What's new and changed in Watson Studio

The Watson™ Studio release and subsequent refreshes can include new features, bug fixes, and security updates. Refreshes appear in reverse chronological order, and only the refreshes that contain updates for Watson Studio are shown.

You can see a list of the new features for the platform and all of the services at What's new in IBM® Cloud Pak for Data.

Installing or upgrading Watson Studio

Ready to install or upgrade Watson Studio?
Related documentation:

Refresh 16 of Cloud Pak for Data Version 3.5

A new version of Cloud Pak for Data was released in October 2022.

Operand version: 3.5.10

Security fixes

This release includes fixes for the following security issues:

CVE-2022-34903, CVE-2022-33099, CVE-2022-32208, CVE-2022-32206, CVE-2022-30115, CVE-2022-29824, CVE-2022-29155, CVE-2022-28506, CVE-2022-27782, CVE-2022-27781, CVE-2022-27780, CVE-2022-27779, CVE-2022-27778, CVE-2022-27776, CVE-2022-27774, CVE-2022-26691, CVE-2022-25878, CVE-2022-25314, CVE-2022-25313, CVE-2022-24765, CVE-2022-23990, CVE-2022-2289, CVE-2022-2288, CVE-2022-22576, CVE-2022-2257, CVE-2022-2231, CVE-2022-2097, CVE-2022-2068, CVE-2022-1927, CVE-2022-1897, CVE-2022-1785, CVE-2022-1720, CVE-2022-1629, CVE-2022-1621, CVE-2022-1619, CVE-2022-1586, CVE-2022-1354, CVE-2022-1292, CVE-2022-1271, CVE-2022-0563, CVE-2022-0530, CVE-2022-0529, CVE-2022-0391, CVE-2022-0351

CVE-2021-46822, CVE-2021-46195, CVE-2021-45346, CVE-2021-45078, CVE-2021-44906, CVE-2021-43618, CVE-2021-43519, CVE-2021-4217, CVE-2021-4209, CVE-2021-4166, CVE-2021-4069, CVE-2021-40528, CVE-2021-40330, CVE-2021-3997, CVE-2021-3974, CVE-2021-39537, CVE-2021-3927, CVE-2021-3903, CVE-2021-38185, CVE-2021-3800, CVE-2021-3796, CVE-2021-3778, CVE-2021-37322, CVE-2021-36222, CVE-2021-3601, CVE-2021-35942, CVE-2021-3541, CVE-2021-3537, CVE-2021-3520, CVE-2021-3518, CVE-2021-3517, CVE-2021-3516, CVE-2021-3487, CVE-2021-3468, CVE-2021-3467, CVE-2021-3426, CVE-2021-3421, CVE-2021-33574, CVE-2021-33560, CVE-2021-33197, CVE-2021-31879, CVE-2021-3177, CVE-2021-3115, CVE-2021-3114, CVE-2021-28153, CVE-2021-27218, CVE-2021-27212, CVE-2021-25317, CVE-2021-24032, CVE-2021-23980, CVE-2021-23336, CVE-2021-22947, CVE-2021-22925, CVE-2021-22924, CVE-2021-22898, CVE-2021-22876, CVE-2021-21300, CVE-2021-20294, CVE-2021-20266, CVE-2021-20197, CVE-2021-20193

CVE-2020-8492, CVE-2020-8285, CVE-2020-8284, CVE-2020-8231, CVE-2020-7595, CVE-2020-36230, CVE-2020-36229, CVE-2020-36228, CVE-2020-36227, CVE-2020-36226, CVE-2020-36225, CVE-2020-36224, CVE-2020-36223, CVE-2020-36222, CVE-2020-36221, CVE-2020-35524, CVE-2020-35523, CVE-2020-35522, CVE-2020-35512, CVE-2020-35507, CVE-2020-35496, CVE-2020-35495, CVE-2020-35494, CVE-2020-35493, CVE-2020-35448, CVE-2020-29362, CVE-2020-29361, CVE-2020-28367, CVE-2020-28366, CVE-2020-28362, CVE-2020-28196, CVE-2020-27619, CVE-2020-27618, CVE-2020-26154, CVE-2020-26137, CVE-2020-26116, CVE-2020-25219, CVE-2020-24977, CVE-2020-24553, CVE-2020-21674, CVE-2020-1968, CVE-2020-17541, CVE-2020-1752, CVE-2020-17049, CVE-2020-16845, CVE-2020-16599, CVE-2020-16593, CVE-2020-16592, CVE-2020-16591, CVE-2020-16590, CVE-2020-16156, CVE-2020-15719, CVE-2020-15095, CVE-2020-14422, CVE-2020-14155, CVE-2020-14145, CVE-2020-13790, CVE-2020-13776, CVE-2020-13645, CVE-2020-13631, CVE-2020-13529, CVE-2020-13435, CVE-2020-12762, CVE-2020-12413, CVE-2020-12401

CVE-2019-9937, CVE-2019-9936, CVE-2019-9923, CVE-2019-9674, CVE-2019-9169, CVE-2019-9077, CVE-2019-9075, CVE-2019-9074, CVE-2019-9071, CVE-2019-8906, CVE-2019-8905, CVE-2019-8457, CVE-2019-6462, CVE-2019-6461, CVE-2019-6128, CVE-2019-6111, CVE-2019-6110, CVE-2019-6109, CVE-2019-5827, CVE-2019-3860, CVE-2019-3859, CVE-2019-3842, CVE-2019-2708, CVE-2019-2201, CVE-2019-20807, CVE-2019-20388, CVE-2019-20218, CVE-2019-19956, CVE-2019-19924, CVE-2019-19906, CVE-2019-19880, CVE-2019-19645, CVE-2019-19603, CVE-2019-19244, CVE-2019-19204, CVE-2019-19203, CVE-2019-19012, CVE-2019-18348, CVE-2019-18276, CVE-2019-17595, CVE-2019-17594, CVE-2019-17543, CVE-2019-17451, CVE-2019-16866, CVE-2019-16777, CVE-2019-16775, CVE-2019-16276, CVE-2019-16163, CVE-2019-1563, CVE-2019-14250, CVE-2019-13753, CVE-2019-13752, CVE-2019-13751, CVE-2019-13565, CVE-2019-1349, CVE-2019-1348, CVE-2019-13224, CVE-2019-13115, CVE-2019-13057, CVE-2019-13050, CVE-2019-13012, CVE-2019-12972, CVE-2019-12900, CVE-2019-1010204, CVE-2019-1010180

