Skip to Main Content
IBM Data Platform Ideas Portal for Customers


This portal is to open public enhancement requests against products and services offered by the IBM Data Platform organization. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:


Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,


Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

IBM Employees should enter Ideas at https://ideas.ibm.com



ADD A NEW IDEA

Search results

Showing 148

Protect ACI call with program granularity.

Currently you can protect ACI calls adding the resource ACI.Mapname to RACF class. The protection ACI.Mapname protects only the ACI services. When we create a new ACI Stored Procedure we must specify the ACI service we want to use. Suppose we crea...
over 2 years ago in Data Virtualization Manager for z/OS 0 Future consideration

Scanning the content of uploaded Excel file

This subject has been brought to our attention by our clients, they need to make sure uploaded files are scanned for malicious scripts or codes. We deal with many banks and its part of the audit.
about 1 year ago in Cognos Analytics / Reporting 0 Future consideration

Fastmap (#7) - Import of Business Entity Selector type fields

Import of Business Entity Selector type fields must be possible specifying only the Business Entity Code, and not the complete path (folder).
over 2 years ago in OpenPages Ideas / Implementation & Deployment 2 Future consideration

Allowlist only the HTML tags that wont trigger any execution in the browser

As a part of Pent test,it was observed that IBM Cognos application is vulnerable to Stored-XSS occurs when a malicious script is injected directly into a vulnerable web application. The application accepts all type of inputs without validation ...
over 2 years ago in Cognos Analytics / Install and config 0 Future consideration

Add "EXCEPTION" parameter to CHECK INDEX to discontinue processing after N disrepancies

Sometimes when you run CHECK INDEX you encounter a huge number of discrepancies so much so that the utility keeps running and running and producing an excessive amount of output -messages regarding the details of the discrepancies. In some cases y...
over 2 years ago in Db2 Utilities Suite for z/OS 0 Future consideration

saving data with a mouse-click instead of writing code through JDBC connector in CSV or other formats

I can currently browse it in the UI/IDE using the various inspectors. It would be nice if I could easily save this data to a file with a mouse click rather than having to write code, or add JDBC connections and rerun the model, etc. Typically what...
almost 4 years ago in CPLEX Optimization Studio / CPLEX Optimization Studio 0 Future consideration

Support "ansible.controller" Collection

Two clients have asked the ability to develop some ansible playbooks using the config as code ansible collection from Red Hat named 'ansible.controller'. This collection is not part of the default base granite LLM model training. Instead the 'awx....
over 1 year ago in watsonx Code Assistant Ideas / watsonx Code Assistant for Red Hat Ansible 0 Future consideration

Identify Adabas return code by DVM

The DVM enhancement to pass the ADABAS TLSCMD parm overridee works as designed and we can see it being passed to Adabas. If the value of the ADABASCMDTIMELIMIT parameter exceeds the maximum allowed by Adabas, it gives us the error RC=7, an error d...
over 1 year ago in Data Virtualization Manager for z/OS 0 Future consideration

Hardcoded Credentials and key Disclosed in properties files

Hi Team, We got AppSec observation as given below. We have raised the PMR as well but not able to fixed it. PMR No: TS012417843 Requesting you kindly review below points and provide fixes for the same. PFA for your refernce. Obervation: During the...
over 1 year ago in Data Replication: Change Data Capture 0 Future consideration

Modify the message when Load utility encounter table not found.

Sometimes we unload many tables from source DB2 to another one. If some tables do not exist in the target DB2, the load utility will fail with RC=8. this error message is mixed with ordinary information and ends with "I" in a big jobout file. For ...
over 4 years ago in Db2 Utilities Suite for z/OS 0 Future consideration