We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Start by posting ideas and requests to this portal to enhance a Power product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas and add comments to ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The Power teams will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Specific link you will want to bookmark for future use
IBM Unified Ideas Portal-https://ideas.ibm.com/- Use this site to create or search for existing Ideas across all IBM products that are outside of Power, and track all of your personal interactions with all Ideas.
RSCT - Change to Communication Group formation over entirely uncommon subnets
When creating a RSCT "Peer Domain" cluster in a DR setup (2 Data Centers, multiple km apart), and with multiple Networks. It can happen that unwanted, or not working RSCT Communication Groups get created. It would be useful to have a capability to...
When running lvupdate we see these messages on logged in tty's:
Live AIX update in progress.
Live AIX update completed.
We follow itil rules for changes for aix updates. But that doesn't necessarily mean that all users who are logged in...
Offer Active Memory Expansion (AME) on the Power10 processor-based scale out systems.
We have received requests to offer Active Memory Expansion (AME) on the Power10 processor-based scale out systems. Others have asked about why it has been 'removed' compared to the POWER9 based scale-out servers.
Partners have already requested t...
AIX secldapclntd and LDAP load module should successfully recognize and interpret the FreeIPA time stamp format
FreeIPA LDAP server, also know as Red Hat Identity Management, software stores password change time stamps in this format: krbLastPwdChange: 20200929123058Z That appears to be a YYYMMDDhhmmss format. AIX's secldapclntd LDAP client and LDAP load mo...
AIX ftpd to use ciphers that need ECDH key exchange
To use FTP in a secure way, the ftpd daemon may use openssl ciphers (FTPS). But modern TLS 1.3 ciphers provided by openssl 1.1 using ECDH key exchange are not possible to be used with the ftpd. These new ciphers should be supported by the ftpd.
As discussed in the Support case TS008099503, the ISV would like to be able to specify not only DATAPSIZE, TEXTPSIZE and STACKPSIZE as a linker option but also allow SHMPSIZE to be specified. Currently, if you build an application which should use...
Harmonize procedure of managing configfiles during update of filesets
From an old case we noticed, that procedure how config files are treated during update is fileset-specific. Procedure should be same for each and every config file and it should be easy to check what was done with the config file. It should cover ...
Addition of the Kafka module to AIX rsyslog. Request to compile AIX rsyslog with omkafka module because this is needed in our production and homologation servers in domain XRC (Customer Relationship applications)
Issue: ERANGE errors when processing data with 4 byte characters .
# perl -e 'print "\xf0\x9f\x98\x80\n"' | wc
wc: : Result too large
The 32-bit locales and applications can only process the Basic Multilingual Plane (BMP), from U+0000 to U+FFFF....
If one of the PV_SU kernel privileges is used any target user id can be reached by a privileged command. There is currentliy no limitation to the list of target user id's for the su command. It would be great to get a way to limit the target user-...
Do not place IBM confidential, company confidential, or personal information into any field.