CVE-2018-9252, CVE-2018-9234, CVE-2018-9055, CVE-2018-8740, CVE-2018-6954, CVE-2018-6872, CVE-2018-6759, CVE-2018-6323, CVE-2018-6003, CVE-2018-5784, CVE-2018-5764, CVE-2018-5360, CVE-2018-20839, CVE-2018-20786, CVE-2018-20685, CVE-2018-20673, CVE-2018-20671, CVE-2018-20657, CVE-2018-20651, CVE-2018-20623, CVE-2018-20622, CVE-2018-20570, CVE-2018-20483, CVE-2018-20482, CVE-2018-20406, CVE-2018-20002, CVE-2018-19932, CVE-2018-19876, CVE-2018-19543, CVE-2018-19542, CVE-2018-19541, CVE-2018-19540, CVE-2018-19539, CVE-2018-19211, CVE-2018-19210, CVE-2018-19139, CVE-2018-18873, CVE-2018-18701, CVE-2018-18607, CVE-2018-18606, CVE-2018-18605, CVE-2018-18508, CVE-2018-18484, CVE-2018-18483, CVE-2018-18309, CVE-2018-18064, CVE-2018-17985, CVE-2018-17794, CVE-2018-17360, CVE-2018-17101, CVE-2018-16435, CVE-2018-16429, CVE-2018-16428, CVE-2018-16335, CVE-2018-15919, CVE-2018-15209, CVE-2018-14567, CVE-2018-14404, CVE-2018-12934, CVE-2018-12699, CVE-2018-12698, CVE-2018-12697, CVE-2018-12641, CVE-2018-1125, CVE-2018-1123, CVE-2018-1121, CVE-2018-10801, CVE-2018-10779, CVE-2018-1000880, CVE-2018-1000879, CVE-2018-1000876, CVE-2018-1000654, CVE-2018-1000035, CVE-2018-1000030, CVE-2018-1000021

CVE-2017-9955, CVE-2017-9954, CVE-2017-9937, CVE-2017-9936, CVE-2017-9935, CVE-2017-9815, CVE-2017-9782, CVE-2017-9778, CVE-2017-9756, CVE-2017-9755, CVE-2017-9754, CVE-2017-9753, CVE-2017-9752, CVE-2017-9751, CVE-2017-9750, CVE-2017-9749, CVE-2017-9748, CVE-2017-9747, CVE-2017-9746, CVE-2017-9745, CVE-2017-9744, CVE-2017-9743, CVE-2017-9742, CVE-2017-9614, CVE-2017-9403, CVE-2017-9233, CVE-2017-9147, CVE-2017-9117, CVE-2017-9050, CVE-2017-9049, CVE-2017-9048, CVE-2017-9047, CVE-2017-9044, CVE-2017-9043, CVE-2017-9042, CVE-2017-9041, CVE-2017-9040, CVE-2017-9039, CVE-2017-9038, CVE-2017-8872, CVE-2017-8817, CVE-2017-8421, CVE-2017-8398, CVE-2017-8397, CVE-2017-8396, CVE-2017-8395, CVE-2017-8394, CVE-2017-8393, CVE-2017-8392, CVE-2017-7781, CVE-2017-7614, CVE-2017-7613, CVE-2017-7612, CVE-2017-7611, CVE-2017-7610, CVE-2017-7609, CVE-2017-7608, CVE-2017-7607, CVE-2017-7602, CVE-2017-7601, CVE-2017-7600, CVE-2017-7599, CVE-2017-7598, CVE-2017-7597, CVE-2017-7596, CVE-2017-7595, CVE-2017-7594, CVE-2017-7593, CVE-2017-7592, CVE-2017-7526, CVE-2017-7501, CVE-2017-7500, CVE-2017-7407, CVE-2017-7375, CVE-2017-7304, CVE-2017-7303, CVE-2017-7302, CVE-2017-7301, CVE-2017-7300, CVE-2017-7299, CVE-2017-7246, CVE-2017-7245, CVE-2017-7244, CVE-2017-7227, CVE-2017-7226, CVE-2017-7225, CVE-2017-7224, CVE-2017-7223, CVE-2017-7210, CVE-2017-7209, CVE-2017-7000, CVE-2017-6969, CVE-2017-6966, CVE-2017-6965, CVE-2017-6891, CVE-2017-6512, CVE-2017-6508, CVE-2017-6350, CVE-2017-6004, CVE-2017-5953, CVE-2017-5563, CVE-2017-5505, CVE-2017-5504, CVE-2017-5503, CVE-2017-5499, CVE-2017-5225, CVE-2017-18258, CVE-2017-18078, CVE-2017-18018, CVE-2017-17942, CVE-2017-17434, CVE-2017-17433, CVE-2017-17126, CVE-2017-17125, CVE-2017-17124, CVE-2017-17123, CVE-2017-17122, CVE-2017-17121, CVE-2017-17095, CVE-2017-17087, CVE-2017-17080, CVE-2017-16932, CVE-2017-16931, CVE-2017-16879, CVE-2017-16832, CVE-2017-16831, CVE-2017-16830, CVE-2017-16829, CVE-2017-16828, CVE-2017-16827, CVE-2017-16826, CVE-2017-16548, CVE-2017-15996, CVE-2017-15994, CVE-2017-15939, CVE-2017-15938, CVE-2017-15671, CVE-2017-15412, CVE-2017-15298, CVE-2017-15286, CVE-2017-15232, CVE-2017-15225, CVE-2017-15088, CVE-2017-15025, CVE-2017-15024, CVE-2017-15023, CVE-2017-15022, CVE-2017-15021, CVE-2017-15020, CVE-2017-14974, CVE-2017-14940, CVE-2017-14939, CVE-2017-14938, CVE-2017-14934, CVE-2017-14933, CVE-2017-14932, CVE-2017-14930, CVE-2017-14867, CVE-2017-14745, CVE-2017-14729, CVE-2017-14529, CVE-2017-14130, CVE-2017-14129, CVE-2017-14128, CVE-2017-14062, CVE-2017-13757, CVE-2017-13734, CVE-2017-13733, CVE-2017-13732, CVE-2017-13731, CVE-2017-13730, CVE-2017-13729, CVE-2017-13728, CVE-2017-13727, CVE-2017-13726, CVE-2017-13716, CVE-2017-13710, CVE-2017-13685, CVE-2017-12967, CVE-2017-12944, CVE-2017-12799, CVE-2017-12458, CVE-2017-12457, CVE-2017-12456, CVE-2017-12455, CVE-2017-12454, CVE-2017-12453, CVE-2017-12452, CVE-2017-12451, CVE-2017-12449, CVE-2017-11462, CVE-2017-11335, CVE-2017-11164, CVE-2017-11113, CVE-2017-11112, CVE-2017-11109, CVE-2017-10989, CVE-2017-10790, CVE-2017-10688, CVE-2017-10685, CVE-2017-10684, CVE-2017-10140, CVE-2017-1000382, CVE-2017-1000254, CVE-2017-1000158, CVE-2017-1000100, CVE-2017-0663, CVE-2017-0553

