We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Need a function or pseudo-field to return the number of elements in a BSON array
Put in simplest terms, if I have a JSON/BSON record with an embedded array, I need to know how many elements are in the array. I need a function similar to bson_size() (which returns the string length of the total array) which instead returns the ...
In the below the foreign key does not use the compound index.Another index is created with adds overhead.create table p1 (t char(4) not null);
create unique index px1 on p1(t);
alter table p1 add constraint primary key (t) constraint p1_pk;
Allow the option to use LDAP for HQ Authentication. Build the user name in HQ but allow it to use domain authentication. This would also allow HQ to write backups to mapped drives. See Support Case TS007408895 for further details.
Expand DELETE syntax implementing LIMIT clause and maybe also ORDER BY.Delete syntax can be like:DELETE [FROM] tbl_name [WHERE where_condition] [ORDER BY ...] [LIMIT row_count]This limit + order by syntax is already implemented in other m...
Informix row level auditing masks (INRW, DLRW and UPRW) can be used to audit DML operations on application tables. During batch jobs (that use temporary tables extensively) it was noted that Informix is auditing temporary tables unnecessary causin...
Enhance dbschema to generate SQL for sysuser entries
The sysadmin users is used to store:
PAM trusted users (sysauth)
trusted contexts (systcxusers, systcxattributes, systrustedcontext)
local users (syssurrogates, sysusermap)
Dbschema should be extended to allow generated DDL for:
Whenever Informix performs a backup of the rootdbs, it automatically backs up Informix critical files (oncfg, onconfig & sqlhosts). When the Informix critical files are restored via "onbar -r -cf only -t <A TIMESTAMP>", it restores the l...
HammerDB is a leading benchmarking tool to benchmark database performance. This tool enables DBA to verify configuration of the OS/database and assess the impact of any hardware or database configuration changes.
HammerDB supports DB2 however th...
Do not place IBM confidential, company confidential, or personal information into any field.