Home
Videos uploaded by user “IBM FSS FCI and Counter Fraud Management”
Kubernetes Volumes 1: emptydir, NFS, YAML, volumes, and intro to Persistent Volume Claims
 
04:42
We look at volume types: emptydir, NFS, YAML, volumes, mounts, and more.
Containers: cgroups, Linux kernel namespaces, ufs, Docker, and intro to Kubernetes pods
 
04:28
In this video we'll cover Containers: cgroups, Linux kernel namespaces, ufs, Docker, and intro to Kubernetes pods, PIDs, cgroup hierarchy, and some basics for Kubernetes pods.
Kubernetes Volumes 2:  Understanding Persistent Volume (PV) and Persistent Volume Claim (PVC)
 
08:10
We cover Understanding Persistent Volume (PV), Persistent Volume Claim (PVC), StorageClass (SC), Physical Storage, EBS, EFS, PD, NFS, and more.
WAS Architecture: Demystifying Cells, Profiles, Nodes, Servers, Clusters, and Federation
 
14:44
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains WAS Architecture: Demystifying Cells, Profiles, Nodes, Servers, Clusters, and Federations in Network Deployment
WAS: Java EE architecture: Containers, Components, Annotations
 
11:06
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains IBM Message Queue WAS Java EE architecture Containers, Components, Annotations
Kubernetes Volumes 3: How things connect
 
06:09
In this video, we discuss the advantages of persistent volumes, the impact on PVCs of deleting PVs, and how volume mounts and volumes connect into PVCs and PVs for the backing storage (e.g., EBS or PD).
How Websphere keystores integrate with IHS (key.kdb), WAS Plugin (plugin-key.kdb), and WAS (.p12)
 
13:22
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains, along with the Signer Certificate, Personal Certificate, trust store, and Websphere Plugin, how Websphere keystores integrate with IHS (key.kdb), WAS Plugin (plugin-key.kdb), and WAS (key.p12). Plugin-Key.kdb and key.p12 and key.kdb must all work together in Websphere Application server network deployment. Corrections: 6:07 is incorrect. The Plugin is a web client written in the C language. As a web client, it ONLY needs the public certificates of the server it contacts--namely WAS, and specifically the WAS application's chosen Keystore (e.g., Node1 Node2 etc).
ODM: Introduction to Operational Decision Manager (ODM)
 
07:57
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains ODM: Introduction to Operational Decision Manager (ODM)
WAS Profiles, deployment manager, cells, and federation
 
09:32
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains IBM Message Queue WAS Profiles, deployment manager, cells, and federation
WAS: Logs and Traces - Part 1
 
08:16
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains Websphere Application Server Traces and Websphere Application Server Logs and WAS Logs and WAS Traces: - Part 1. We'll also cover java packages, components, and levels.
ODM: How ODM organizes information: Model, BOM, XOM, Package, Project, Verbalizations
 
07:29
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains ODM: How ODM organizes information: Process Model, BOM, XOM, Package, Project, Java, Rule, Verbalization
MQ: Bus, Broker, IIB, ESB, Flows, and IBM Integration Bus
 
07:59
This IBM Counter Fraud Management (ICFM), or ICFM 2, video explains IBM Message Queue MQ Bus, Broker, IIB, ESB, Flows, and IBM Integration Bus
IIB: How to debug a message flow using breakpoints in IIB Toolkit
 
05:02
In this video, you'll see how to debug -- that is, run the IIB debugger -- a message flow on a remote Linux machine using breakpoints in the IIB Toolkit.
MQ: Security: Understanding CLNTCONN, SVRCONN,: TAB, CCDT, @ipcc, and Client Connections
 
09:58
This IBM Counter Fraud Management (ICFM), or ICFM 2, video explains IBM Message Queue MQ Security Understanding CLNTCONN, SVRCONN, TAB, CCDT, @ipcc, and Client Connections
MQ: Listeners, MCA, and MQI -- Message Channel Agents and Message Queue Interface
 
10:21
This IBM Counter Fraud Management (ICFM), or ICFM 2, video explains the Linux ss command, which is similar to netstat, and Java processes you can see. IBM Message Queue MQ Listeners, MCA, and MQI -- Message Channel Agents and Message Queue Interface
Websphere Application Server WAS Architecture, plugin cfg xml, and deployment manager
 
13:01
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains IBM Message Queue Websphere Application Server WAS Architecture, plugin cfg xml, and deployment manager
Datastage: Basics: Parallelism and Partitioning
 
09:02
This IBM Counter Fraud Management (ICFM), or ICFM 2, video explains Datastage's Parallelism and Partitioning concepts.
IIB: Why use Log4J for IIB?
 
04:29
This video explains the limitations of the User Trace node and why you'd want to use Log4J instead.
MQ: Triggering and the Initiation Queue
 
10:02
This IBM Counter Fraud Management (ICFM), or ICFM 2, video explains IBM Message Queue MQ Triggering and the Initiation Queue
WAS Security: LTPA, LTPA Tokens, LTPA Keys, and Single Sign On SSO:  Part 1
 
11:46
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains IBM Message Queue WAS Security LTPA, LTPA Tokens, LTPA Keys, and Single Sign On SSO Part 1 -- we'll also cover Servlet, EJB, SSO, Realm, VMM, and what is a WAS Node, Server, Cell.
How to install and use eclim
 
09:18
In this video, we'll see how to integrate Eclipse and vim using eclim on Fedora 27 (vim 8). These instructions also work on Red Hat Enterprise Linux (RHEL) (vim 7). We'll also cover Port Forwarding in VirtualBox and vim's netrw or visual explorer. -- vim8 and vim7
Datastage: Basics: ETL: Extract Transform Load
 
