Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

IBM i

Showing 2882 of 4468

Prevent Data Corruption Via CPYSPLF

CPYSPLF, which by default is set to *PUBLIC *USE, if directed at a regular, multi-field database file, will overwrite that file without warning. Request is to either prevent the copy or issue a warning that multiple fields will be overwritten. (I ...
almost 4 years ago in IBM i / Print 3 Not under consideration

Auto login with saved encrypted userid and password

I would like the ability to store a user id and encrypted password in IBM i Access Client Solutions. I would integrate it with the change password screen so it saves the password when you change it. This should work with standard ACA features and ...
over 5 years ago in IBM i / IBM i Access Family 5 Not under consideration

Allow zero-based numbering / subscripts for arrays within RPG via compiler directive / ctl-opt

Over the past several releases, RPG has greatly enhanced its array capabilities. Several "modern" programming languages such as C, Java, PHP & Python are indexed beginning with the zero subscript. In allowing RPG to use zero-based numbering vi...
about 5 years ago in IBM i / Application Development 7 Not under consideration

SQL query to report on RGZPFM history with same details shown in table reorganzation panes

Provides historical details of table reorganizations that would benefit support and application users
about 1 year ago in IBM i / Db2 for i 1 Future consideration

xlsx file format transferfile from ACS dtfx crashes external pivot table with link to that xlsx

We work with pivot tables in Excel with link to source XLSX files, daily refreshed with dtfx files and java-code from Power i.Filetransfer we did before with RXFERPCB.exe and DTF files and all pivot tables worked fine.Now we transfer the files wit...
almost 3 years ago in IBM i / IBM i Access Family 3 Not under consideration

Support n-way DASD mirroring

We would like to be able to mirror storage across more than two physical DASD units per logical storage unit. Use Case: Mirroring currently only supports two DASD units, so it only has protection against a single DASD device failure in the pair. W...
almost 4 years ago in IBM i / Storage 1 Not under consideration

Protect the configuration files for i Access Solutions form tampering

Hello We are concerned that the end user can change the "i Access Solutions" installed configuration by tampering the .HOD files or the AcsConfig.PropertiesWe need to be able to secure these files and similar ones from end user tampering by preven...
about 6 years ago in IBM i / IBM i Access Family 2 Not under consideration

CPYTOSTMF needs CHGDATE parameter like CPYSRCF ... SRCCHGDATE()

When using CPYTOSTMF, e.g. to copy source members from a source physical file to the IFS, for example, to populate git or some other source code version control repository, CPYTOSTMF always assigns the current date/time to the *STMF created. We wa...
almost 8 years ago in IBM i / IFS (Integrated File System) and Servers 6 Not under consideration

Provide authentication mechanisms like SAML 2.0 for web services client

Provide authentication mechanisms like SAML 2.0 for web services client Use Case: Several of our clients need to access webservices and are required to authenticate via SAML 2.0 based on a X509 certificate.
over 8 years ago in IBM i / Web Serving 5 Future consideration

A way to change System Policy via command line

We need find a way to submit two control groups to batch mode backup. In the control group exit line, we'd like to change the way BRMS System Policy parameter "Restricted state time limit" to different value according to the control group.If ENDSB...
almost 4 years ago in IBM i / BRMS 7 Future consideration