Skip to Main Content
IBM Data and AI Ideas Portal for Customers


This portal is to open public enhancement requests against products and services offered by the IBM Data & AI organization. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:


Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,


Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

IBM Employees should enter Ideas at https://ideas.ibm.com


ADD A NEW IDEA

All ideas

Showing 10202

How to Manage a subset that is presented in the spread function as default

Using a Classic View, the selection under the Spread Function show us a complete list of the member of the dimension. We would like to see here the members depending on a subset.
about 2 years ago in Planning Analytics 1 Not under consideration

Show Member Unique Names in Member Tree in dashboards (on hover or as property)

Provide property for every member in the tree in dashboarding using OLAP sources to see the MUN (member unique name). Show it also as popup on hover. Its absolutely crucial to see the mun to uniquely identify the right element as captions are not ...
about 4 years ago in Cognos Analytics 0 Not under consideration

Report Author Custom group_Select All Issue in CA 11.0.10

Report Author Custom group_Select All Issue(CA 11.0.10): When creating the custom group if “Select all” option is given for selecting the values present, only the values present in that particular range are selected. Rest of the values need to...
about 6 years ago in Cognos Analytics 1 Not under consideration

unsecure root usage

IBM uses root account for everything which is a very unsecure way. Root should be used for emergency access to the system. All processes and everyday work should be done with dedicated accounts that have access only to what they need. The fact tha...
about 2 years ago in Netezza Performance Server 0 Not under consideration

Improved documentation of how to set up and use CP4D built-in monitoring #cpfield

Documentation of how to set up monitoring is inconsistent and not sufficient. The steps are not easy to follow. It is not clear what hostnames should be used in the different steps. The url is incorrect in some steps. Docs claim that 'https://...
about 2 years ago in Cloud Pak for Data Platform 1 Not under consideration

Documentation for @AVE function

@AVE function is not existing in Expression Builder's function list and there is no description about this function in Modeler documentation. Currently sample stream condlearn.str which used in Modeler Tutorial has a derive node which uses @AVE fu...
about 4 years ago in SPSS Modeler / SPSS Modeler 3 Not under consideration

Application is vulnerable to Cross-site Scripting (XSS) attacks

Without proper input validation and output encoding, information systems are susceptible to cross-site scripting, which may result in unauthorized access or malicious attacks against the user.Hence the Hyperlink should be temporarily removed or hy...
about 8 years ago in Cognos Analytics 0 Not under consideration

I configured the job to be executed on a daily. Cads executed jobs duplicate when a server was downed.

When I set the job to be executed on a daily.CADS executed jobs duplicate when a server was downed. When I shut down a server of CADS on Saturday and Sunday.CADS execute jobs 3 times. On Monday CADS executed two jobs of Saturday's (a day of server...
about 8 years ago in SPSS Modeler / SPSS CNDS 0 Not under consideration

bkill instrumentation/logging to find source

Currently the bkill command only tracks (lsb.events) who ran it, and what signal was sent. If we have a heavily active user with a broken script, it is very challenging to find the source of the bkill command. It would be valuable to log the sourc...
about 6 years ago in Spectrum LSF 1 Not under consideration

Increase (over current limit of 10000) the value for Zparm MAXARCH

Is it possible to increase (over current limit of 10000) the value for Zparm MAXARCH (archive log volumes that are to be recorded in the BSDS). Our Production System sometimes cuts over 5,000 Archive Logs in the business' standard Image Copy reten...
about 4 years ago in Db2 for z/OS 1 Not under consideration