We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive a notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
If you encounter any issues accessing the Ideas portals, please send email describing the issue to firstname.lastname@example.org for resolution.
For more information about IBM's Ideas program visit ibm.com/ideas.
Python 2.7.15 is used within PureApp (FW 184.108.40.206.) currently in production within client. This Python version and versions up to 3.4 show security issues CVE-2013-4238, CVE-2013-1752. Vulnerability has been known since 2015.Pls see description PMR...
possibility to use a cipher other than SHA1 by encrypting the backup
There are some limitations with regard to private key used with the backup and restore process. The private key file uploaded must be a PEM encoded private key. The maximum key size allowed is 8192 bits.Currently private key is expected to be a SH...
In all customer projects where the PureApplication System is used - the Call-Home functionality is one of the most important features, but we depend on the customers security-officer to send out the eMails and Problems to our support team. Current...
CPS has 2 kinds of user accounts: intern or LDAP. Intern users can be locked, LDAP users can't even with the admin account (Security administration: full permission). A workaround is to delete the user account but that's not possible when the user...
Support to deploy Red Hat Enterprise Linux (RHEL) 8 VMs
IBM Cloud Pak System provides for deploying VMs running Red Hat Enterprise Linux (RHEL) 6 and 7 today. In addition, support is available for VMs running Microsoft Windows 2012, 2016 and 2019. This is documented here in the IBM product documentatio...
Expose or change CritRsctProtMethod in RSCT/TSA for Db2 HADR deployments
When deploying Db2 HADR on PureApplication, IBM TSA automatically gets installed and setup to handle the automatic failover of Db2. TSA is built on RSCT, which is configured with a recommended/default CritRsctProtMethod of 3. This default ensures ...
In RHEL 7 firewalld is the preferred firewall solution. In the current CoreOS images for RHEL7 iptables is still in use. Please change the CoreOS (and all scripting that depends on this) to use firewalld instead off iptables. This statement could ...
In recent vulnerability assessment report we were recomended to close TLS1.0 and TLS 1.1 in IBM BlueMix Appliance. But as per SR there is no provision as of now to disable the same. So we need support for disabling TLS 1.0 and TLS 1.1
Do not place IBM confidential, company confidential, or personal information into any field.