We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive a notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
If you encounter any issues accessing the Ideas portals, please send email describing the issue to email@example.com for resolution.
For more information about IBM's Ideas program visit ibm.com/ideas.
I would like to be able to install UCV in OpenShift without the need of having cluster-admin role. Ideally providing it via operators coming from the operator hub – only from categories “Red Hat Operators”, “Certified Operators” alternatively “Red...
Cut, Copy and Paste Functionality when editing Transformation Configuration
ISSUE: When editing a Transformation Configuration, it is noticed that it is not possible to right-click a field to cut and paste, no options are listed to do so. However, Ctrl+X, Ctrl+V, and Ctrl+C still work. STEPS TO RECREATE:Import a sample "H...
Credentials are transmitted to server in plain text: Open; Justification: An adversary can strip SSL and intercept plain text credentials using sniffer tools like fiddler, burp suite. Credentials thus obtained may be used to gain unauthorized access to the application
Justification : An adversary can strip SSL and intercept plain text credentials using sniffer tools like fiddler, burp suite. Credentials thus obtained may be used to gain unauthorized access to the application
Expose messaging engine metrics to mpMetrics/micrometer
The messaging engine contains a lot of capabilities which can be exposed via mpMetrics. Example: There is a file store configuration associated. The level of space used would be an appropriate metrics and probably the most valuable one. Other metr...
Allow "EXTREPO.REPOSITORY" in the properties file to be dynamic (using parameters)
We are working on pipeline build (using github, jenkins, jfrog, dbb, and UCD) and having an issue using the properties file that is needed in UCD n ijfrog artifactory. In Artifactory , zip file is currently uploaded to: https://jfrog.internal.com/...
Downloads for IBM J9 are behind a log-in and there does not seem to be an API to get them. E.g. for the release 220.127.116.11, we need to download archives for these platforms: AIX 64-bit, pSeries 18.104.22.168-JavaSE-SDK-aix-ppc64-archive Linux 64-bit, pSeri...
Need WMB plug-in for ACE12 to deploy to ACE12 environments via UCD.
We've been using UCD WMB plug-in version 47 to deploy to IIB10 environments. Now we're migrating our interfaces to ACE12. The plug-in doesn't work for ACE12 deployment (attaching log while we're trying to deploy to ACE12 using the current plug-in)...
Wait for application startup until datasources are ready.
Currently, the app is started as fast as possible. Datasource connections are initialized on first use. However, some applications need to use db connections right away. For this, each connection pool should have at least one connection ready when...
Python 2.7.15 is used within PureApp (FW 22.214.171.124.) currently in production within client. This Python version and versions up to 3.4 show security issues CVE-2013-4238, CVE-2013-1752. Vulnerability has been known since 2015.Pls see description PMR...
Do not place IBM confidential, company confidential, or personal information into any field.