i
Birlasoft
Filter interviews by
I applied via Naukri.com and was interviewed before Jun 2023. There was 1 interview round.
I applied via Referral and was interviewed before Jan 2022. There were 2 interview rounds.
I applied via Walk-in and was interviewed before Feb 2020. There were 4 interview rounds.
Resolved critical P1 issue related to server downtime
Identified root cause as a hardware failure in the server
Coordinated with IT team to replace faulty hardware and restore server functionality
Implemented measures to prevent similar issues in the future, such as regular hardware maintenance checks
Communicated updates and progress to stakeholders to ensure transparency and minimize impact on business operations
Top trending discussions
I applied via Recruitment Consulltant and was interviewed before Aug 2021. There was 1 interview round.
AR integration in Unity 3D allows for immersive experiences by overlaying digital content onto the real world.
Unity's AR Foundation package provides a cross-platform solution for AR development
ARCore and ARKit are supported by AR Foundation for Android and iOS devices respectively
Vuforia is another popular AR platform that can be integrated with Unity
AR integration requires a camera and sensors to track the user's envi...
I applied via Naukri.com and was interviewed before Mar 2021. There were 2 interview rounds.
Signal can be checked in lab during testing using various equipment and techniques.
Use oscilloscope to measure voltage and frequency of signal
Use spectrum analyzer to analyze frequency spectrum of signal
Use signal generator to generate and test signals
Use multimeter to measure signal strength and continuity
Use logic analyzer to analyze digital signals
Perform signal integrity testing to ensure signal quality
Use simulati...
I applied via Naukri.com and was interviewed in Apr 2023. There was 1 interview round.
I applied via Naukri.com and was interviewed in Jul 2021. There was 1 interview round.
I appeared for an interview before Mar 2024.
I applied via Job Portal and was interviewed in Oct 2023. There was 1 interview round.
Yes
LiveData is lifecycle aware and can be used to observe changes in data.
ViewModel provides a way to store and manage UI-related data across configuration changes.
ViewModel can hold LiveData objects to provide data to the UI.
LiveData and ViewModel work together to ensure data consistency and prevent memory leaks.
The ViewModel survives configuration changes by being retained by the system.
ViewModels are designed to survive configuration changes like screen rotations or language changes.
When an activity is destroyed and recreated, the ViewModel is not destroyed and retains its data.
The ViewModel is associated with the activity's lifecycle and is retained until the activity is finished.
The retained ViewModel instance can be acces...
MVP offers better separation of concerns and easier unit testing compared to MVC.
MVP separates the presentation layer from the business logic, making it easier to maintain and modify the codebase.
MVP allows for easier unit testing as the presenter can be tested independently from the view.
MVP provides better decoupling between components, enabling easier code reuse and scalability.
MVP promotes a clear separation of con...
SSL pinning is a security technique that ensures a client only communicates with a server using a pre-defined public key.
SSL pinning involves hardcoding the server's public key in the client's code or configuration.
During the SSL handshake, the client checks if the server's public key matches the pinned key.
If the keys match, the connection is established; otherwise, it is rejected.
Pinning prevents man-in-the-middle at
Data security can be achieved through encryption, access controls, backups, and regular security audits.
Encrypt sensitive data using strong encryption algorithms.
Implement access controls to restrict unauthorized access to the data.
Regularly backup the data to prevent data loss.
Conduct regular security audits to identify and fix vulnerabilities.
Use secure protocols and communication channels for data transfer.
Implement...
Encryption keys should be securely stored in a separate key management system.
Encryption keys should not be stored alongside the encrypted data.
Use a dedicated key management system (KMS) to store and manage encryption keys.
Implement strong access controls and authentication mechanisms for the KMS.
Consider using hardware security modules (HSMs) for added security.
Regularly rotate encryption keys to minimize the impact
based on 2 interviews
Interview experience
based on 36 reviews
Rating in categories
Software Developer
1.5k
salaries
| ₹2.5 L/yr - ₹11.2 L/yr |
Senior Software Engineer
1.2k
salaries
| ₹5.9 L/yr - ₹24 L/yr |
Technical Specialist
1.2k
salaries
| ₹8 L/yr - ₹30 L/yr |
Software Engineer
1.1k
salaries
| ₹2.8 L/yr - ₹11 L/yr |
Technical Lead
1.1k
salaries
| ₹10 L/yr - ₹35 L/yr |
Accenture
Cognizant
Capgemini
Wipro