CVE-2016-9844, CVE-2016-9586, CVE-2016-9574, CVE-2016-9539, CVE-2016-9538, CVE-2016-9532, CVE-2016-9453, CVE-2016-9318, CVE-2016-9297, CVE-2016-9273, CVE-2016-9074, CVE-2016-8625, CVE-2016-8624, CVE-2016-8623, CVE-2016-8622, CVE-2016-8621, CVE-2016-8619, CVE-2016-8618, CVE-2016-8617, CVE-2016-8616, CVE-2016-8615, CVE-2016-7091, CVE-2016-6349, CVE-2016-6321, CVE-2016-6318, CVE-2016-6263, CVE-2016-6262, CVE-2016-6261, CVE-2016-6223, CVE-2016-6185, CVE-2016-6153, CVE-2016-5323, CVE-2016-5321, CVE-2016-5319, CVE-2016-5318, CVE-2016-5300, CVE-2016-5131, CVE-2016-5102, CVE-2016-4984, CVE-2016-4493, CVE-2016-4492, CVE-2016-4491, CVE-2016-4490, CVE-2016-4489, CVE-2016-4488, CVE-2016-4487, CVE-2016-4484, CVE-2016-4483, CVE-2016-4472, CVE-2016-4429, CVE-2016-4074, CVE-2016-4008, CVE-2016-3631, CVE-2016-3624, CVE-2016-3622, CVE-2016-3191, CVE-2016-3189, CVE-2016-2781, CVE-2016-2779, CVE-2016-2381, CVE-2016-2226, CVE-2016-2183, CVE-2016-2037, CVE-2016-1951, CVE-2016-1938, CVE-2016-1238, CVE-2016-1234, CVE-2016-10371, CVE-2016-10272, CVE-2016-10271, CVE-2016-10270, CVE-2016-10269, CVE-2016-10268, CVE-2016-10267, CVE-2016-10266, CVE-2016-10255, CVE-2016-10254, CVE-2016-10228, CVE-2016-10094, CVE-2016-10093, CVE-2016-10092, CVE-2016-0755

CVE-2015-8948, CVE-2015-8865, CVE-2015-8853, CVE-2015-8538, CVE-2015-8391, CVE-2015-8388, CVE-2015-8386, CVE-2015-8385, CVE-2015-8382, CVE-2015-8035, CVE-2015-7697, CVE-2015-7696, CVE-2015-7036, CVE-2015-5276, CVE-2015-5218, CVE-2015-5186, CVE-2015-5073, CVE-2015-3217, CVE-2015-3153, CVE-2015-2697, CVE-2015-2696, CVE-2015-2695, CVE-2015-2613, CVE-2015-2328, CVE-2015-2327, CVE-2015-2059, CVE-2015-20107, CVE-2015-1607, CVE-2015-1606, CVE-2015-1572, CVE-2015-1197, CVE-2015-0837, CVE-2015-0247, CVE-2015-0245

Refresh 15 of Cloud Pak for Data Version 3.5

A new version of Cloud Pak for Data was released in July 2022.

Operand version: 3.5.9

Bug fixes

This release includes the following fixes:

  • Issue: The DSX-HI pod log no longer provides up-to-update logging of jobs submitted to Hadoop.

    Resolution: The issue is now resolved.

Security fixes

This release includes fixes for the following security issues:

CVE-2017-9404, CVE-2020-10543, CVE-2020-10878, CVE-2020-12723, CVE-2021-23358, CVE-2021-3580, CVE-2021-44569, CVE-2021-44570, CVE-2021-44571, CVE-2021-44573, CVE-2021-44574, CVE-2021-44575, CVE-2021-44576, CVE-2021-44577, CVE-2022-1210, CVE-2022-1616, CVE-2022-1620, CVE-2022-1622, CVE-2022-1623, CVE-2022-26280

This release includes fixes for the following security issues for Jupyter Notebooks Python 3.7:

CVE-2018-25032, CVE-2020-10878, CVE-2020-12723, CVE-2020-17541, CVE-2020-19131, CVE-2020-35492, CVE-2020-35521, CVE-2020-35524, CVE-2021-23222, CVE-2021-3634, CVE-2021-3733, CVE-2021-41617, CVE-2021-44569, CVE-2021-44570, CVE-2021-44573, CVE-2021-44574, CVE-2021-44575, CVE-2021-44576, CVE-2021-44577, CVE-2022-1154, CVE-2022-1616, CVE-2022-1620, CVE-2022-1623, CVE-2022-21434, CVE-2022-21476, CVE-2022-21496, CVE-2022-22822, CVE-2022-22824, CVE-2022-22825, CVE-2022-29155

Refresh 14 of Cloud Pak for Data Version 3.5

A new version of Cloud Pak for Data was released in May 2022.

