Websphere administrator, Computer Network Security

Websphere Administrator:

Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are to Manage, Troubleshoot and Migrate applications' running on various WAS versions. 

Job responsibilities:

Administering IBM WebSphere Application Servers.

Migrating WAS from version 5.0 to 5.1 and 5.1 to 6.0.

Configuring WAS and setting up environment for new applications.

Performance tuning Application Server instances.

Patching WebSphere.

Monitoring Applications performance using Introscope Wily.

Installing WAS and setting up new Application server environment.

Write UNIX scripts to automate routine jobs.

 

 

Posted Date: 12/24/2012 5:29:30 AM | Location : United States







Related Discussions:- Websphere administrator, Assignment Help, Ask Question on Websphere administrator, Get Answer, Expert's Help, Websphere administrator Discussions

Write discussion on Websphere administrator
Your posts are moderated
Related Questions
In 10 or more pages, address the following topics (be sure to use diagrams as well as references). 1) Define broadband and baseband transmission technology. 2) Describe broadban

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti

Problem (a) Using Vigenère cipher and given the key abc, find the ciphertext for the message: simplicity Only the 26 lower-case alphabetical characters are used in messa

QUESTION (a) Describe the role of DNS root servers in the Internet network. (b) What do you understand by the handover concept in a mobile network? (c) List five meth

COMPONENTS OF AN INFORMATION SYSTEM The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to ena

Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem


Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

Problem: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point