We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
the option to integrate Cisco jabber solution with maas360
we want integrate Cisco Jabber solution on MaaS360 MDM, if possible, we can run Cisco jabber like outlook email and can wipe out the chat history when employee off board. it will prevent disclosure of sensitive info.
Azure Authentication for IIS DataStage Trust Association Interceptor
Information Security directive within UPS to Azure Authentication to ensure valid users. UPS has been using EAM which is no longer supported and UPS is moving to Azure. Currently users are required to sign on to a DataStage environment and provide...
I'm trying to check if a serial value has reached its upper limit. I noticed the following unpleasant behaviour. In the sysmaster tables sysptnhdr and sysactptnhdr the currently used serial values are in three fields for the datatypes serial, seri...
How get a list of users authorized to work on specific project via command line
Often customer ask me for a list of users allowed to work on a specific project. I can't find a way to do this via command line , and the only way I founded is to open graphically the administrator , select that project and take a screenshot of th...
Removing the dependency on OS local user credentials for installing the IBM Datastage product
Hi Team Problem Statement: We are not able to install “IBM InfoSphere Datastage v11.5” on new VSI Issue Description: We are trying to install “IBM InfoSphere Datastage v11.5” product on new Linux host & as pre-requisite we are supposed to have...
Need to add JCC_ENFORCE_SECMEC to the DB2AUTH for product implementation
The customer has a restricted security policy for the DB2 server which is used as the XMeta repository. DB2 Database MANAGER AUTHENTICATION = SERVER_ENCRYPT DB2AUTH = JCC_ENFORCE_SECMEC As a result of the DB2 configuration Microservice pods with m...
As a customer I have a few different instances of IIS Servers running in Development, Test and Production. We often use the IP or hostname in the URL for Launchpad, but these names are generic and not informative. Users often get confused as to wh...
Allow removal of unused apps from IIS Microservices Launchpad
In some IIS installations, the IIS Microservices Launchpad shows applications that are not being used.
For example, the Standardization Rules Designer is shown in installations without QualityStage. Governance Dashboard is shown in installations ...
The problem in this case is that encrypted values are sent to the client. Since the client also has the key to decrypt those values, the client basically receives in plaintext the passwords that are set to connect to those dat...
Do not place IBM confidential, company confidential, or personal information into any field.