Websphere administrator, Computer Network Security

Websphere Administrator:

Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are to Manage, Troubleshoot and Migrate applications' running on various WAS versions. 

Job responsibilities:

Administering IBM WebSphere Application Servers.

Migrating WAS from version 5.0 to 5.1 and 5.1 to 6.0.

Configuring WAS and setting up environment for new applications.

Performance tuning Application Server instances.

Patching WebSphere.

Monitoring Applications performance using Introscope Wily.

Installing WAS and setting up new Application server environment.

Write UNIX scripts to automate routine jobs.



Posted Date: 12/24/2012 5:29:30 AM | Location : United States

Related Discussions:- Websphere administrator, Assignment Help, Ask Question on Websphere administrator, Get Answer, Expert's Help, Websphere administrator Discussions

Write discussion on Websphere administrator
Your posts are moderated
Related Questions
IPV6 NEXT HEADER It is given in the figure below:

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

QUESTION a) Consider the speed of propagation of an electrical signal is same to 2x10 8 m/s, evaluate the ratio of the propagation delay to the transmit time for the given typ

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

Question: (a) African governments are slowly shifting to more transparent ICT regulations. However, but limited spectrum availability remains a key barrier to sustaining lon

BUSINESS NEEDS Information security performs four main functions for an organization. 1. Protects the ability of organization to function. 2. Enables safe operation of applicat

QUESTION: (a) Explain, with the aid of a diagram, a Star topology of a network of your choice. (b) Illustrate on the use of a MAN and give an example of one. (c) Describe

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic

Problem (a) Describe RSA algorithm with an example. (b) Answer the following RSA encryption, given the values of the primes are: p = 17, q = 11 and choosing e = 7. (c)

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib