Websphere administrator, Computer Network Security

Websphere Administrator:

Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are to Manage, Troubleshoot and Migrate applications' running on various WAS versions. 

Job responsibilities:

Administering IBM WebSphere Application Servers.

Migrating WAS from version 5.0 to 5.1 and 5.1 to 6.0.

Configuring WAS and setting up environment for new applications.

Performance tuning Application Server instances.

Patching WebSphere.

Monitoring Applications performance using Introscope Wily.

Installing WAS and setting up new Application server environment.

Write UNIX scripts to automate routine jobs.

 

 

Posted Date: 12/24/2012 5:29:30 AM | Location : United States







Related Discussions:- Websphere administrator, Assignment Help, Ask Question on Websphere administrator, Get Answer, Expert's Help, Websphere administrator Discussions

Write discussion on Websphere administrator
Your posts are moderated
Related Questions
Question: (a) Explain briefly the PCI Control Objectives which enterprises must meet to be compliant with the Payment Card Industry Data Security Standard (PCI DSS). Specify a

which is best algorithm

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic

a) Define the term "Enterprise Network". b) Briefly discuss the similarity and differences between a switch and a router. c) A company XYZ has been renting the 1 st Floor of

(a) Illustrate what you understand by Nyquist Capacity Theorem? (b) Consider we wish to transmit at a rate of 64 kbps over a 4 kHz noisy but error-free channel. What is the mini

crack the secret message and explain how the code works. The clue is that it has something to do with the computer keyboard. J-Q-H-6 Q-E-F-Q-H-D-3-W 8-H 5-Y-3 7-W-3 9-R--D-9-J

(a) Figure is a representation of a TCP header. For each of the fields lettered from A to G, state the name of the field and provide a brief explanation for the function of each fi

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

Broadcasting is the distribution of video and audio content to a whole audience via any audio or visual mass communications medium, but generally one using electromagnetic radiat