i2
IBM i2 Analyst's Notebook is a visual analysis tool that helps you turn data into intelligence. The solution provides innovative features such as connected network visualizations, social network analysis, and geospatial or temporal views to help you uncover hidden connections and patterns in data. This insight can help you better identify and disrupt criminal, cyber and fraudulent threats.
IBM i2 iBase is an intuitive intelligence data management application that enables collaborative teams of analysts to capture, control and analyze multi-source data in security-rich workgroup environments. It addresses the analyst’s daily challenge of discovering and uncovering networks, patterns and trends in today’s increasing volumes of complex structured and unstructured data. i2 iBase provides a multi-user data sharing environment that combines rich analysis and visualization capabilities with dissemination tools.
i2 Courses:
This video provides an overview, configuration and installation
information for using the Product Access Management (PAM) system with
your i2 applications.
PAM is an optional method for controlling the number of users that can currently run on an IBM i2 application. It ensures that you do not exceed the number of licenses you have purchased for the i2 applications.
PAM is an optional method for controlling the number of users that can currently run on an IBM i2 application. It ensures that you do not exceed the number of licenses you have purchased for the i2 applications.
In this series you will learn:
- What is the PAM all about?
- how to install PAM
- how to generate the lock code to use with PAM
- how to install the PAM server components
- how to install i2 applications with PAM enabled
Duration: 33 minutes
This video walks you through how to make a request through IBM's website for a product enhancement.
IMPORTANT: You must have an IBM user id before you use this RFE process. A link is provided to the sign-up page for a user id.
Join
the IBM Security Learning Services team for an in-depth tour of the
Security Learning Academy, with a focus on IBM i2 course offerings. In this video, you will see
how to navigate the platform, search the course catalog, enroll in a
course, view your enrollments on your dashboard, create progress
reports, and see how Security Learning Academy is integrated with IBM VIP Rewards for Security.
This video provides you with an overview of using the IBM Product Access Management (PAM) system for your i2 products.
PAM is an optional method for controlling the number of users that can currently run on an IBM i2 application. It ensures that you do not exceed the number of licenses you have purchased for the i2 applications.
Duration: 3 minutes
i2 Subjects:
i2 Latest
i2 Videos: How do I...
IBM i2 Analyst's Notebook
IBM i2 iBase
IBM i2 Enterprise Insight Analysis
Browse this category (83)
Or select by type:
Hands-on Labs (13)
Video Courses (70)
Activity (2)
Documentation (2)
i2 Course Translations
Browse subtopics (2)