Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

My votes: Db2 for i

Showing 383 of 4458

Increase maximum file member size

Increase maximum file member size, currently limited to 1.7TB. Use Case: customer stores large binary objects in file using SQL and reaches file limit. Currently they do not want to separate objects to multiple tables or work with partitioning.
over 5 years ago in IBM i / Db2 for i 2 Not under consideration

Do not duplicate format identifier during CRTDUPOBJ processing

On the CRTDUPOBJ command there is an option to duplicate file identifers (FILEID). If set to *NO this will create unique file and member identifiers for the new object but will retain the format identifier. This format identifier makes the objects...
about 5 years ago in IBM i / Db2 for i 2 Is a defect

Create an exit point similar to QIBM_QZDA_SQL2 but for all other SQL interfaces

There is no exit point for SQL when run outside the scope of ACS RUN SQL SCRIPTS or "Access i ODBC" as it is referred to in the docs. We need the ability to monitor and do other things for all SQL statements run on the system. We have users coming...
over 2 years ago in IBM i / Db2 for i 2 Future consideration

Prevent ALTER TABLE when field size expanded and there is a field procedure

When a field procedure is assigned to a field, in our case for purposes of encrypting the field data, and an ALTER TABLE is allowed to execute against the field to expand the field size, then data corruption occurs. Use Case: Example Create table ...
about 4 years ago in IBM i / Db2 for i 4 Not under consideration

AES Crypt

Make the AES algorithm compatible with AES calculated by different software platforms. The ENCRYPT_AES sql function can encrypt a DB column. Unfortunately the algorithm is IBM proprietary [The internal encryption algorithm used is from the CLiC To...
about 1 year ago in IBM i / Db2 for i 1 Not under consideration

CPYTOSTMF

The CPYTOSTMF does not have the functionality to create a "Native Excel" XLS or XLSX file when the FROMFILE is an Physical file . Currently the CPYTOSTMF creates a delimited file separating fields using a comma, tilde, semicolon, etc. Suggest the ...
about 4 years ago in IBM i / Db2 for i 6 Not under consideration

EDRSQL server requires QUSER *RWX authority to ROOT

We recently secured our ROOT directory in the IFS; however, when the EDRSQL server job (QXDAEDRSQL) starts up; MSG CPE3401 is shown in the joblog and the job ends. (see attached joblog) The Security Audit Journal records an Authority Failure (AF) ...
about 1 year ago in IBM i / Db2 for i 2 Future consideration

Allow variables defined with like(...) to be used as embedded SQL host variables

Variables defined with like(...) should be usable as embedded SQL host variables. Allowing only variables defined with a specific datatype makes for more difficult application maintenance.
about 1 year ago in IBM i / Db2 for i 2 Not under consideration

Trace usage of External SQL functions (linked to an external program) in OBJECT_STATISTICS or somewhere else

There is no IBMi object for External SQL Functions (linked to an external program). These functions are only knows and identified in DataBase level. It is impossible to know the last usage date for these functions. You can get the last usage date ...
almost 2 years ago in IBM i / Db2 for i 2 Functionality already exists

SQL check authority enhancement to understand level of authority

QSYS2.SQL_CHECK_Authority function in SYSTOOLS, is available to retrieve whether the current user is authorized to an object. This is good as returns 1 if authorized. However, if the business needs to know, for a file object whether user can view ...
over 2 years ago in IBM i / Db2 for i 1 Future consideration