Operand version: 3.5.8

New features

The 3.5.8 release of Watson Studio includes the following features and updates:

Deprecation notice of Spark 2.4 Notebook environments
Spark 2.4 is deprecated and will be removed in an upcoming release. Start using environments with Spark 3.0 in Watson Studio.
Bug fixes

This release includes the following fixes:

  • Issue: After deleting a notebook with a notebook job scheduled, the notebook is still listed under the Assets tab of the project.

    Resolution: The issue is now fixed.

  • Issue: Notebook names including spaces cause an error 500 after syncing the notebook with the project.

    Resolution: Notebook names can now include spaces.

Security fixes

This release includes fixes for the following security issues:

CVE-2021-23566, CVE-2021-23841, CVE-2021-42694

Refresh 12 of Cloud Pak for Data Version 3.5

A new version of Cloud Pak for Data was released in March 2022.

Operand version: 3.5.7

Bug fixes

This release includes the following fixes:

  • Issue: Error appears when saving a JupyterLab file that uses the word cells in a .py/.txt/.md file.

    Resolution: The issue is now fixed.

Security fixes

This release includes fixes for the following security issues:

CVE-2016-9398, CVE-2019-13750, CVE-2016-7943, CVE-2016-1841, CVE-2015-7674, CVE-2020-23922, CVE-2021-26927, CVE-2021-27645, CVE-2016-9395, CVE-2017-2870, CVE-2017-6314, CVE-2016-7949, CVE-2021-42574, CVE-2018-7999, CVE-2016-6352, CVE-2017-13748, CVE-2015-9019, CVE-2021-33910, CVE-2021-41495, CVE-2017-13749, CVE-2016-7946, CVE-2016-2149, CVE-2016-7945, CVE-2021-20231, CVE-2019-20386, CVE-2021-20232, CVE-2016-3711, CVE-2021-23840, CVE-2015-7995, CVE-2016-10087, CVE-2020-25709, CVE-2017-13747, CVE-2020-27828, CVE-2016-4608, CVE-2019-18218, CVE-2021-3200, CVE-2016-2160, CVE-2021-44832, CVE-2015-8875, CVE-2017-13752, CVE-2020-14344, CVE-2016-4609, CVE-2016-2052, CVE-2016-7944, CVE-2016-3977, CVE-2015-7673, CVE-2021-27291, CVE-2016-9082, CVE-2016-7942, CVE-2019-5068, CVE-2016-7951, CVE-2017-13751, CVE-2016-4610, CVE-2016-10109, CVE-2021-20270, CVE-2019-20838, CVE-2016-7952, CVE-2017-14132, CVE-2016-9399, CVE-2016-9397, CVE-2020-24370, CVE-2016-10244, CVE-2017-9814, CVE-2021-37750, CVE-2018-19787, CVE-2016-1683, CVE-2017-18248, CVE-2021-26926, CVE-2020-16135, CVE-2018-14645, CVE-2017-7475, CVE-2017-15137, CVE-2020-1712, CVE-2016-8886, CVE-2016-7948, CVE-2016-1684, CVE-2016-7947, CVE-2016-4607, CVE-2021-3272, CVE-2016-7950, CVE-2015-8947, CVE-2020-25710, CVE-2021-33203, CVE-2020-10001, CVE-2018-14632, CVE-2019-13117, CVE-2020-3898, CVE-2015-7555, CVE-2017-8287, CVE-2017-16612, CVE-2017-6312, CVE-2019-13118, CVE-2017-8105, CVE-2021-3445, CVE-2021-41496, CVE-2018-6942, CVE-2017-6313, CVE-2017-15138, CVE-2016-4738

This release includes fixes for the following security issues for Jupyter Notebooks Python 3.7:

CVE-2019-20386, CVE-2020-16135, CVE-2020-1712, CVE-2021-3521, CVE-2021-3828, CVE-2021-3872, CVE-2021-3918, CVE-2021-3984, CVE-2021-4019, CVE-2021-41495, CVE-2021-41496, CVE-2021-43818, CVE-2021-43854

Refresh 10 of Cloud Pak for Data Version 3.5

A new version of Watson Studio was released in January 2022.

Assembly version: 3.5.6

This release includes the following changes:

Bug fixes

This release includes the following fixes:

  • Issue: Excel files cannot be imported to a notebook that is stored in a storage volume.

    Resolution: Fixed importing Excel files to a notebook when it's stored in storage volume.

  • Issue: Framework SKLearn is deprecated for versions of Cloud Pak for Data.

    Resolution: Upgrade to the newest version of the platform. To learn about available frameworks on Cloud Pak for Data on different versions, see our frameworks documentation.

  • Issue: The DSX-HI pod log no longer provides up-to-update logging of jobs submitted to Hadoop.

    Resolution: The issue is now resolved.

