Skip to Main Content
IBM Data and AI Ideas Portal for Customers


This portal is to open public enhancement requests against products and services offered by the IBM Data & AI organization. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:


Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,


Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

IBM Employees should enter Ideas at https://ideas.ibm.com


ADD A NEW IDEA

All ideas

Showing 15325

Aging of connected accounts to Access Server

When a client forgets to sign out of Access Server and shuts down their session, Access Server keeps them logged in. The only way to clear the session is to restart Access Server. This is difficult in a multi-user environment (as product is design...
over 5 years ago in Replication: Change Data Capture 2 Not under consideration

Provide a method to allow LSF simulations to be captured by a customers RTM

Provided a customer set's up a RTM hostname, and credentials, when a simulation is started, register the simulation clusters data collector and the cluster itself with that RTM and then enable collection for the duration of the simulation. Name th...
over 1 year ago in Spectrum LSF / Simulation & Prediction 2 Not under consideration

Application rotation or maintenance of created files in /tmp (ex. snappy)

The product leaves temporary files into /tmp directory that are not properly taked care of. That means that external processes must be carried out in order to not flood that directory. Could you please implement into the product any mean of addres...
over 1 year ago in DataStage 0 Under review

Encryption utility for RSP files

Goal: create RSP (response) file to install Db2 LUW on multiple systems, but allow for customization of the password for the instance owner without having to go through the GUI installer for each, and avoid displaying the password in plain text in...
almost 3 years ago in Db2 / Installation & Upgrade 0 Future consideration

Bug Fix - Modfy Session expiration time due to inactivity

WSL v 1.2.3 has been configured for 15 minutes inactivity time-out using the command below. (15 mins is in line with OCBC's security policy) Example.$cat /user-home/_global_/config/jwt/expiry.config xxx It is expected that the system will only log...
over 5 years ago in watsonx.ai 1 Planned for future release

Obsolete Functionality Enabled

Obsolete Functionality Enabled :The application includes some outdated or unused functions that are not necessary for the product's intended users. Remove any unneeded functionality in order to reduce the attack surface. This was discovered during...
almost 7 years ago in Cognos Analytics 0 Not under consideration

Insecure Log Management [OWASP Top Ten 2013 - A5]:

The application logs sensitive information to the user's local disk with no protections for the files or masking for sensitive data inside them. It logs regardless of need and does not seem to have any automated purge process to destroy old data. ...
almost 7 years ago in Cognos Analytics 0 Not under consideration

Request designed as POST is accepted as GET:

The application will accept and process a request sent as a GET, even though it is designed to be used as a POST. A GET request exposes any included parameters in browser history, printed pages, and server logs. A POST prevents those exposures. En...
almost 7 years ago in Cognos Analytics 0 Not under consideration

COPY UTILITY enhancement

Actually:Incremental image copies are not allowed when:- No full image copies exist for the table space or data set that is being copied-After a successful LOAD or REORG operation, unless an inline copy was made during the LOAD or REORG job.Add a ...
almost 7 years ago in Db2 for z/OS 3 Not under consideration

Nulls should display correctly in Frequency Distribution

Currently in a Data Quality, Frequency Distribution for an asset created by legacy COBOL on mainframe, the field may contain spaces or main contain Low Values (Hex 00) character. Currently WKC displays any non-printable character as "Spaces". In t...
over 1 year ago in Knowledge Catalog 0 Not under consideration