profile-pic
Vetted Talent

Dilip Durge

Vetted Talent

Highly experienced, solutions-oriented professional with 13+ years of remarkable background in overseeing all aspect of the Software Development Life Cycle, from extensive analysis and design through execution and maintenance. Proficient in utilizing a wide variety of programs and tools to provide high-quality and cost-effective applications/systems to boost organizational efficiency and productivity. Possess unmatched coding and testing skills to deliver client/business specific programs

  • Role

    Java Developer

  • Years of Experience

    14 years

Skillsets

  • Linux
  • Jenkins
  • CSS
  • Microservices
  • AJAX
  • AWS
  • Google fcm
  • JEE
  • jQuery
  • JSON
  • JSP
  • Libreoffice
  • IntelliJ
  • MS Office
  • MS SQL
  • MySQL
  • NetBeans
  • Opentext cms
  • Oracle
  • PostgreSQL
  • Spring
  • Windows
  • XSLT
  • Kafka
  • Java - 10.0 Years
  • HTML
  • Web Services
  • Jenkins
  • Spring Boot - 5.0 Years
  • Hibernate - 6 Years
  • Docker
  • JUnit
  • Mockito
  • Eclipse
  • Git
  • JavaScript
  • Maven
  • SVN
  • Tomcat
  • XML
  • Ibm web sphere
  • IntelliJ
  • Git
  • Git
  • HTML
  • Ibm web sphere

Vetted For

16Skills
  • Roles & Skills
  • Results
  • Details
  • icon-skill_image
    Senior Software Engineer(Java Spring boot)AI Screening
  • 51%
    icon-arrow-down
  • Skills assessed :Git, Hibernate, MySQL, HTML, Spring, Azure Cloud Services, Go Lang, Postgre SQL, Java, Spring Boot, CSS, Vue JS, JavaScript, Angular, Mongo DB, react
  • Score: 46/90

Professional Summary

14Years
  • Jan, 2024 - Present1 yr 8 months

    Backend Developer

    Freelancer
  • Apr, 2023 - Nov, 2023 7 months

    Backend Developer

    Munich Strategy Consulting GmbH
  • Aug, 2020 - Mar, 20232 yr 7 months

    Backend Developer

    MobCast Innovations Ltd
  • Aug, 2010 - Dec, 20111 yr 4 months

    Lead Consultant

    Techsphere Technologies Ltd
  • Jan, 2012 - Jan, 20175 yr

    WCM Interwoven Consultant

    Hayagreeva Consulting Ltd
  • Feb, 2017 - Jul, 20203 yr 5 months

    Senior Software Developer

    Proximo Tech Soft SDN BHD

Applications & Tools Known

  • icon-tool

    Eclipse

  • icon-tool

    Git

  • icon-tool

    Github

  • icon-tool

    IntelliJ

  • icon-tool

    Linux

  • icon-tool

    Maven

  • icon-tool

    Microsoft Windows

  • icon-tool

    MS Office

  • icon-tool

    MS SQL Server

  • icon-tool

    MySQL

  • icon-tool

    Oracle

  • icon-tool

    SVN

  • icon-tool

    MS Office

  • icon-tool

    MS Office

Work History

14Years

Backend Developer

Freelancer
Jan, 2024 - Present1 yr 8 months
    Led the architectural design and development of scalable APIs and microservices. Provided strategic guidance to optimize software engineering processes. Mentored and coached teams on best practices in coding, testing, and deployment.

Backend Developer

Munich Strategy Consulting GmbH
Apr, 2023 - Nov, 2023 7 months
    Developed a robust authentication system using Spring Security. Implemented multilingual support (I18n) to enhance global user experience. Ensured compliance with best practices in secure coding and software development.

Backend Developer

MobCast Innovations Ltd
Aug, 2020 - Mar, 20232 yr 7 months
    Led mission-critical software development, ensuring high scalability and performance. Designed and implemented microservices architectures. Optimized software performance, reducing technical issues by 10%.

Senior Software Developer

Proximo Tech Soft SDN BHD
Feb, 2017 - Jul, 20203 yr 5 months
    Designed and developed a customer-facing web portal for Telekom, increasing digital interactions by 15%. Conducted training sessions, mentoring developers and stakeholders. Successfully led onsite releases, improving client satisfaction by 30%.

WCM Interwoven Consultant

Hayagreeva Consulting Ltd
Jan, 2012 - Jan, 20175 yr
    Implemented push notification services, increasing customer engagement by 13%. Improved system performance through optimized loading techniques.

