Websphere administrator, Computer Network Security

Websphere Administrator:

Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are to Manage, Troubleshoot and Migrate applications' running on various WAS versions. 

Job responsibilities:

Administering IBM WebSphere Application Servers.

Migrating WAS from version 5.0 to 5.1 and 5.1 to 6.0.

Configuring WAS and setting up environment for new applications.

Performance tuning Application Server instances.

Patching WebSphere.

Monitoring Applications performance using Introscope Wily.

Installing WAS and setting up new Application server environment.

Write UNIX scripts to automate routine jobs.

 

 

Posted Date: 12/24/2012 5:29:30 AM | Location : United States







Related Discussions:- Websphere administrator, Assignment Help, Ask Question on Websphere administrator, Get Answer, Expert's Help, Websphere administrator Discussions

Write discussion on Websphere administrator
Your posts are moderated
Related Questions


B-Router Hybrid devices that has the features of both routers and bridges . A bridge router or brouter is a network machine that acts as a router and as a bridge. The brout

(a) Show four Network Security attacks. How do they compromise security? (b) In what ways do the following devices or services contribute to security: (i) Firewall (ii) In

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management

INTRODUCTION TO CRYPTOGRAPHY Cryptography The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

Question : An aircraft manufacturing company is considering linking the network of one of its offices to the network of its Headquarter using either xDSL or ISDN. i. Compare

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po

Secure a Wireless Network WIRELES Most online retailers provide some type of privacy statement. Many statements are long, and appear in small print, and many appear to be simi