Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

IBM i

Showing 2884 of 4471

add record type to DNS_LOOKUP table function

DNS supports obviously many record types. Apparenty DNS_LOOKUP ask just for A type. Please add record type query for to DNS_LOOKUP as a second parameter (i.e. to ask for MX type, TXT type.... etc....)
over 2 years ago in IBM i / Db2 for i 1 Future consideration

Disallow ENDJRNPF by work with system security

add option to Work with System Security to disallow ENDJRNPF for files in User libraries. If set to NO, users with appropriate security settings may ENDJRNPF. If set to YES, no user (even *SECADM) may ENDJRNPF.(maybe not applicable on *IBM librari...
about 4 years ago in IBM i / Db2 for i 6 Not under consideration

Backport DCM API's to V7R3

Please backport the DCM API's back to V7R3. Use Case: Automation of certificates in V7R3 is now impossible while the release will exist for quite some time.
about 4 years ago in IBM i / Security 6 Not under consideration

IBM Navigator for i - optional second value returned for metrics

Metrics could be enhanced significantly by allowing the use of a second (optional) value returned from the SQL. Use Case: The new iNav opens a world of possibilities with customisation of charts, metrics, etc. One thing that crossed my mind was th...
about 3 years ago in IBM i / System Management 3 Future consideration

Improve Performance of QSYS2.BOUND_SRVPGM_INFO

The performance of QSYS2.BOUND_SRVPGM_INFO is really bad when you're using it in order to get all programs that use a specific BOUND_SERVICE_PROGRAM. More details can be found in the defined Use Case. However, using the same View with the given st...
over 3 years ago in IBM i / Db2 for i 2 Not under consideration

ACS - Run SQL Scripts - Allow for viewing of column data type and column comments in results window

When you run a select * from table command in Run SQL Scripts it will output the raw data and columns. Many more advanced SQL editors show you the following additional data: 1. Column data type (both by hovering over column) and below the column (...
about 7 years ago in IBM i / IBM i Access Family 3 Not under consideration

Problem to detect infected files or AR attack if mount from Unix is used

Dear center /support 1.The usage capabilities of NFS are similar to those of shared folders. Nevertheless, the QIBM_QPWFS_FILE_SERV exit point is not alerted by operations made in NFS. This opens a security gap as our Anti-Ransomware is based on t...
almost 2 years ago in IBM i / IFS (Integrated File System) and Servers 3 Future consideration

RTVSYSVAL variable length requirements

IBM i, currently at V7R4M0. Created CL program to retrieve the QSYSLIBL and QLURLIBL system values. Compiled without errors. When manually calling the CL program, the following error message was received. Additional Message Information Message ID ...
about 3 years ago in IBM i / Work Management and Messaging 3 Future consideration

Add timestamp to peak temporary storage

The system tracks the peak temporary storage for each temporary storage bucket. The addition of a timestamp for when the peak was hit would be very helpful in understanding and debugging temporary storage consumption issues. Use Case: I have a cli...
almost 4 years ago in IBM i / Core OS 4 Not under consideration

System Journal during restore

During scratch load (system restore after crash), the original System journal (QAUDJRN) was not restored instead, new journal was created using timestamp as name. This has created major problem for the system replication software (MIMIX) since it ...
over 4 years ago in IBM i / Security 4 Not under consideration