Websphere administrator, Computer Network Security

Websphere Administrator:

Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are to Manage, Troubleshoot and Migrate applications' running on various WAS versions. 

Job responsibilities:

Administering IBM WebSphere Application Servers.

Migrating WAS from version 5.0 to 5.1 and 5.1 to 6.0.

Configuring WAS and setting up environment for new applications.

Performance tuning Application Server instances.

Patching WebSphere.

Monitoring Applications performance using Introscope Wily.

Installing WAS and setting up new Application server environment.

Write UNIX scripts to automate routine jobs.

 

 

Posted Date: 12/24/2012 5:29:30 AM | Location : United States







Related Discussions:- Websphere administrator, Assignment Help, Ask Question on Websphere administrator, Get Answer, Expert's Help, Websphere administrator Discussions

Write discussion on Websphere administrator
Your posts are moderated
Related Questions
Write down the significance of the syntax conversion . Syntax Conversion is described below: Syntax conversion is a significant function carried out in the presentation layer. I

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Early networks used simple point-to-point communication . In such a method of communication every communication channel connects exactly two devices. In this way it prepares a m

Q. Explain about Security aware protocols? The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

Problem 1: Show what are the benefits of project quality management? • Customer satisfaction • Reduced cost • Increased competitiveness • Fulfilment of social and economic r

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber securit

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective. STEP 1

IDS Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identificatio