We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Users would like to have the capability to search on multiple object names at once in Grid View. For example to enter 3 Loss Event Names (e.g. space-separated) and get those 3 Loss Events as a result in Grid View.
Allow specification of IP Ranges or Subnets in Trusted Context definitions
We would like to use Trusted Context to restrict access from specific IP addresses but the current definition requires each IP address to be specified individually. This is cumbersome for our OpenShift infrastructure where it would be more appropr...
Enhancement to DROP PROCEDURE / DROP FUNCTION syntax
Currently, the DROP PROCEDURE statement requires that the all of the procedure parameters necessary to completely identify the specific procedure. This is important due to Informix supporting polymorphic procedures, and is generally a good thing. ...
Provide pre and post upgrade dbm and db checks of Db2 parameters and highlight any deltas
It is currently a best practice that we recommend customers do pre and post upgrade dbm and db checks manually. The request is that this should be performed automatically as part of the Db2 upgrade script itself.
Comparing before and after parame...
There is currently no way to automate the logon to the cloud in the API for PAx. Therefore, I cannot fully automate the generation and dissemination of Excel reports that use Planning Analytics On-Demand. It has to be a person's daily task to open...
On restore or chunk addition allow automatic creation of files in certain folders.
On restore or chunk creation allow automatic creation of cooked files. Add an onconfig parameter which contains a list of folders where automatic cooked chunk creation is allowed. Cooked chunk files can be automatically created in this folder of a...
Prompt user for Dynamic Report name rather than using a random number
When adding a dynamic report, what appears to be added as a reference is a random number. In a book with multiple reports and multiple reports on the same sheet, these numbers give no clue as to which report is being referenced. In Perspectives, i...
PAW report URL - possibility to assign alias (instead of using URL)
Deploy a PAW report to production environment without changing the URL of the report? Background: Updates of reports that are created with design features are saved as Chrome favorites by many end users. Deploying the changes with import functiona...
PAW SMTP notifications Password Risk - Make Encrypted Alternative Available
We wish to set up event notifications in PAW for a client. However, they are not willing to proceed with this because the bootstrap files requires SMTP login and password detials available in clear text. This is represents a major security risk. P...
NONBLOCKED option for event monitors to prevent them from blocking user services
Db2 locking event monitor may block deadlocked applications from proceeding for a purpose of making event monitors work under some circumstances. (Reported on case TS007885986) Since it could damage user's business services severely, user should b...
Do not place IBM confidential, company confidential, or personal information into any field.