Skip to Main Content
IBM Data and AI Ideas Portal for Customers


This portal is to open public enhancement requests against products and services offered by the IBM Data & AI organization. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:


Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,


Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

IBM Employees should enter Ideas at https://ideas.ibm.com


ADD A NEW IDEA

All ideas

Showing 15387

Aging of connected accounts to Access Server

When a client forgets to sign out of Access Server and shuts down their session, Access Server keeps them logged in. The only way to clear the session is to restart Access Server. This is difficult in a multi-user environment (as product is design...
over 5 years ago in Replication: Change Data Capture 2 Not under consideration

Add more criteria for MONITOR CONNECTIONS in DB2 PROFILE tables

Currently the DB2 PROFILE table only allows LOCATION as the selection criteria with the MONITOR CONNECTIONS keyword. We would like to restrict the number of connections a particular application can open, but the connections can: 1) come via a shar...
about 4 years ago in Db2 for z/OS 1 Functionality already exists

Upgrade Advanced Encryption Standard (AES) from 128-bit encryption to 256-bit as the default on IBM Information Server

Upgrade Advanced Encryption Standard (AES) from 128-bit encryption to 256-bit as the default on IBM Information Server
almost 3 years ago in DataStage 0 Not under consideration

Upgrade Advanced Encryption Standard (AES) from 128-bit encryption to 256-bit as the default on IBM Information Server

Upgrade Advanced Encryption Standard (AES) from 128-bit encryption to 256-bit as the default on IBM Information Server
almost 3 years ago in DataStage 0 Future consideration

Add more debug information for error [22001] [IBM] [DB2/NT64] SQL0302N

Ticket TS003868349 In a real-life application, I had a headache with error [22001] [IBM] [DB2/NT64] SQL0302N "The value of a host variable in the EXECUTE or OPEN statement is too large for its corresponding use." Namely, in an application which de...
about 4 years ago in Db2 / Application Development 0 Not under consideration

Obsolete Functionality Enabled

Obsolete Functionality Enabled :The application includes some outdated or unused functions that are not necessary for the product's intended users. Remove any unneeded functionality in order to reduce the attack surface. This was discovered during...
about 7 years ago in Cognos Analytics 0 Not under consideration

Insecure Log Management [OWASP Top Ten 2013 - A5]:

The application logs sensitive information to the user's local disk with no protections for the files or masking for sensitive data inside them. It logs regardless of need and does not seem to have any automated purge process to destroy old data. ...
about 7 years ago in Cognos Analytics 0 Not under consideration

Request designed as POST is accepted as GET:

The application will accept and process a request sent as a GET, even though it is designed to be used as a POST. A GET request exposes any included parameters in browser history, printed pages, and server logs. A POST prevents those exposures. En...
about 7 years ago in Cognos Analytics 0 Not under consideration

COPY UTILITY enhancement

Actually:Incremental image copies are not allowed when:- No full image copies exist for the table space or data set that is being copied-After a successful LOAD or REORG operation, unless an inline copy was made during the LOAD or REORG job.Add a ...
about 7 years ago in Db2 for z/OS 3 Not under consideration

DB2 Multi-Row Fetch/Insert - COBOL Programming Modell

Customer addressed to IBM that the use of DB2 Multi-Row Fetch/Insert is not well accepted by the developers since it increases the programming complexity a lot and is not ease to use in COBOL. Initial discussions pointed to the already addressed "...
over 12 years ago in Db2 for z/OS 0 Not under consideration