Security fixes

This release includes fixes for the following security issues:

CVE-2021-33574, CVE-2019-9633, CVE-2020-35448, CVE-2020-12762, CVE-2021-35588, CVE-2020-24370, CVE-2020-10001, CVE-2019-9924, CVE-2021-35567, CVE-2021-26927, CVE-2017-18018, CVE-2021-35564, CVE-2021-3572, CVE-2021-35565, CVE-2021-20231, CVE-2020-14155, CVE-2021-22922, CVE-2021-3796, CVE-2021-20284, CVE-2021-31535, CVE-2018-20673, CVE-2021-35561, CVE-2021-35586, CVE-2021-36084, CVE-2021-36087, CVE-2019-13751, CVE-2021-23440, CVE-2021-3778, CVE-2021-37714, CVE-2020-12399, CVE-2021-22947, CVE-2019-19603, CVE-2021-23840, CVE-2021-3733, CVE-2021-3426, CVE-2021-26926, CVE-2018-10237, CVE-2018-16429, CVE-2021-35578, CVE-2021-3200, CVE-2021-23841, CVE-2021-22925, CVE-2019-5827, CVE-2020-8908, CVE-2021-41617, CVE-2021-35550, CVE-2021-20266, CVE-2020-27828, CVE-2018-12700, CVE-2021-29425, CVE-2021-33197, CVE-2019-18218, CVE-2021-3272, CVE-2019-17594, CVE-2021-33503, CVE-2021-22923, CVE-2021-20232, CVE-2021-28153, CVE-2019-20838, CVE-2019-17595, CVE-2021-35556, CVE-2020-13435, CVE-2021-36086, CVE-2021-20271, CVE-2021-22876, CVE-2021-22946, CVE-2021-27645, CVE-2021-35603, CVE-2019-13750, CVE-2021-3114, CVE-2021-22898, CVE-2021-33560, CVE-2021-36085, CVE-2021-35942, CVE-2021-35559, CVE-2021-3445, CVE-2020-13956, CVE-2020-14145, CVE-2021-37750, CVE 2021-45105, CVE 2021-45046

This release includes fixes for the following security issues for Jupyter Notebooks Python 3.7:

CVE-2018-16429, CVE-2021-33197, CVE-2019-19603, CVE-2021-3778, CVE-2019-18218, CVE-2021-3445, CVE-2021-22946, CVE-2020-12399, CVE-2021-31535, CVE-2021-22876, CVE-2021-33560, CVE-2020-14155, CVE-2021-3426, CVE-2020-14145, CVE-2021-35942, CVE-2021-20232, CVE-2021-20231, CVE-2020-24370, CVE-2021-22925, CVE-2021-35578, CVE-2021-3733, CVE-2021-35588, CVE-2021-20266, CVE-2021-36086, CVE-2021-26926, CVE-2019-17594, CVE-2019-20838, CVE-2021-3796, CVE-2020-27828, CVE-2021-35564, CVE-2021-28153, CVE-2021-3572, CVE-2019-17595, CVE-2021-35559, CVE-2019-13751, CVE-2019-5827, CVE-2021-26927, CVE-2020-10001, CVE-2021-33503, CVE-2018-12700, CVE-2020-12762, CVE-2021-33574, CVE-2021-35550, CVE-2021-35561, CVE-2021-35586, CVE-2021-35556, CVE-2019-13750, CVE-2021-35567, CVE-2020-35448, CVE-2021-27645, CVE-2018-20673, CVE-2021-3200, CVE-2021-23840, CVE-2021-36085, CVE-2021-22898, CVE-2021-35565, CVE-2021-3114, CVE-2021-36087, CVE-2021-35603, CVE-2021-20284, CVE-2021-22947, CVE-2021-36084, CVE-2017-18018, CVE-2021-3272, CVE-2020-13435, CVE 2021-45105, CVE 2021-45046

Refresh 9 of Cloud Pak for Data Version 3.5

A new version of Watson Studio was released in October 2021.

Assembly version: 3.5.5

This release includes the following changes:

Bug fixes

This release includes the following fixes:

  • Issue: Publishing a notebook to a catalog fails.

    Resolution: The issue is now fixed.

  • Issue: The notebook performance on Power is slower than the notebook performance on x86.

    Resolution: The issue is now fixed.

  • Issue: When you create a notebook and run a cell using Plotly, you cannot see the graph from the notebook view.

    Resolution: The issue is now fixed.

  • Issue: Notebook performance decreases on an Open-CE environment.

    Resolution: The issue is now fixed.

  • Issue: Permission issues occur when installing packages within a notebook.

    Resolution: The issue is now fixed.

  • Issue: Jobs that are in a pending state with the event FailedScheduling are deactivated.

    Resolution: The issue is now fixed.

  • Issue: Jupyter Notebooks with R 3.6 are unable to use the readr library because the Jupyter Notebooks with R 3.6 environment is missing the tzdata system package. Missing the zdata system package prevents the library from functioning.

    Resolution: The issue is now fixed.

  • Issue: After multiple jobs are launched, jobs that are pending aren't completed.

    Resolution: The timeout can now be increased. It is configurable through the APP_ENV_JOB_TIMEOUT_INTERVAL_SECS environment variable which defaults to 600 (seconds).

Security fixes

This release includes fixes for the following security issues:

CVE-2021-31535, CVE-2021-20271, CVE-2021-27290, CVE-2020-7774, CVE-2021-3541, CVE-2021-27218, CVE-2021-2341, CVE-2021-3518, CVE-2021-3537, CVE-2021-32723, CVE-2019-19246, CVE-2021-33910, CVE-2021-2388, CVE-2020-25648, CVE-2021-3517, CVE-2020-15945, CVE-2020-13956, CVE-2021-22918, CVE-2021-3516, CVE-2021-3520, CVE-2021-33503, CVE-2021-23362, CVE-2021-2369, CVE-2021-23343, CVE-2021-3421, CVE-2021-31879

This release includes fixes for the following security issues for Jupyter Notebooks Python 3.7:

