i
Mphasis
Filter interviews by
Coding test for SQL, was there.
posted on 12 Oct 2021
I applied via Recruitment Consultant and was interviewed in Apr 2021. There was 1 interview round.
posted on 29 Jun 2021
I applied via Recruitment Consultant and was interviewed in Jun 2021. There were 5 interview rounds.
posted on 20 Apr 2021
I applied via Naukri.com and was interviewed in Nov 2020. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed before Jun 2020. There were 3 interview rounds.
Migrating DB2 to other RDBMS involves selecting target RDBMS, exporting data, converting schema, and importing data.
Select the target RDBMS and ensure compatibility with DB2 data types and features
Export data from DB2 using tools like IBM Data Movement Tool or IBM InfoSphere Data Replication
Convert schema to target RDBMS using tools like IBM SQL Compatibility Tool or manual scripting
Import data into target RDBMS using ...
There are various ways to convert files depending on the file type and desired output format.
Use online file converters such as Zamzar or CloudConvert
Use software specific to the file type such as Adobe Acrobat for PDFs
Use command line tools such as ffmpeg for media files
Use programming languages such as Python to write custom conversion scripts
CICS is a transaction processing system that enables communication between applications in a distributed environment.
CICS acts as a middleware between applications and the underlying operating system.
It provides a runtime environment for executing transactions.
CICS supports various programming languages and communication protocols.
It can run on different platforms such as z/OS, Linux, and Windows.
CICS can communicate w...
To access security on CICS screen on distributed system, use CICS Transaction Server Security.
Use CICS Transaction Server Security to control access to CICS resources.
Define security policies and profiles to control access to CICS resources.
Use the CICS Security API to check security status and perform security-related tasks.
Examples of CICS security features include RACF, ACF2, and Top Secret.
Ensure that all users hav...
Migrating Mainframe security to Distributed system requires careful planning and execution.
Identify the security requirements of the Mainframe system
Evaluate the security features of the Distributed system
Develop a migration plan that addresses any gaps in security features
Test the security of the Distributed system thoroughly before deployment
Train users on the new security features and best practices
Steps performed when a migration requirement comes
Assess the current system and identify the scope of migration
Determine the target system and its requirements
Plan the migration process and create a timeline
Test the migration process in a non-production environment
Execute the migration process and monitor for any issues
Validate the migrated system to ensure it meets the requirements
Provide post-migration support and ma
posted on 28 Jul 2023
I appeared for an interview in Jun 2023.
posted on 24 May 2023
I applied via LinkedIn and was interviewed in Nov 2022. There were 3 interview rounds.
I applied via Approached by Company and was interviewed in Jun 2023. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Jun 2024. There were 2 interview rounds.
Non functional requirements are criteria that specify how a system should behave, rather than what it should do.
Performance - system should respond within 2 seconds for all user interactions
Scalability - system should be able to handle 1000 concurrent users
Reliability - system should have a 99.99% uptime
Security - system should encrypt all sensitive data
Usability - system should have a user-friendly interface
Improve legacy app performance by optimizing code, implementing caching, and scaling resources.
Optimize code by identifying and removing bottlenecks
Implement caching to reduce database calls and improve response time
Scale resources by using containers or serverless architecture
Use asynchronous processing for long-running tasks
Upgrade hardware or infrastructure if necessary
Security in microservices involves implementing authentication, authorization, encryption, and monitoring to protect data and services.
Implement authentication and authorization mechanisms to control access to microservices.
Use encryption to secure communication between microservices and external clients.
Implement monitoring and logging to detect and respond to security incidents.
Consider using API gateways for central...
Microservices architecture for a wealth management app involves breaking down the application into smaller, independent services.
Each microservice focuses on a specific business function, such as client onboarding, portfolio management, or reporting.
Services communicate through APIs, allowing for flexibility and scalability.
Each microservice can be developed, deployed, and scaled independently, leading to faster develo...
based on 2 interviews
Interview experience
based on 15 reviews
Rating in categories
Software Engineer
6.5k
salaries
| ₹2 L/yr - ₹9.5 L/yr |
Senior Software Engineer
5.7k
salaries
| ₹6 L/yr - ₹24 L/yr |
Associate Software Engineer
4.7k
salaries
| ₹2 L/yr - ₹6 L/yr |
Module Lead
2.4k
salaries
| ₹9.5 L/yr - ₹36 L/yr |
Transaction Processing Officer
2.3k
salaries
| ₹1.4 L/yr - ₹4.5 L/yr |
Cognizant
Wipro
Accenture
TCS