Lead Consultant

Techsphere Technologies Ltd
Aug, 2010 - Dec, 20111 yr 4 months
    Spearheaded the development of an in-house examination system, automating test generation. Developed robust database solutions and Java-based core applications.

Achievements

  • Increased the business by 13% and the Customer retention of the Bank.
  • Implementing the Lazy Loading, which reduce the page size from 4.7 MB to 1.2 MB and page loading time by 1.12 seconds.
  • Resulted in a 10% reduction in errors and improving application performance.
  • Delivered several successful releases, resulting in a 30% increase in positive feedback and a 20% reduction in complaints.
  • Increased the business by 13% and the customers of Bank by implementing the Personalization Push Notifications using Google Firebase Cloud Messaging, IBM Unica Campaign Management with CMS.
  • Client appreciation for implementing Lazy Loading which reduces the page size from 4.7 MBs to 1.2 MBs which reduces the page loading time 1.12 seconds.
  • Got Client and Manager appreciation on developing and implementing Card Comparison module with continuous changes and suggestions within a couple of days.
  • Got Manager appreciation on crafting Wireframes and final HTML within a couple of days and helped to complete the work.

Education

  • Bachelor of Engineering, Computer Technology

    Nagpur University (2010)

AI-interview Questions & Answers

Hello, I am, uh, bachelor of engineering computer technology in 2020, Paso. I have, uh, 12 plus years of experience, uh, in Java Technologies. I worked with CMS platform and as well as Java Technology as well. Here, uh, I why I applied this opportunity basically because, you know, after experiencing any Java technologies, I've worked, uh, you know, lots of different different peoples, lots of different different technologies, uh, not only on back end but also in the front end as well. I have, uh, more on, you know, back end experience. Uh, I'm working, uh, on Java, uh, Spring Spring Boot, Hibernate, and, uh, then Maven. And there are some other technologies like Docker. I have, uh, even, you know, working on the CICD platform, I have a little bit knowledge about the AWS. And, uh, yep. That's so

Yeah. Basically, you know, uh, while working with the microservices in the spring boot, so, you know, rather, I, uh, I give you my example. Uh, by working with the map like, this current company, uh, we have 2 or 3 microservices, which are, you know, sharing the same resource, uh, database resource. So, basically, you know, uh, we have a Kafka over there. It's, uh, you know, messaging tool. So by this tool, uh, we have configured the Kafka resources. So, you know, that can, uh, give us a, you know, proper way to, uh, you know, handle the microservices, uh, to, you know, get that whatever the resources they have accessing. So, yes, simultaneously, they can, you know, work on that, uh, resources. So, you know, we configure the Kafka. So whenever 1, uh, and microservice is, you know, execute some operations on or perform some operations on the resources. Then the Kafka is sending a message to the, you know, the processes. And the process, it's, uh, you know, uh, continue to, uh, that process. And later, you know, it also, uh, though another microservice also, you know, access the resources. And once it gives, you know, that message to the another another microservices that, uh, it's, uh, completed this process so that another microservices get that resource. And, uh, you know, the Kafka is not only sending the message, but also it's, you know, communicating, uh, between the 2, uh, microservices so that, uh, we can, you know, even, uh, have a proper way, a proper channel to, you know, uh, working and, uh, steps. And even we have, uh, you know, implementing some, uh, trace over there. So, you know, it's not exactly thread, but threads, we can use the threads. So, you know, we can check whether this our first micro resource resource is working, uh, done or not. So we handle this as well, uh, with the, uh, you know, with our program.

Okay. New York application. This screen box is a great job. Okay. So, you know, uh, basically, whenever we, uh, find the application, it's monolithic applications. So while working with the Spring Boot Microsoft architecture, you know, we are first, uh, try to check what are the, you know, areas which we can, uh, convert it into some mod modular or molecular layer so that we can have different different models to separate the compute application, uh, through which, you know, the compute applications can be run as per the previous work. So we, uh, you know, first upon, uh, dividing that, uh, all the applications in little, little, uh, monolithic or, you know, you can say micro parts. And then we, uh, try to configure or we're trying to, you know, implement the microservice, uh, for each serve each of the different operations to fetch what are the data are there and what are the data we need to fetch, to run a particular molecular molecular, uh, applications. We sure we are divided into different parts. So for that, we create, uh, rest applications, rest APIs. Sorry. Rest APIs. And that rest APIs, uh, we, uh, try to handle the old datas between front end and back ends. So after, you know, dividing into, uh, molecular parts, that application, uh, screen boot handles very, uh, you know, in a proper way so we can create a different rest APIs in your screen boots and microservices to, you know, not only, uh, handle the different different parts of that application, but also, you know, handles the in a proper way, basically, so that we can, uh, give us a proper result. So yeah. That's it.

