Intelligence Analysis and Investigations
Use IBM i2 to integrate disparate data and find hidden connections that inform effective operational decisions.
- IBM i2 Enterprise Insight Analysis
- IBM i2 Analyst's Notebook IBM i2 iBase.
Intelligence Analysis and Investigations Courses:
This course explains how to perform silent installations for iBase and all iBase components. A silent installation lets you install a software program unattended.
Duration: 15 minutes
This video provides an overview, configuration and installation
information for using the Product Access Management (PAM) system with
your i2 applications.
PAM is an optional method for controlling the number of users that can currently run on an IBM i2 application. It ensures that you do not exceed the number of licenses you have purchased for the i2 applications.
PAM is an optional method for controlling the number of users that can currently run on an IBM i2 application. It ensures that you do not exceed the number of licenses you have purchased for the i2 applications.
In this series you will learn:
- What is the PAM all about?
- how to install PAM
- how to generate the lock code to use with PAM
- how to install the PAM server components
- how to install i2 applications with PAM enabled
Duration: 33 minutes