We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Users would like to have the capability to search on multiple object names at once in Grid View. For example to enter 3 Loss Event Names (e.g. space-separated) and get those 3 Loss Events as a result in Grid View.
Allow specification of IP Ranges or Subnets in Trusted Context definitions
We would like to use Trusted Context to restrict access from specific IP addresses but the current definition requires each IP address to be specified individually. This is cumbersome for our OpenShift infrastructure where it would be more appropr...
Display the blocker query in Timeout/Deadlock situations
DB2 Timeouts and Deadlocks can cause significant problems for applications, and resolving them quickly is a high priority. Identifying the query that caused the deadlock or held locks long enough to cause a timeout is very important, with this inf...
Implicit Tablespaces for conversion of multi-table tablespaces to UTS PBG
When converting multi-table tablespaces to universal tablespaces with new command ALTER TABLESPACE MOVE TABLE you need to create a new tablespace for each table explicitely before you can use the command. It would be very nice if the ALTER TABLESP...
Being able to see the currently available and reserved memory values for a host[group] requires a 'bhosts -l' report. It would be very nice to report something like: $ bhosts -o 'HOST_NAME mem mem_reserved' [host_name ... | host_group ... | comput...
System configuration setting needed to define which Product master UI would be used as the main UI
Hi, Currently load balancer is forwarding our users to the base URL path https://www.pim-example.com and internally Product Master will show the Admin UI. I would like the Product master to have configuration setting that would define which UI (th...
Make encrypted connection to access server with chcclp without reading tls.properties
We have an environment where encrypted communication is mandatory.
When users want to execute chcclp scripts on the access server, they need to read the tls.properties file of the access server to find the location of the trust store.
Do not place IBM confidential, company confidential, or personal information into any field.