We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Our company is in the middle of implementing an 'in-flight data encryption' for all database activity that requires SSL use. Other IBM products such as IBM Data Studio and Data Server Manager allow for connections to databases using SSL jdbc driv...
We want to avoid submitting a job that attempts to recover a table (using advanced recover) if the table is unrecoverable, as this may lead to a situation where we have lost the table without being able to restore it.This should also be the case w...
Rebuild Index for Redirected Recovery based on TARGET environment
A Redirect Recovery was done from one db2 subsystem to another. The jobs all completed successfully, however when the application started to run, they received a 00C90206 - "Inconsistent data" error. It turns out our target environment had tw...
Priorities of application profiles should be honored by application group when doing recovery
When combining several application profiles with differenct priorities into an application group, these should be taken into account when a recovery plan is executed so that the objects in the highest prioritised profile are reovered first.Today t...
The size of the EXTFILE is actually hard coded in the skeleton. Other than reducing the scan range (currently 3 and 7 hrs), we can recommend updating the skeleton. For the transaction scan, you can edit SARYSLIB members ARYINBX (currently line 90)...
We would like to be able to recover freed packages.
One of our clients always performs bind from a temporary library to avoid cluttering. This means it can require some investigation to find the correct DBRMs, especially if a lot of package were ...
We need to be able to predict how long time a recovery will take, and follow how long time is left as the recovery is going on.
We also need to have an overview of which objects are unrecoverable, or if recovery has failed for other reasons.
Do not place IBM confidential, company confidential, or personal information into any field.