We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notifications on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Please use the following category to raise ideas for these offerings for all environments (traditional on-premises, containers, cloud):
Cloud Pak for Multicloud Management
Cloud Pak for Network Automation - incl Orchestration and Performance Management
Cloud Pak for Watson AIOps - incl Netcool Operations Management portfolio
Edge Application Manager
IBM Observability with Instana
ITM-APM Products - incl IBM Tivoli Monitoring v6 and Application Performance Monitoring v8
Workload Automation - incl Workload Scheduler
Tivoli System Automation - inc Tivoli System Automation Application Manager (SA AM), Tivoli System Automation for Multiplatforms (SA MP)
Implement security for creating, modifying and removing ETT
IWS provited a detailed protection for the most objects via authority groups.Creating, modifying and removing ETTs in the database does not have similar security features as the authority groups implements. It is just possible to protect ETT eleme...
PIF | RC to high while Insertion/Deletion of special resourse usage entrie in operation that already/not exist
While inserting a special resource usage entrie at an operation that already exist (equal SR-name) PIF will end with RC 12. The same is happening while deleting an entrie, that does not exist. Return code 12 is too high and for example an WAPL-scr...
We have a need for a new composer command that displays all objects in "Locked" status in the DB. Would like to have this ability for all the different type of objects that can get Locked in the DB. Jobs, Jobstreams, Resources, Variable Tables, Ca...
UW Madison is in process of moving some ERP systems from PeopleSoft to Workday. Per IBM case number TS008964802, we have heard that there is no integreation specifically for Workday. The representatives in that IBM ticket recommended that we open ...
IWS CPU usage improvement for ETT data set CLOSE events
Each IWS tracker subsystem on z/OS gets control during data set CLOSE processing in order to check, if this event is related to an ETT-defined data set (ETT = Event Triggered Tracking) in the EQQDSLST-file.If EQQDSLST contains many entries (severa...
Provide Kerberos support for UserIDs in DWC Engine connections
UserID to connect to IWSz controller and DB2 reporting database via DWC engine currently requires a known password. Enable DWC engine connections to use Kerberos authentication to avoid the use of known passwords.
Would like Centralized Agent upgrade process to support deployment of iFixes
Currently, if we want to deploy an iFix for our FTA/DA agents we have to create an install script and then remote into each server and manually apply the iFix.It would be nice if installing an iFix was as easy as deploying a FixPack via the centra...
Do not place IBM confidential, company confidential, or personal information into any field.