What method would you recommend for securing this to restful in this framework application? Okay. So, uh, basically, uh, for securing rest of restful API endpoints in the Spring Boot application, I'm I'm recommending, uh, the auth or authentication, uh, services over there, authentications is there. So, you know, whatever the services are there, uh, or any URL. Basically, restful inputs, basically, URLs. So these URLs can be used by the front end to up front or to, you know, give us the give the, uh, client or when who are the users to access the resources. So we configure the, uh, authentication over there using a port or, yeah, auth. And by that, you know, we, uh, tell the system to ask for the role. If the administrator, uh, and the user are both are the different. So we are, uh, providing the basically, we are providing the role best for, you know, priorities to that risk pool endpoints. So only administrator can access, uh, all the risk pool endpoints, s, uh, to access. So we are, uh, as per my recommendations, we can go with the auth to secure the risk points.

How would the tune have on your session factory setting? Okay. Any high concurrent applications. Okay. So, basically, hybrid session factory, uh, setting, uh, you know, is, you know, basically, uh, to by using, uh, the concurrent applications, uh, we can provide, uh, it's, uh, you know, lazy, uh, in a way. So, you know, uh, while handling with the sessions, uh, so we can, you know, uh, give a particular sessions to a more not more than particular time or more than, you know, you can say the time required for handling a data uh, for a particular sessions. So we can restrict that session. Uh, otherwise, the poll applications is not properly working. So, you know, we, uh, we can, uh, configure the session factory, uh, to, you know, provide the create, uh, new sessions to each, uh, request simultaneously. And, uh, we can, you know, also using that, uh, uh, threads to give us, uh, the proper way to handle, uh, the, uh, player sessions to, you know, the risk request can access the sessions properly, and the sessions can be used properly, uh, in a manner so that, uh, the thread pool cannot be, uh, overlap or thread pool cannot be you can say, uh, it's not, you know, it's not giving, uh, to any bottleneck system or or there or something, they can easily access the applications out.

How do you plan processing patterns in screen application? Okay. Can I ask function to So, basically, proxy design pattern is, uh, not work more on the proxy design patterns? But, you know, uh, you can, uh, say, like, you know, like, suppose, uh, oh, like, uh, maybe, you know, as I, uh, said earlier in the example, uh, you know, uh, we can configure lazy initialization and, uh, you know, to, uh, access, uh, using the applications, uh, you know, simultaneously, uh, whenever it needed. And then, uh, you can also provide the, you know, access controls, uh, to the ensure that, you know, whatever the endpoints, uh, need to be, you know, accessed by the particular user of, uh, any which whatever the user needs to be accessed, that we can, you know, provide the access controls in the screen boot. Then, uh, we also modified this, uh, remote accessing, uh, for that endpoints. And, also, you know, uh, we can configure the log going, uh, so that we can, you know, understand what exactly is doing. And if any error occurs, uh, then we can find out where it's exactly the errors are coming from. And, uh, after you know, the most important thing is the casing, uh, in any applications. So that, you know, that can, you know, handles all the, uh, burden or all the load on the servers. So, uh, if we, uh, use the caching, then, uh, it will, you know, easy to handle the same request, uh, each and every time. Just whenever the request is again and again comes again and again. So there is no need to, uh, you know, accessing the servers. We can directly disperse the result of from the caching. So caching is also there. And, uh, as for the structure of, uh, the replications, uh, we need to, you know, creating the interfaces, uh, then, uh, modify it to some, uh, you know, the or our programs or or operations to, you know, to get or fetch the proper data simultaneously. So that also we can, uh, give us we can configure in this new application.

In following job, code block, uh, okay, an important principle of code oriented programming is. We can learn by the principle and explain the violation. Class rectangle with width, public width. Okay. And okay. If it enter blue, this type width, it can double. Okay. Okay. Override. Set width. Set width s 2.2. Alright. Set width 8. Okay. Then super set width 10. Okay. BR Super. Oh, so, basically, BR tag is there. So alright. Okay. And then so, okay, so, basically, uh, the error is, uh, means, basically, the violation is, uh, we use the extends, uh, class rectangle. Basically, this class rectangle, and we use this method, set width and set height. But we, uh, use annotations override over there. Actually, this is not the correct way. Uh, override is not required. Means annotation is not required over there, object of rectangular class because it's a class, it's not interface. If we say interface, then we can simply write public class where implement rectangle, and then we can override that meter. But as the rectangle is a class, the super class, basically, So we need to create the object of the class to access that method. So animation or write, uh, it's violation of, uh, the object oriented programming. Basically, we are extending, uh, the direct methods of directing to us, uh, but we, uh, write it, which we we wrote over there. That's override. So it's, uh, object oriented, uh, programming violation.

