We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
add/remove collaborators in Transformation Project
Transformation projects has the following problem, it is not possible to restrict access to different projects by users, all users with data enginering role can access all projects. The requested improvement lies in being able to add and remove co...
Allow CPD Admin to list all "Connection" objects and check whether tha connection is using Personal or Shared Credential
CPD allows user to create connection with Personal or Shared credential. By the default, the option is default to Shared Credential. Almost enterprise organization prevent their user to use shared credential, so there is a requirement to allow CPD...
Hi,According to an answer that we receive, the schemas name is only a suggestion and can be anything you would like when creating the Schema. By default, the Schemas are not owned by anyone, as a result, the other users can see all schema names bu...
Subsmovies also faced such backlash and, after several temporary dismissals, have now been permanently blocked. While the tug of war between the authorizations and these websites remains, we keep coming across multiple fully functional alternates.
Cloud Pak for Data can run and work well in the Antivirus SW scanning environment
Cloud Pak for Data takes strict security measures to address the security concerns from customer from both platform and underlying OS level as below:1)Cloud Pak for Data Security White Paperhttps://community.ibm.com/HigherLogic/System/DownloadDoc...
Serviceability Driven Asset Management (S-DAM) - a new approach to Asset Performance & Reliability Management
Asset Performance & Reliability Management is just on the verge of next massive transformation. Industry 4.0, Edge Computing, Hybrid Cloud and Hybrid Analytics are changing the age old reliability approach. Asset survivability is not the sol...
The context string for an Information Asset is built from the connection string components. EX: the Hostname dcxidavknx003.epg.zzz.yy.com on port 1234 using a jdbc connector results in the context string jdbc:ibm:hive://dcxidavknx003.epg.zzz.yy...
在资产的自定义属性界面添加自定义属性时，允许用户搜索并勾选特定的资产（如术语）名字或者类别，然后该自定义属性仅被添加到被选中的资产（如术语）上 (When adding a custom attribute in the asset custom attribute interface, users are allowed to search and check the name or category of a specific asset (such as term), and the...
Do not place IBM confidential, company confidential, or personal information into any field.