02:50
This IBM Counter Fraud Management (ICFM), or ICFM 2, video explains ICFM's Datastage Basics ETL
Cloud Services: Distinguishing between IaaS, PaaS, and SaaS
 
02:06
Here we distinguish between Infrastructure as a Service, Platform as a Service, and Software as a Service, as well as AWS, BlueMix, Softlayer, SPSS Statistics, and more.
Cognos: How to install Cognos Analytics 11 on Linux Red Hat (RHEL) 6.7
 
19:08
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains Cognos: How to install Cognos Analytics 11 on Linux Red Hat (RHEL) 6.7. We'll also cover some basics of Cognos 10 and Cognos 11 Architecture, Linux Screen, bash -x, InstallAnywhere debugging, X11 / X Windows, .bashrc, Linux alias, ulimit, file descriptors, Report Studio, Query Studio, Analysis Studio, Metric Designer, Event Studio, Framework Manager, PowerPlay Studio, Analytics Applications, Gateway, Application Tier, Data Tier, Presentation Tier, rpm packages, Cognos installer .BIN, IATEMPDIR, JAVA_HOME, DB2 DDLs, Analytics Portal, STMP/email server integration, and more.
WAS: Logs and Traces - Part 3
 
06:56
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains WAS: Logs and Traces - Part 3
DataStage: Parameters and Parameter Sets
 
12:20
This IBM Counter Fraud Management (ICFM), or ICFM 2, video explains DataStage's Parameters and Parameter Sets features.
MQ: Review with Example: Channel Initiators, XMIT, MCA, Trigger Messages, Listeners, and Monitors
 
05:39
This IBM Counter Fraud Management (ICFM), or ICFM 2, video explains IBM Message Queue MQ Review with Example Channel Initiators, XMIT, MCA, Trigger Messages, Listeners, and Monitors
WAS Security: Federation, Realm, VMM, WIM, Subtrees, DefaultWIMFileBasedRealm, Registries
 
11:24
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains IBM Message Queue WAS Security Federation, Realm, VMM, WIM, Subtrees, DefaultWIMFileBasedRealm, Registries
MQ: Security: Message Channel Agent MCA authentication basics, CHLAUTH basics
 
07:52
This IBM Counter Fraud Management (ICFM), or ICFM 2, video explains IBM Message Queue MQ Security Message Channel Agent MCA authentication basics, CHLAUTH basics
Spice up your shell. Test out zsh, fish, tmux, vim, nerd-fonts, and kubectl commands
 
04:10
This video describes how to spice up your shell. It shows you how to test out zsh, fish, tmux, vim, nerd-fonts, and kubectl auto-completion using a single command on CentOS/Fedora/RHEL. NOTE: Use RHEL/CentOS 7.4 or higher (despite the video showing 7.3) to avoid a backspace problem in tmux. Command: bash LESSTHANSIGN (curl -s https://raw.githubusercontent.com/seanw2020/.dotfiles/master/myenv.sh) Replace LESSTHANSIGN with the actual symbol since YouTube doesn't let me insert that character here. Manually install (build and make) tmux version 2.7 on RHEL/CentOS 7.x: sudo yum remove -y tmux sudo yum install -y gcc kernel-devel make ncurses-devel curl -LO https://github.com/tmux/tmux/releases/download/2.7/tmux-2.7.tar.gz tar zxvf tmux-2.7.tar.gz && cd tmux-2.7 sudo yum install -y ncurses libevent-devel ncurses-devel glibc-static && ./configure && make && sudo make install
MQ: Channels
 
09:34
This IBM Counter Fraud Management (ICFM), or ICFM 2, video explains IBM Message Queue MQ Channels
WAS Security: LTPA, LTPA Tokens, LTPA Keys, and Single Sign On SSO:  Part 2
 
13:07
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains IBM Message Queue WAS Security LTPA, LTPA Tokens, LTPA Keys, and Single Sign On SSO Part 2
IIB: How to set up Log4j and log4j.properties in IIB (without the IAM3 support pack)
 
12:21
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains ow to install Log4j in IIB without the IAM3 support pack, using a .properties file.
ODM: Getting Started Tutorial: Highlights
 
16:44
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains ODM: Tutorial: Highlights: Getting started with business rules
IIB: Log4J: Introduction and Architecture
 
08:01
In this video, we'll cover the basics of Log4J, including the Log4J architecture: Loggers, LoggerContext, LoggerConfig, Appenders, Filters, and see Log4J example code.
MQ: Asynchronous and Synchronous Communication
 
08:42
This IBM Counter Fraud Management (ICFM), or ICFM 2, video explains IBM Message Queue MQ Asynchronous and Synchronous Communication
IIB Subflows and Libraries - Part 2 (Practice)
 
07:02
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains IIB Subflows and Libraries - Part 2 - Practice
MQ: Security: Local vs Remote connections, Intro to MCAUser
 
11:39
This IBM Counter Fraud Management (ICFM), or ICFM 2, video explains IBM Message Queue MQ Security Local vs Remote connections, Intro to MCAUser
How to configure Websphere for LDAP using Microsoft Active Directory (aka MSAD)
 
25:04
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains How to configure Websphere for LDAP using Microsoft Active Directory (aka MSAD). We will also cover , OpenLDAP, x.509 Certificates, ldapsearch, ldap.conf, fingerprint, port 389 versus 636, LDAPS, Websphere Application Server (WAS), Lightweight Data Access Protocol, LDP.exe, ADSIEdit, Trusted Roots, Certificate Authorities (CA), Base DN (distinguished names), StartTLS, TLS v1.2 (TLSv12 or TLS12), and more.
ODM: XOM is Java, BOM is derived from XOM
 
03:46
This IBM Counter Fraud Management (ICFM), or ICFM, technical support video explains ODM: XOM is Java, BOM is derived from XOM