We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Enable HTTPS access to the JDBC Gateway admin console via key ring
JGate was most recently enhanced to allow secure access by adding a keystore and password to the startServer script. While functional, this is a security exposure. We would like to use a RACF key ring instead.
Currently all logic within DVM is encapsulated with the SQL statements. This limits the amount of logic that can be handled within DVM and forces us to potentially make multiple distributed calls to DVM to complete one unit of work. By adding (or ...
Currently, when new web services are added, z/OS Connect must be refreshed to recognize the existence of a new operation or group of operations. The refresh must be done by issuing a REST call to /dvs?Refresh. Ideally, there should be a way to inc...
Allow Source DVM to pass Virtual Target System name to target DVM over IDF
We would like the ability for the source DVM to pass information, such as the Virtual Target System name, to the target DVM and make this information available within the rules running on the target. This will allow us to reduce the number of DVM ...
Create utility to generate encrypted password in the same manner as AVZDRATH
Currently, AVZDRATH has the ability to take in an encrypted password as input, however there are no other utilities available to generate the encrypted password outside of AVZDRATH. Since our DVM support team will be responsible for managing the g...
Do not place IBM confidential, company confidential, or personal information into any field.