CVE-2021-29594, CVE-2021-2369, CVE-2021-29557, CVE-2021-29562, CVE-2021-29582, CVE-2021-22918, CVE-2021-29561, CVE-2021-29566, CVE-2021-33910, CVE-2021-29533, CVE-2021-29565, CVE-2021-29541, CVE-2021-29522, CVE-2021-29569, CVE-2021-23362, CVE-2021-29578, CVE-2021-29527, CVE-2021-29564, CVE-2021-20271, CVE-2021-29611, CVE-2021-29521, CVE-2021-29587, CVE-2021-29535, CVE-2021-29517, CVE-2021-29545, CVE-2021-29608, CVE-2021-29548, CVE-2021-3421, CVE-2021-29525, CVE-2020-25648, CVE-2021-29528, CVE-2021-29588, CVE-2021-3541, CVE-2021-29593, CVE-2021-29583, CVE-2021-3518, CVE-2021-27290, CVE-2021-29573, CVE-2021-33503, CVE-2021-29602, CVE-2021-29540, CVE-2021-29558, CVE-2021-29552, CVE-2021-29568, CVE-2021-29597, CVE-2021-3537, CVE-2021-29606, CVE-2021-3517, CVE-2021-29609, CVE-2020-13956, CVE-2021-29572, CVE-2021-29599, CVE-2021-29544, CVE-2021-29560, CVE-2021-29532, CVE-2021-3516, CVE-2021-29601, CVE-2021-29542, CVE-2021-29513, CVE-2021-29584, CVE-2021-29614, CVE-2021-29574, CVE-2021-29550, CVE-2021-29526, CVE-2021-29546, CVE-2021-2388, CVE-2021-29555, CVE-2021-29589, CVE-2021-29556, CVE-2021-29576, CVE-2021-29539, CVE-2021-29603, CVE-2021-29592, CVE-2021-29538, CVE-2021-29549, CVE-2021-29605, CVE-2021-29515, CVE-2021-29520, CVE-2021-29580, CVE-2021-29586, CVE-2021-29543, CVE-2021-29512, CVE-2021-29612, CVE-2021-29617, CVE-2021-29596, CVE-2021-29577, CVE-2021-29551, CVE-2021-29547, CVE-2021-29519, CVE-2021-29563, CVE-2021-29575, CVE-2021-29579, CVE-2021-29530, CVE-2021-29607, CVE-2021-29537, CVE-2021-29616, CVE-2021-29591, CVE-2021-29581, CVE-2021-29598, CVE-2021-29610, CVE-2021-29514, CVE-2021-29518, CVE-2021-29559, CVE-2021-29529, CVE-2021-29536, CVE-2021-29567, CVE-2021-29531, CVE-2021-2341, CVE-2021-29523, CVE-2021-29590, CVE-2021-31879, CVE-2021-29615, CVE-2021-3520, CVE-2021-29585, CVE-2021-29600, CVE-2021-29553, CVE-2021-29604, CVE-2021-29554, CVE-2021-29534, CVE-2021-29516, CVE-2021-29571, CVE-2021-29570, CVE-2021-27218, CVE-2021-29613, CVE-2020-15945, CVE-2021-29524, CVE-2021-23343, CVE-2021-29618, CVE-2021-29619, CVE-2021-29595

Refresh 7 of Cloud Pak for Data Version 3.5

A new version of Watson Studio was released in July 2021.

Assembly version: 3.5.4

Bug fixes

This release includes the following fix:

  • Issue: The application/zip MIME type is the only MIME type that's validated when model types are created. Other MIME types weren't validated.

    Resolution: Multiple MIME types are now validated.

  • Issue: Critical and high vulnerability issues were found.

    Resolution: Critical and high vulnerability issues are now resolved.

  • Issue: The Legacy runtime-definition name is incorrect.

    Resolution: The Legacy runtime-definition name is now correct.

  • Issue: Notebooks cannot install the LightGBM package.

    Resolution: Notebooks can now install the LightGBM package.

Security fixes

This release includes fixes for the following security issues:

CVE-2015-2059, CVE-2017-15708, CVE-2017-18869, CVE-2017-7656, CVE-2017-7657, CVE-2017-7658, CVE-2017-9735, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-1002204, CVE-2018-1109, CVE-2018-12116, CVE-2018-12121, CVE-2018-12122, CVE-2018-12123, CVE-2018-14718, CVE-2018-20834, CVE-2018-7489, CVE-2019-10742, CVE-2019-10906, CVE-2019-11236, CVE-2019-11324, CVE-2019-13173, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-16775, CVE-2019-16776, CVE-2019-16777, CVE-2019-17195, CVE-2019-20330, CVE-2019-25013, CVE-2019-5737, CVE-2020-10672, CVE-2020-10673, CVE-2020-10968, CVE-2020-10969, CVE-2020-11111, CVE-2020-11112, CVE-2020-11113, CVE-2020-11619, CVE-2020-11620, CVE-2020-12399, CVE-2020-12400, CVE-2020-12403, CVE-2020-12723, CVE-2020-12762, CVE-2020-13776, CVE-2020-14060, CVE-2020-14061, CVE-2020-14062, CVE-2020-14195, CVE-2020-14344, CVE-2020-14363, CVE-2020-15095, CVE-2020-15138, CVE-2020-15168, CVE-2020-1971, CVE-2020-24025, CVE-2020-24616, CVE-2020-24750, CVE-2020-25648, CVE-2020-25649, CVE-2020-25692, CVE-2020-26137, CVE-2020-27618, CVE-2020-28168, CVE-2020-28469, CVE-2020-28472, CVE-2020-28477, CVE-2020-28481, CVE-2020-28493, CVE-2020-28498, CVE-2020-28499, CVE-2020-28500, CVE-2020-29361, CVE-2020-29362, CVE-2020-29363, CVE-2020-35490, CVE-2020-35491, CVE-2020-35728, CVE-2020-36179, CVE-2020-36180, CVE-2020-36181, CVE-2020-36182, CVE-2020-36183, CVE-2020-36184, CVE-2020-36185, CVE-2020-36186, CVE-2020-36187, CVE-2020-36188, CVE-2020-36189, CVE-2020-36242, CVE-2020-6802, CVE-2020-6816, CVE-2020-6817, CVE-2020-6829, CVE-2020-7598, CVE-2020-7608, CVE-2020-7661, CVE-2020-7754, CVE-2020-7774, CVE-2020-7788, CVE-2020-7789, CVE-2020-8116, CVE-2020-8174, CVE-2020-8175, CVE-2020-8231, CVE-2020-8252, CVE-2020-8265, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2020-8287, CVE-2020-8840, CVE-2020-8927, CVE-2020-9546, CVE-2020-9547, CVE-2020-9548, CVE-2021-20066, CVE-2021-20190, CVE-2021-20271, CVE-2021-20305, CVE-2021-21366, CVE-2021-22883, CVE-2021-22884, CVE-2021-23337, CVE-2021-23341, CVE-2021-23840, CVE-2021-23841, CVE-2021-24033, CVE-2021-27219, CVE-2021-27290, CVE-2021-3326, CVE-2021-3449, CVE-2021-3450