The Jaws mongering points and. Okay. Can you spell the issue that might prevent it from responding to the. Okay. Okay. So, basically, post okay. Slash. Okay. So, basically, it's the for in the first line, it's q s and here. Basically, the in the post mapping annotations, uh, we need to, uh, specify or modify that slash inside that single quote or double quotes rather than the outside double quotes. It's just an error. Uh, and next one's that we are clear. It's for body. Okay. And uh, for you, it is not working. Yeah. Right. So, basically, the first line, uh, where we are using, uh, in the snippet, that is the averaging post mapping. There, the slash, uh, is outside of the codes. It should be inside the single tool. So that's basically stop the, you know, or prevent the response to the current history test.

How will we join this framework application? I didn't check the password. It's seamless failure. I'm recording in the event of the system crash. In the event of the system crash. Okay. So, you know, basically, whenever we need to design any application, uh, so we need to know, understand what exactly the application is, the first thing first. And then, uh, as for the, you know, requirements, we need to gather all the requirements. So we need to talk with the stakeholders, business users to our clients to understand what are what are the, uh, you know, the requirements for creating any spud application. And as per their requirements, we need to create a we need to understand basically what exactly the user wants. And as per their requirements, we, uh, go with the, you know, application architecture. So in Spring Boot architecture design, uh, you know, first of all, we need to, uh, hand check for exactly the pattern we need to use. Uh, if it's simple, you know, form submission or if it's simple, you know, not handling any, uh, financial or any, you know, payments, uh, structures. So we need we can, uh, also, you know, collect these simple structures. So we need to first to, uh, understand what the design patterns we need to use. And, you know, in the application architecture, uh, the second thing is, uh, we need to understand how many, uh, basically, database, uh, is required or not. If there are lots of data that needs to be handled, so we need to use a proper database like SQL, MySQL, or Postgres. So it's it's basically based on the requirements, uh, depends on the requirements. So we can also, uh, check the data databases. And, uh, if we understand all the, you know, databases and the applications and program is which we need. So we, uh, basically, uh, while activating the screen boot application, we first, you know, has a a user, the interface, uh, like, uh, you know, the interface which, uh, which who who can, you know, handle all the request and, uh, to access the service. We also think about the caching service. We also, you know, think about, uh, the load balances to, uh, whenever we handle or whenever we need to multiple and simultaneously conquer to, you know, requesting access to the our endpoints. So we need to handle that one. So, basically, we need an interface, uh, a load balancer, caching server, for storing the data as the internal database. So these are the things we need to understand, uh, and we need to take care of the design in this remote application application, uh, to facilitate seamless failure. And you we also, you know, use a logger over there. So we can also use Kafka and for logging systems. So we can, uh, use the postman, uh, to, you know, check our database, uh, failure, uh, of with the endpoint. So we need to handle all the things, uh, while, uh, creating the sprint applications. So these are the things we need to take care of by creating the last remote applications.

The use of reactive programming is compared to traditional blocking meters. Frankly speaking, I'm not, uh, you know, working on the reactive programming. So I do not have any particular, you know, experience in the reactive programming in SpringBoard. So um, think let's skip that the questions.

What it is, uh, what it is for ensuring the integrity of a screen book? I think the systems communications or a mix of synchronous and asynchronous So, you know, uh, while, uh, ensuring the integrator of Symbloud Microsoft is a custom, communicating, you know, or a mix of synchronous and a single channels. Uh, we can use, uh, you know, there are lots of, uh, you know, messaging, uh, tools out there like Kafka or RabbitQ. Uh, so we can use, uh, that, uh, tools to, you know, communicate the microservices, uh, between each other. So, you know, we can handle, uh, their workings, uh, with the resources, uh, easily. And, uh, while working on the resources, uh, to and microservices, uh, is very, uh, good thing to, you know, communicating between the 2 microservices so that, you know, whenever the first microservices has some, uh, work on any resource so that another can, you know, uh, get a notifications that the DISMarker research is working on. So the same resources so that, you know, he can, uh, wait for sometimes or he can, you know, he can use, uh, any caching or something, uh, data. So that can be handled. So Kafka is I I know about the Kafka. So, uh, Kafka is, you know, a really good tool, uh, to, you know, use to between the macro services to communicate to each others, uh, you know, in our or the macro, whatever the synchronous and nonsynchronous charts. So whenever the request comes simultaneously or, uh, 1 by 1, so we can handle that can be, you know, using the messaging tools.