Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

All ideas

Showing 4621

Add Web API to retrieve Security PTF's and Bulletins based on CVS level

I would like to be able to pull data through a Web API that would list the available PTF's for security bulletins based on the CVS level assigned to the bulletin.
over 2 years ago in IBM i / Security 6 Future consideration

create a BIF for transliteration/transform facility (ICU BASED)

String replacement and transliteration is an extremely common task in business applications and communication to external parties in international settings. This produce a lot of custom code (and a lot of substandard one) in IBM shops. To do it pr...
10 months ago in IBM i / Application Development 4 Submitted

Implement immediate unmap on file deletion or asynchronous automated unmap

The current implementation of JFS2 unmap allows for the use of chfs -a reclaim=<fast|normal> filesystem This request is to implement a solution closer to other OSs/Filesystems that would remove the manual intervention and release the space a...
almost 2 years ago in AIX 0 Future consideration

Adding a new activation group parameter to CREATE or REPLACE VARIABLE

A C-ILE program is currently being created at CREATE VARIABLE, which runs with the activation group *CALLER. Therefore, the SET VARIBALE VALUE can only be used in the activation group in which the variable is used. By specifying a named activation...
5 months ago in IBM i / Db2 for i 2 Future consideration

Show program lib/name in webservice overview

Currently only the description name of the webservice is shown in the HTTP Admin server. This requires you to click on properties for each individual service to see to which library it is referring which is slow in the web interface. Use Case: Cur...
almost 3 years ago in IBM i / Web Serving 2 Future consideration

ACS Printer Output Favorites

Daily operations on the IBM i require our staff to move/delete/download spool files filtered on several output queues, Userdata and Job Information. Many of these filters are the same every day and it is very time consuming to change the informati...
over 6 years ago in IBM i / IBM i Access Family 5 Future consideration

FIDO2 U2F Support as additional MFA options (without PowerSC)

Easys to use. HMC UI /CLI login based on multi-factor and passwordless authentication without the overpowering PowerSC.
over 2 years ago in Hardware Management Console 1 Under review

Provide DKIM signing to the SMTP server/client on IBM i

DomainKeys Identified Mail, or DKIM, is an authentication protocol that links a domain name to a message. The protocol allows you to sign your email with your domain name. The purpose of the DKIM protocol is not only to prove that the domain name ...
almost 4 years ago in IBM i / Networking 5 Not under consideration

Powervc should warn the administrator about disruptive operations

In some cases powervc can initiate a disruptive change when performing a seemingly non invasive operation, such as adding a new volume. It performs the change in the background that can cause an outage of the VM, for example when zonemanager decid...
10 months ago in PowerVC 0 Submitted

IBM i MULTIPATH SAN BEHAVIOR

Hello,Following the opening of an IBM i OS incident, we were told that we could not specify at the IBM i level the switching behavior between the different SAN paths. If on a loss of SAN path the automatic switch to another SAN path suits us, we d...
over 4 years ago in IBM i / Storage 6 Future consideration