CVE-2019-12402, CVE-2019-25013, CVE-2020-12399, CVE-2020-12762, CVE-2020-13956, CVE-2020-14344, CVE-2020-14363, CVE-2020-26137, CVE-2020-27618, CVE-2020-27783, CVE-2020-28493, CVE-2020-29361, CVE-2020-29362, CVE-2020-29363, CVE-2020-7754, CVE-2020-7774, CVE-2020-7788, CVE-2020-8116, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2020-8927, CVE-2021-20271, CVE-2021-27219, CVE-2021-28957, CVE-2021-3326

CVE-2019-25013, CVE-2020-12399, CVE-2020-12762, CVE-2020-14344, CVE-2020-14363, CVE-2020-26137, CVE-2020-27618, CVE-2020-27783, CVE-2020-28493, CVE-2020-29361, CVE-2020-29362, CVE-2020-29363, CVE-2020-7754, CVE-2020-7774, CVE-2020-7788, CVE-2020-8116, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2020-8927, CVE-2021-20271, CVE-2021-27219, CVE-2021-28957, CVE-2021-3326

Refresh 5 of Cloud Pak for Data Version 3.5

A new version of Watson Studio was released in April 2021.

Assembly version: 3.5.3

New features
The 3.5.3 release of Watson Studio includes the following features and updates:
The Default Python 3.7 environment includes new open source library versions
The Default Python 3.7 environment now includes the latest open source versions of many popular machine learning libraries like TensorFlow, XGBoost and PyTorch.

The old Default Python 3.7 environment is deprecated and was renamed as Default Python 3.7 (legacy). You should start using the new Default Python 3.7 environment to run your existing notebooks.

Security fixes

This release includes fixes for the following security issues:

CVE-2017-15095,CVE-2019-14540,CVE-2019-14893, CVE-2019-16335, CVE-2019-16942, CVE-2019-17267, CVE-2019-20330, CVE-2020-10672, CVE-2020-10673, CVE-2020-10968, CVE-2020-10969, CVE-2020-11111, CVE-2020-11112, CVE-2020-11113, CVE-2020-11619, CVE-2020-11620, CVE-2020-14060, CVE-2020-14061, CVE-2020-14062, CVE-2020-14195, CVE-2020-15138, CVE-2020-24616, CVE-2020-24750, CVE-2020-26137, CVE-2020-28472, CVE-2020-28493, CVE-2020-7212, CVE-2020-7788, CVE-2020-8116, CVE-2020-8265, CVE-2020-8277, CVE-2020-8287, CVE-2020-8840, CVE-2020-9546, CVE-2020-9547, CVE-2020-9548

CVE-2017-18869, CVE-2018-0734, CVE-2018-0735, CVE-2018-1000168, CVE-2018-12116, CVE-2018-12121, CVE-2018-12122, CVE-2018-12123, CVE-2018-20834, CVE-2019-10906, CVE-2019-11236, CVE-2019-11324, CVE-2019-12402, CVE-2019-13173, CVE-2019-15604, CVE-2019-15605, CVE-2019-15606, CVE-2019-16775, CVE-2019-16776, CVE-2019-16777, CVE-2019-20838, CVE-2019-25013, CVE-2019-5737, CVE-2020-12399, CVE-2020-12400, CVE-2020-12401, CVE-2020-12403, CVE-2020-12723, CVE-2020-12762, CVE-2020-13776, CVE-2020-13956, CVE-2020-14155, CVE-2020-14343, CVE-2020-14344, CVE-2020-14363, CVE-2020-15095, CVE-2020-15945, CVE-2020-1971, CVE-2020-25648, CVE-2020-25658, CVE-2020-26137, CVE-2020-26266, CVE-2020-26268, CVE-2020-26270, CVE-2020-26271, CVE-2020-27618, CVE-2020-27783, CVE-2020-28493, CVE-2020-29361, CVE-2020-29362, CVE-2020-29363, CVE-2020-35521, CVE-2020-35522, CVE-2020-35523, CVE-2020-35524, CVE-2020-35653, CVE-2020-35654, CVE-2020-35655, CVE-2020-36242, CVE-2020-6802, CVE-2020-6816, CVE-2020-6817, CVE-2020-6829, CVE-2020-7598, CVE-2020-7608, CVE-2020-7754, CVE-2020-7774, CVE-2020-7788, CVE-2020-8116, CVE-2020-8174, CVE-2020-8231, CVE-2020-8252, CVE-2020-8265, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2020-8287, CVE-2020-8927, CVE-2021-20197, CVE-2021-20231, CVE-2021-20232, CVE-2021-20271, CVE-2021-20305, CVE-2021-22876, CVE-2021-22883, CVE-2021-22884, CVE-2021-23362, CVE-2021-23840, CVE-2021-23841, CVE-2021-25289, CVE-2021-25290, CVE-2021-25291, CVE-2021-25292, CVE-2021-25293, CVE-2021-27218, CVE-2021-27219, CVE-2021-27290, CVE-2021-27921, CVE-2021-27922, CVE-2021-27923, CVE-2021-28153, CVE-2021-28957, CVE-2021-3326, CVE-2021-3449, CVE-2021-3450, CVE-2021-3487

Refresh 3 of Cloud Pak for Data Version 3.5

A new version of Watson Studio was released in February 2021.

Assembly version: 3.5.2

This release includes the following changes:

Bug fixes

This release includes the following fixes:

  • Issue: The Project > New connection page for the Generic JDBC connection and the SAP HANA connection incorrectly contains a “jdbc” selection.

    Resolution: This problem is fixed.

  • Issue: Jupyter notebook runtimes, including those started for JupyterLab, and the GPU runtimes are not shutdown automatically, although the default idle timeout or the user configured idle timeout was reached.

