We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Db2 trace data should provide metrics related to secured connections (SSL, AT-TLS)
On our approach to convert all tcp/ip based connections to Db2 for z/OS to secured/protected ones (SSL,AT-TLS), we are missing a way to measure our progress here.
The only way to get information about the portion of secured connections is (as fa...
We sometimes need to reset the old statistics in regards to access path selection.This is possible by RUNSTATS ... RESET ACCESSPATH. But in some cases the new RUNSTATS run long enough so that DYNAMIC SQL statements can slip into this timegap.Hence...
It's been well documented that synonyms are deprecated in DB2 z/OS, and we are trying to eliminate them in our systems before our Db2 V12 upgrade. Unfortunately other than telling people to cut it out, we don't have any way of stopping people fro...
The current z/OSMF workflows delivered with DB2 z/OS version 11 and 12 contain the basic installation process as defined in the manual. Most customers add, delete, reorder or customize steps when they execute a DB2 migration. In order to make th...
Utility Flashcopy Templates verification in UTILINIT phase.
Running a reorg tablespace with a FlashCopy image copy instead of a classic image copy can lead to a successful reorg but a COPY Pending status if the FCCOPYDDN parm is pointing to a missing SYSTEMPL template although the System Action for the DSN...
Change IRLM hashing algorithm to offer a better and more efficient distribution of P-locks across LTEs
As per PMR 76883,999,866/TS002531202, when increasing DSMAX and PCLOSET/N parms to reduce TCB DBM1 CPU time owing to less open/close operations, we noticed a significant increase in IRLM CPU time, strongly correlated with higher number of currentl...
Secure Db2 audit trace activation without possibility to stop or modify for Db2 admins
Because of supervisory regulation we need some Db2 audit traces, which are running the whole Db2 runtime at anytime and which cannot be stopped or modified by any Db2 admin IDs (like Install SYSADM, SYSADM, SECADM...).
Do not place IBM confidential, company confidential, or personal information into any field.