Skip to Main Content
IBM Data and AI Ideas Portal for Customers


This portal is to open public enhancement requests against products and services offered by the IBM Data & AI organization. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:


Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,


Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

IBM Employees should enter Ideas at https://ideas.ibm.com


ADD A NEW IDEA

All ideas

Showing 15222

When copying or moving a report, modify the warning message "an item with this name already exists"

It should display the report name in the user's language set, or even better both the name in default language and also the displayed language so the user can easily locate the object in question.
almost 7 years ago in Cognos Analytics 0 Not under consideration

message to indicate a table lock escalation is being attempted

To indicate a table lock escalation is being attempted, either through DSNI031I or via a new message.
almost 7 years ago in Db2 for z/OS 1 Not under consideration

Cognos Audit table not showing Client IP

The COGIPF_REMOTEIPADDR column of COGIPF_USERLOGON table not showing the machine ip of the user.
over 8 years ago in Cognos Analytics 0 Not under consideration

Authorization Switching for ADMIN_COMMAND_DB2 and DSNUTILU

ADMIN_COMMAND_DB2 and execution of DSNUTILU need to have the capability to allow for authorization switching. Our developers and application production support teams need to be able to cancel threads relevant to the jobs they support vs having to ...
about 4 years ago in Db2 for z/OS 3 Not under consideration

Bug Fix - Modfy Session expiration time due to inactivity

WSL v 1.2.3 has been configured for 15 minutes inactivity time-out using the command below. (15 mins is in line with OCBC's security policy) Example.$cat /user-home/_global_/config/jwt/expiry.config xxx It is expected that the system will only log...
over 5 years ago in watsonx.ai 1 Planned for future release

Unify the CASE package version number with CP4D refresh version number

We have too many version number in CP4D and its services. For example, CASE package version, Operator version, Operand version and Service version. Operator and operand versions https://www.ibm.com/docs/en/cloud-paks/cp-data/4.0?topic=planning-ope...
almost 3 years ago in Cloud Pak for Data Platform 0 Future consideration

Obsolete Functionality Enabled

Obsolete Functionality Enabled :The application includes some outdated or unused functions that are not necessary for the product's intended users. Remove any unneeded functionality in order to reduce the attack surface. This was discovered during...
almost 7 years ago in Cognos Analytics 0 Not under consideration

Insecure Log Management [OWASP Top Ten 2013 - A5]:

The application logs sensitive information to the user's local disk with no protections for the files or masking for sensitive data inside them. It logs regardless of need and does not seem to have any automated purge process to destroy old data. ...
almost 7 years ago in Cognos Analytics 0 Not under consideration

Request designed as POST is accepted as GET:

The application will accept and process a request sent as a GET, even though it is designed to be used as a POST. A GET request exposes any included parameters in browser history, printed pages, and server logs. A POST prevents those exposures. En...
almost 7 years ago in Cognos Analytics 0 Not under consideration

Support hierarchies in drill through functionality

The TI Function ReturnViewHandle utilized in that feature does not support MDX views which were the only way to include alternate hierarchies. So it is not possible to create drill through processes which respect alternate hierarchies. We need thi...
over 5 years ago in Planning Analytics 1 Future consideration