• About Srini
  • Jobs
  • Amazon
  • Udemy
  • Contact us

Join 1,918 other subscribers

Srinimf

Srinimf

  • A Comprehensive Guide to Databricks Log Types and Access

    Nov 22, 2024

    ·

    databricks
    A Comprehensive Guide to Databricks Log Types and Access
  • PLI Boolean Operators – Real Purpose

    Boolean operators in PLI language. Learn how to use them. Read More ⇢

    PLI Boolean Operators – Real Purpose
  • 12 PLI Phrases to Handle Program Errors

    Error handling standard phrases being used in almost all the PLI programs. Read more. Read More ⇢

    12 PLI Phrases to Handle Program Errors
  • How to Run PLI Program in Batch JCL

    Batch JCL to run PLI program.View post to subscribe to site newsletter. Read More ⇢

    How to Run PLI Program in Batch JCL
  • How to Convert SQL Error into Text

    In this post, I explained SQL logic to convert SQL error into a text message using DSNTIAR. Read More ⇢

    How to Convert SQL Error into Text
  • JCL Quiz to refresh the knowledge quickly

    The JCL quiz really good to take it multiple times so that you will remember the concepts perfectly. Highly useful for mainframe developer. Read More ⇢

    JCL Quiz to refresh the knowledge quickly
  • 5 More JCL Interview Questions

    The advanced JCL interview complex questions given on GDG, Tape data set and mainframe error codes. A quick refresher and surely boosts your knowledge. Read More ⇢

    5 More JCL Interview Questions
  • Credit Cards Domain: 6 Top Payment Solutions

    6 Top payment solutions. Payment terminal POS Mobile pay Virtual payments Gateways Integration 1.Payment Terminal A piece of hardware that allows a merchant to swipe or key-in credit card information as well as any other information required to process a credit card transaction. 2.Point-of-Sale (POS) System A piece of hardware… Read More ⇢

    Credit Cards Domain: 6 Top Payment Solutions
  • Credit Card Domain -Key Exchange Technics

    Suppose you are a customer using a credit card to order an item from a website. An obvious threat is that an adversary would eavesdrop on your network communication, reading your messages to obtain your credit card information. It is possible and practical, however, to encrypt messages so as to prevent an… Read More ⇢

  • 7 Tricky Micro Focus COBOL Questions

    In this post, I have given tricky questions useful for micro focus COBOL interview questions. Read More ⇢

    7 Tricky Micro Focus COBOL Questions
«Prev
1 … 116 117 118 119 120 … 235
Next»

About Srinimf

We share solutions for software developers and interview questions.

2,736,642 hits

Subscribe for DAILY TIPS

Join our mailing list to stay notified about new blog posts. No spam, we guarantee.

  • Tumblr
  • Facebook
  • Instagram
  • WordPress
  • X

Srinimf

Designed with WordPress

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
 

Loading Comments...
 

You must be logged in to post a comment.

    • Subscribe Subscribed
      • Srinimf
      • Join 270 other subscribers
      • Already have a WordPress.com account? Log in now.
      • Srinimf
      • Subscribe Subscribed
      • Sign up
      • Log in
      • Report this content
      • View site in Reader
      • Manage subscriptions
      • Collapse this bar