (b) Back-Office processes Unit 2 Assessment Criteria (b) 10 marks.
CyberThink Ecommerce Shopping Cart
Simple Format Easy to use Internet ready Visit our website at
Simple and Secure Approach to Discovery at the Desktop.
WEST Presented By 3s. Introduction Project Overview Project Overview Use Case Diagram Use Case Diagram Domain Model Diagram Domain Model Diagram UI for.
Turners SharePoint Web Site How we did it. 2 Page Anatomy Custom Search Web Part Custom Search Web Part Data Form Web Parts Content Query Web Part HTML.
INVESTMENT GAME IN SOCIAL NETWORK Academic Advisor: Dr. Yuval Alovici Professional Advisor: Dr. Mayer Goldberg Team Members: Ido Bercovich Dikla Mordechay.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
SOCIAL NETWORK INFORMATION CONSOLIDATION Developers:  Klasquin Tomer  Nisimov Yaron  Rabih Erez Advisors:  Academic: Prof. Elovici Yuval  Technical:
Business Information Systems Research Project in Information Systems (IS4401)
DotNet Market Web Site “EMarket” Milena Natanov Project Supervisor: Victor Kulikov Lab Chief Engineer: Dr. Ilana David Semester spring, – Project.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
People Technical AdvisorsAcademic AdvisorFinal Project By Prof. Shlomi Dolev Prof. Ehud Gudes Boaz Hilemsky Dr. Aryeh Kontorovich Moran Cohavi Gil Sadis.
Uniqueness of user names is enforced Customer information logged to database Require contact information as well as address address will.
Nu Contract Management System A web based tool to manage contracts.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Presented By: Shashank Bhadauriya Varun Singh Shakti Suman.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
MS Access Advanced Instructor: Vicki Weidler Assistant:
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
By Daniel Siassi.  XHTML  For Structure  CSS  For Stylization of Structure  SQL Database  Store Customer, Calendar, and Order Data  PHP  Server-side.
Statistical Databases: A short review Slide: 1 Demonstration of the Prototype model for ECA Statistical Database Statistical Database Application March.
what is contacts? In-contacts is an online contacts database designed from the ground up to be compatible with modern business needs.
Nu Vendor Management System A web based tool to Manage Vendors.
Online Music Store MSE Project Presentation I Presented by: Reshma Sawant Major Professor: Dr. Daniel Andresen.
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
Moving and Auto Relocation System Vista SrimanSoft, LLC. Solutions at your Mouse Click [ M A R S ] Vista SrimanSoft, LLC. Solutions at your Mouse Click.
© 2011 IBM Corporation Air India Ltd. Fileserver Friday September 23, 2011.
Designing an Inventory Database System CS489 Research Project in Computer Science John Ahigian Advisor: Dr. Wang CS489 Research Project in Computer Science.
Prestashop is an open source e-commerce application. It is written in PHP and is based on Smarty template engine. It can incorporate the advantages of.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
Topic Cafeteria Management System
LOGO 2 nd Project Design for Library Programs Supervised By Dr: Mohammed Mikii.
Phone: Mega AS Consulting Ltd © 2007  CAT – the problem & the solution  Using the CAT - Administrator  Mega.
First in Service -Best in Banking Pavan Anna Shirish Nadella Maneeshpal Bandlamudi.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Okalo Daniel Ikhena Dr. V. Z. Këpuska December 7, 2007.
Case Study Dynamic Website - Three Tier Architecture
HTML, Third Edition--Illustrated Brief 1 HTML, Third Edition Illustrated Brief Unit A Creating an HTML Document.
DataFlow Diagram – Level 0
Registration Solutions for your Event Management.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
WEB SERVER SOFTWARE FEATURE SETS
SMARTSHOP By: EVN BHARGAV NAGARAJU NAIDU – SASHI TERLI Belligerents.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
An ad in the yellow pages can cost up to $x It’s the same ad until the next publication! A full page ad in a specialty magazine can cost $2000 It’s the.
 Project Team: Suzana Vaserman David Fleish Moran Zafir Tzvika Stein  Academic adviser: Dr. Mayer Goldberg  Technical adviser: Mr. Guy Wiener.
Presentation on Online Shopping
Customer Care & Help Desk. Content  What is Help Desk?  Who should use these?  Features of Help Desk  Hierarchy of Help Desk (Level of User)  Flow.
LOGO YOFOTO WEBSITE Capstone Project Yofoto Team Supervisor Nguyễn Hồng Kỳ Vũ Phương Dung Lương Xuân Hải Đào Thiện Đăng Trần Quang.
F&F Wholesale E-Commerce Web site Client: F&F Wholesale Internet Application Developers: Joe Schmaltz Julie Carter.
Speed Cash System. Purpose of the Project  online Banking Transaction Information.  keeping in view of the distributed client server computing technology,
Administrative System for a Speech Pathology Office By Devin Peterman.
HOW TO USE GOOGLE WEBMASTER TOOLS TO IMPROVE SEO ? GOOGLE WEBMASTEER.
iShop Training Module Access & Security
Web Design & Development
Php Target Clone - Php Target Script - Macys Clone - Macys Script - Rakuten Script.
SAP Hybris Overview  SV Trainings SAP Hybris Training program is developed to make you expert in working with Hybris Technology. SAP Hybris has been.
Security concerns of web applications with database access
Login & administration page
Building my on-line store
SharePoint Online Hybrid – Configure Outbound Search
Designing IIS Security (IIS – Internet Information Service)
Security - Forms Authentication
Presentation transcript:

PowerJobs Website

Company name: Softwear Suit, Ltd. Students: Shiri Semo Tomer Mansur Technical advisor: Itzik Katzav Academic advisor: Dr. Goldberg Mayer

Our Solution Provides all information transfer needs between candidates and man power companies. Makes the process of adding a candidate to a candidate pool efficient.

Problem Domain

System Architecture

Two main modules: DM – the candidates' module - The web application will be written using ASP.NET technologies. - The DM will access the DMDB using SQL queries. PM – the companies’ module - The PM will be written in C#. - The PM will access the PMDB using SQL queries. - The PM will access the DMDB using web services.

Requirements

Functional Requirements DM – Candidates’ module Creating a candidate card Logging in to an existing card Performing a candidate card update Viewing published positions Performing a position search Managing a position cart Applying for a position

Functional Requirements PM – Companies’ module: Publishing a position Modifying published positions Removing a published position Synchronizing modules

Functional Requirements Administrative: Adding new company

Non-Functional Requirements Response Time The user should receive a response within no more than 3 seconds, for the following actions: Creating a new candidate card. Performing a candidate card update. Logging in to an existing card. Performing a position search. Operations performed on shopping cart.

Non-Functional Requirements Safety & Security Candidate details will be transferred over the internet encrypted. Candidate’s password should be stored encrypted. Validating the identity of the synchronization initiator will be required.

Use Cases

Use-cases Creating a candidate card

Use-cases Logging in to an existing card

Use-cases Performing a candidate card update

Use-cases Performing a position search

Use-cases Adding a position to a position cart

Use-cases Viewing the content of a position cart

Use-cases Removing a position from a position cart

Use-cases Applying for a position

Use-cases Publishing a position

Use-cases Publishing a position immediately

Use-cases Removing a published position immediately

Use-cases Synchronizing modules – Candidates

Use-cases Synchronizing modules – Positions

Use-cases Adding a new company

Risks Supporting a large number of candidates accessing the DM simultaneously.

Thanks.