This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
When defining a data structure in CLLE with DCL STG(*DEFINED), allow subfields to be defined as qualified in a similar way to RPG. e.g. DCL &STRUCT *CHAR(100) DCL VAR(&SUBFIELD) TYPE(*CHAR) STG(*DEFINED) + LEN(2) DEFVAR(&STRUCT 1) QUAL...
Command / SQL service to retrieve specific IPL attributes
Increased use of flash copy requires changes to IPL attributes before the copy has been made, to control the behaviour of the cloned partition.
These changes need to be reverted on the parent partition to avoid unwanted behaviour at IPL.
This issue is related Tookit iHA 1.2. In our environment there are 2 flash backups daily as Pre flash backup (EXT) and Post flash backup (SHW). Referring to IBM case TS010715954 IHA Toolkit 4.4 GOLD_ PT backup issue Couple of days back we had issu...
Update SSH Host Key Ciphers and algorithms Sha-256/512
We are running Data Power Gateway appliances, these the supply the security we use for connectivity to all our trading partners, one trading partner that we connect with uses AWS and AWS have recently updated their security policy that now require...
In addition to adopting authority to access data BRMS should swap user profiles too.
IBM i 7.5 killed some BRMS functions we were using by changing the *PUBLIC authority to data from *USE to *EXCLUDE. You may think this is a security enhancement but it isn't. Now instead of users only being able to see data we have to add QBRMS as...
The New Navigator for i is brilliant. Today we are forced to use the heritage Navigator for i if we want to maintain BRMS and the Advanced Job Scheduler. BRMS and AJS need to be part of the New Navigator for i as soon as possible, removing the nee...
HMC Performance Dashboard shows different calculated graphs depending if the LPAR is in Shared-Pool and Dedicated Mode
At the moment the HMC Performance Dashboard is using a different calculation method - depending on the LPAR using Shared-Pool or Dedicated-Donating Mode - to display the CPU utilization graph without any hint of these differences. Both graphs are ...
Add PGM parameter to Command Definition (CMD) command
On CRTCMD, PGM parameter defines the command processing program (CPP) for the command being created. Add this parameter to the CMD definition statement so the CPP can be coded within the command source. Today, the CPP must be specified each time t...
Do not place IBM confidential, company confidential, or personal information into any field.