Skip to Main Content
IBM Data and AI Ideas Portal for Customers


This portal is to open public enhancement requests against products and services offered by the IBM Data & AI organization. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:


Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,


Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

IBM Employees should enter Ideas at https://ideas.ibm.com


ADD A NEW IDEA

All ideas

Showing 15412

Allow unencrypted password in an SSL conversation

This is a request to align the behavior of DB2 LUW with that of IBM i and DB2 for z/OS when connecting with a DRDA client. With the other 2 platforms, if DRDA is configured to require user/password to be sent encrypted with minimum encryption leve...
over 6 years ago in Db2 / Security 0 Not under consideration

Add WKC display of version

We use WKC v4.5.1. There is no easy way for WKC users to know the version of the application. Add installed version of WKC in Version Details screen.
about 2 years ago in Knowledge Catalog 1 Functionality already exists

Monitoring of Storage Volumes

Monitoring of resource utilization is important for operational support and capacity planning. Currently Memory/CPU utilization is available. Add storage volumes in Monitoring of WKC system Add historical data greater than 7 days Add Capability of...
about 2 years ago in Cloud Pak for Data Platform 1 Not under consideration

Have launchTemplateId/Instance template for LSF Google Resource Connector work the same as if launching from Google cli/portal

Google LSF Resource Connector has the option to launch VMs based off Instance Template feature of GCP thru the launchTemplateId field in googleprov_templates.json. There is additional flexibility in being able to override settings defined in the I...
about 2 years ago in Spectrum LSF / Cloud Bursting 0 Future consideration

Trigger jobs command line by ensuring failover

To trigger the jobs(which is a collection of reports) from external to the cognos system, we see a trigger utility available.trigger.sh http://loca lhost:9300/p2pd/servlet/dispatch username password namespaceID triggername We see that trigger.sh a...
almost 9 years ago in Cognos Analytics 0 Not under consideration

Package Specific Object Library for Queries and Data Containers

Our team uses an Object Library with a set of standard components used across reports via layout component references. This includes things like logos, headers, footers, and statically defined prompts. This works well to keep consistency throughou...
over 6 years ago in Cognos Analytics 0 Not under consideration

Cognos BI integration using LDAP group authorization takes 20 seconds to login into Cognos BI

Logon into Cognos BI takes 20 seconds when LDAP groups are used for authorizations. Please provide sub-group starting point for searching LDAP groups.
almost 9 years ago in Cognos Analytics 0 Not under consideration

Informix cluser technology

when running the write application on the SDS node, the performance is very bad. and customer hope to change the architecture. with oracle RAC and DB2 purescale, the customer could run the different application (for example one is CRM, the other i...
almost 9 years ago in Informix / Informix Server 0 Not under consideration

PAW ProxyTimeoutSeconds

In PAW ProxyTimeoutSeconds: the maximum number of seconds the gateway waits for a backend service response. Value is 120. More than this value is not valid and you can't stop PAW from showing an error ("Action button error: request timed out. The ...
about 2 years ago in Planning Analytics 1 Not under consideration

ADBTEP2 - Provide an SQL ERROR LIMIT' parameter (similar to DSNTEP2/MAXERRORS)

We have recently started to use ADBTEP2 for its added benefits. When used as a dynamic SQL processor (i.e. in lieu of DSNTEP2, for instance), the names of 4 of the 5 instream parameter names and format are identical to those found in DSNTEP2. The ...
over 4 years ago in Db2 Administration Tool for z/OS 1 Not under consideration