This portal is to open public enhancement requests against products and services offered by the IBM Data & AI organization. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Specific links you will want to bookmark for future use
Simplify setting up CP4D monitoring and alerting #cpfield
Setting up CP4D alerting (e.g. forwarding alerts to slack/email) should be as simple as when setting up alerting for OCP with Prometheus. Everything should be able to be done in the web console.
This would enable people who are not experienced w...
Improved documentation of how to set up and use CP4D built-in monitoring #cpfield
Documentation of how to set up monitoring is inconsistent and not sufficient.
The steps are not easy to follow. It is not clear what hostnames should be used in the different steps.
The url is incorrect in some steps. Docs claim that 'https://...
Information Governance Catalog-Information Goverence Dashboard : CSV Injection
As part of security review, following observation was made by the auditor -
"During Assessment it was observed that application allows malicious files to be uploaded. Below are the cases:
Malicious csv file can be uploaded which can lea...
Need to change the structure of JWT token from Stateless to StateFul
As per the security review, following are the observations by the auditor-
During Assessment it was observed that application uses weak Authorization Header . Case 1. The Authorization Header Header value was set with a default bearer t...
McAfee Application and Change Control (MACC) is a suite of security software used by the Navy to protect their servers. MACC protects the OS by blocking executable files (.exe, .dll, .jar, etc) unless they have been "solidified" and permitted to e...
Improve timestamp format in message and backup logs (ISO-8601)
Streaming messages to log ingestion systems, e.g. Elastic Stack, is a useful way of analysing logs and generating notifications when certain messages are seen. Displaying the messages in the right order when daylight saving switches occur is an is...
Password Protection for Excel while scheduling in Cognos Analytics
This is most welcome feature for most of the Banks. Considering the type of data what banks handle, this feature will ensure the users that their data is well protected in Cognos. This benefits all Cognos users and in my current Project it benefit...
Analysis Studio and Query Studio to continue support Microsoft Edge and Google Chrome
Refer to Banking customer in Thailand who has been using Analysis Studio to analyse for 60 deposit mortgage rates for package data that using via browse more than 100 reports to ensure that all important business activities in the bank. Currently ...
DB2 z/OS - Message id - DSNJ110E - Additional alerts for active log monitoring and highlighted new message id when DB2 logging was suspended
We had a major incident due to suspended logging for one of the critical customer.
One of the critical production DB2 subsystem logging was suspended , caused by stalled archive log offloading process due to insufficient storage space on archive...
Do not place IBM confidential, company confidential, or personal information into any field.