We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive a notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
If you encounter any issues accessing the Ideas portals, please send email describing the issue to firstname.lastname@example.org for resolution.
For more information about IBM's Ideas program visit ibm.com/ideas.
Support drop down list in recording of Edge(Chrome)
When record selecting an item in drop down list, following coment is added in a script and you need to add java snippet in the script. // Ignoring the dropdown click, manually add statement for selecting item, use click(atText"item name"); We hope...
Make RFT recognize objects on popup screen of Edge in both recording/playback.
We are now using RFT10.2.1(RFT perspective and simplified script) and noticed that RFT doesn't recognize any object on popup screen of Edge. This popup is NOT Html Dialog, it's using Edge. In case of IE, objects on the popup screen are correctly r...
pluginConfiguration - functionality to change the LogLevel during plugin generation
We are running Liberty z/OS and we would like to set the Loglevel in logs/state/plugin-cfg.xml file https://www.ibm.com/docs/en/was-liberty/zos?topic=SS7K4U_liberty/com.ibm.websphere.liberty.autogen.nd.doc/ae/rwlp_config_pluginConfiguration.html p...
Support to deploy Red Hat Enterprise Linux (RHEL) 8 VMs
IBM Cloud Pak System provides for deploying VMs running Red Hat Enterprise Linux (RHEL) 6 and 7 today. In addition, support is available for VMs running Microsoft Windows 2012, 2016 and 2019. This is documented here in the IBM product documentatio...
for gates ,we need an automatic email notification to people who are in gate rule that they need to approve that gate when it hits that environment in pipeline.
Emails are only sent when you configure the email tasks or individuals are assigned on a deployment plan task I tested this earlier , it is working. Our requirement for gates is we need an automatic email notification to people who are in gate rul...
Implement ClearQuest web services using Apache Tomcat, including the companion Report Launcher. (1) ClearCase and ClearQuest are often deployed together and should offer parallel implementation solutions. In 2018, the ClearCase/ClearQuest roadmap ...
Clarity for WebUI Browser-Driver Version Mismatch with instructions for manual download and file destination
When WebUI encounters a mismatch with the browser driver version number, sometimes the Click Here automated process does not work, does not indicate success or failure, and does not provide the user with sufficient detail to resolve the issue. It ...
Credentials are transmitted to server in plain text: Open; Justification: An adversary can strip SSL and intercept plain text credentials using sniffer tools like fiddler, burp suite. Credentials thus obtained may be used to gain unauthorized access to the application
Justification : An adversary can strip SSL and intercept plain text credentials using sniffer tools like fiddler, burp suite. Credentials thus obtained may be used to gain unauthorized access to the application
Do not place IBM confidential, company confidential, or personal information into any field.