We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Metrics for this product shoul be provided as regular SMF collection for historical and monitor reasons
While metrics are provided using CDA Tool, it requires the user to activate the data collection and thre is no mechanism for the product to provide a more historial data gathering. Also thre is no way to automatically see trends other than manual ...
REORG SORTDATA NO should unload to shadow datasets and not unload to SYSREC
Changing DSSIZE for large table using SORTDATA NO, unloads to SYSREC. Since the volume of data is so large, SYSREC needs to go to tape. This causes the reorg to have greater elapsed time. Unloading to the shadows would greatly reduce the elapse...
COGNOS search results secured based on user security
When users use COGNOS search functions they are able to see folders/reports they do not have access to. They then click and get access errors and contact support because they want access or are confused why they cannot access things available in ...
Have the gridalarms plugin respect Maintenance Schedules like it parent plugin thold does
The gridalarms Cacti plugin was initially a fork of the thold plugin which supports the concept of a Maintenance Schedules, but this functionality was never implemented in gridalarms. We would like to see if that functionality can be added to gri...
During an analysis of the application, it was observed that "DmClient.exe" do not have Address Space Layout Randomization (ASLR) enabled. ASLR is considered a security best practice for memory management and can prevent buffer overflow attacks.Lac...
The application "DmClient.exe" executable was not using the DEP protection. Since DEP is disabled, arbitrary exploit codes can be written and executed from memory location leading to attack, such as buffer overflow, among other attack vectors.
BM Infosphere Data Replication Management Console, does not have Control Flow Guard (CFG) enabled. Control Flow Guard is a security feature which helps protect applications against memory corruption vulnerabilities by restricting where an applicat...
Enhance database_purge_cluster.php to have an 'all' option
This --clusterid=all would remove any clusters not currently found in the grid_clusters table. So, the deletes would look something like:
DELETE FROM some_table WHERE clusterid NOT IN (SELECT clusterid FROM grid_clusters)
Also, the help on this...
When reviewing an APAR on IBM site, there is a "Software version" field.This field invariable lists some meaningless value. For example, https://www.ibm.com/support/pages/apar/PH42408?myns=swgimgmt&mynp=OCSSTSF6&mync=E&cm_sp=swgimgmt-...
Do not place IBM confidential, company confidential, or personal information into any field.