    Resolution: This problem is fixed.

  • Issue:After customizing the Jupyter Notebooks with R 3.6 pod idle timeout setting, the Jupyter Notebooks with R 3.6 pod doesn't close.

    Resolution: The Jupyter Notebooks with R 3.6 pod now closes according to the idle timeout setting.

Refresh 2 of Cloud Pak for Data Version 3.5

A new version of Watson Studio was released in January 2021.

Assembly version: 3.5.1

This release includes the following changes:

New features

You must install Version 3.5.1 of the Watson Studio service if you want to install the service on Red Hat® OpenShift® 4.6.

In addition this release also includes the following features and updates:

CPDCTL for notebook lifecycle management
You can now use CPDCTL command-line interface to manage the lifecycle of notebooks. By using the notebook CLI, you can automate the flow for creating notebooks or scripts and running jobs, moving notebooks between projects in Watson Studio, and adding custom libraries to notebook runtime environments.

For details on using the CPCTL commands in a notebook, see Notebooks.

Bug fixes

This release includes the following fixes:

  • Issue: Jupyter Notebooks with R 3.6 are unable to use the readr library from tidyverse. The Jupyter R environment is missing the tzdata system package, which is preventing the library from functioning.

    Resolution: Jupyter Notebooks with R 3.6, using the readR library should correctly parse the CSV file into an R data frame.

  • Issue: Customized branding doesn't support multi-byte characters.

    Resolution: Customized branding now supports multi-byte characters.

  • Issue: Collaborators who are assigned an editor role cannot edit the configuration of jobs that other users created.

    Resolution: Collaborators who are assigned an editor role can now edit the configuration of jobs that other users created.

Initial release of Cloud Pak for Data Version 3.5

A new version of Watson Studiowas released as part of Cloud Pak for Data Version 3.5.

Assembly version: 3.5.0

This release includes the following changes:

New features
New jobs interface for running and scheduling notebooks and Data Refinery flows
The user interface gives you a unified view of the job information.

You can create the jobs from either of the following locations:

  • The user interface for the service
  • The Assets page of a project

For details, see Jobs in a project.

New visualization charts
You can use the following visualization charts with Data Refinery and SPSS® Modeler:
Evaluation charts
Evaluation charts are combination charts that measure the quality of a binary classifier. You need three columns for input: actual (target) value, predict value, and confidence (0 or 1). Move the slider in the Cutoff chart to dynamically update the other charts. The ROC and other charts are standard measurements of the classifier.

Evaluation chart

Math curve charts
Math curve charts display a group of curves based on equations that you enter. You do not use a data set with this chart. Instead, you use it to compare the results with the data set in another chart, like the scatter plot chart.

Math curve chart

Sunburst charts
Sunburst charts display different depths of hierarchical groups. The Sunburst chart was formerly an option in the Treemap chart.

Sunburst chart

Tree charts
Tree charts represent a hierarchy in a tree-like structure. The Tree chart consists of a root node, line connections called branches that represent the relationships and connections between the members, and leaf nodes that do not have child nodes. The Tree chart was formerly an option in the Treemap chart.

Tree chart

For the full list of available charts, see Visualizing your data.

New project settings
When you create a project, you can select the following options:
Mark the project as sensitive
Marking a project as sensitive prevents members of a project from moving data assets out of the project.

For details, see Marking a project as sensitive.

Log all project activities
Logging all project activity tracks detailed project activity and creates a full activities log, which you can download to view.

For details, see Logging project activity.

New connections
Watson Studio can connect to:
  • Amazon RDS for MySQL
  • Amazon RDS for PostgreSQL
  • Apache Cassandra
  • Apache Derby
  • Box
  • Elasticsearch
  • HTTP
  • IBM Data Virtualization Manager for z/OS®
  • IBM Db2® Event Store
  • IBM SPSS Analytic Server
  • MariaDB
  • Microsoft Azure Blob Storage
  • Microsoft Azure Cosmos DB
  • MongoDB
  • SAP HANA
  • Storage volume
In addition, the following connection names have changed:
  • PureData System for Analytics is now called Netezza® (PureData® System for Analytics).

    Your previous settings for the connection remain the same. Only the name for the connection type changed.

New SSL encryption support for connections
The following connections now support SSL encryption in Watson Studio:
  • Amazon Redshift
  • Cloudera Impala
  • IBM Db2 for z/OS
  • IBM Db2 Warehouse
  • IBM Informix®
  • IBM Netezza (PureData System for Analytics)
  • Microsoft Azure SQL Database
  • Microsoft SQL Server
  • Pivotal Greenplum
  • PostgreSQL
  • Sybase
Support for Python 3.7
The default Python environment version in Watson Studio Watson Studio is now Python 3.7.

Python 3.6 is being deprecated. You can continue to use the Python 3.6 environments; however you will be notified that you should move to a Python 3.7 environment.

When you switch from Python 3.6 to Python 3.7, you might need to update your code if the versions of open source libraries that you use are different in Python 3.7.

Spark 3.0
You can run analytical assets from Watson Studio analytics projects in a Spark 3 environment.

If you use the Spark Jobs REST APIs, provided by Analytics Engine Powered by Apache Spark, to run Spark jobs or applications on your Cloud Pak for Data cluster, you can use the Spark 3.0 template.

Notebook execution progress restored
If you accidentally close the browser window while your notebook is still running, or if you are logged out by the system during a long running job, the notebook will continue running and all output cells are restored when you open the notebook again. The execution progress of a notebook can be restored only for notebooks that run in a local kernel. If your notebook runs on a Spark or Hadoop cluster, and you open the notebook again, any notebook changes that were not saved are lost.
Use a self-signed certificate to authenticate to enterprise Git repositories
If you want to store your analytics project in an enterprise-grade instance of Git, such as GitHub Enterprise, and your instance uses a self-signed certificate for authentication, you can specify the self-signed certificate in PEM format when you add your personal access token to Cloud Pak for Data.