Skip to Main Content
IBM Z Software


This portal is to open public enhancement requests against IBM Z Software products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Runtime

Showing 973 of 8211

CICS should execute the EXEC CICS GET CONTAINER INTO command under the EXECKEY of requesting program to honor CICS storage protection.

Currently when a USERKEY task executes an EXEC CICS GET CONTAINER INTO if the receiving data area is smaller than the container data the program creates a storage violation. Because CICS processes the GET CONTAINER command on behalf of the task, a...
about 1 year ago in CICS Transaction Server for z/OS / Runtime 4 Future consideration

Provide a new option for how CICS should recover from a storage violation

Why is it useful? If I enable all CICS storage protection options (RENTPGM=PROTECT STGPROT=YES TRANISO=YES), define all programs with EXECKEY=USER, and define all transactions with ISOLATE=YES, I can be reasonably confident that any victim task of...
6 months ago in CICS Transaction Server for z/OS / Runtime 1 Future consideration

Turn CICS trace, DFHTRAP, or Stg Violation checker ON or OFF based on CICS issuing a message or on matching a CICS Policy

Some customers will not run with CICS internal trace active all the time, especially in production. But there are times where we will need to turn CICS diagnostic features on to capture diagnostics. If the event being diagnosed is not easily repro...
over 2 years ago in CICS Transaction Server for z/OS / Runtime 2 Future consideration

Create a single SMF field that represents the primary wait reason.

There are over 500 fields in the current SMF 110 (1) record. We have started sending these to Splunk, but had to whittle the number of fields down to about 20 considering we process up to 2 billion SMF records per day. There are so many different ...
5 months ago in CICS Transaction Server for z/OS / Runtime 1 Not under consideration

Tolerate unknown elements for SOAP web services

One of our web service applications is getting a DFHPI1007 error calling a remote service from CICS (so CICS is the web service consumer). It turned out, that the server system added some optional elements to their web service response in their re...
over 1 year ago in CICS Transaction Server for z/OS / Runtime 2 Not under consideration

CICSPlex WLM should take care of amount of allocated storage in AOR

CPSM does not route requests into a target region having SOS. But if a CICS is close get an SOS it may happen that still new transactions are routed into this CICS.CPSM should put the percentage amount of allocated storage into the WLM decision to...
about 3 years ago in CICS Transaction Server for z/OS / Runtime 1 Not under consideration

STGRCVY=NO should work as documented

Why is it useful? Abending the victim task of a storage violation is a defence against applications acting upon and/or committing corrupted data. CICS Documentation (all releases) promises "If you specify STGRCVY(NO), CICS abends the task if it is...
6 months ago in CICS Transaction Server for z/OS / Runtime 1 Future consideration

Detecting a Shipped Terminal created by CRTE

We need to detect if a shipped terminal corresponds to an active CRTE session
about 2 years ago in CICS Transaction Server for z/OS / Runtime 4 Not under consideration

Request that CICS added transaction tracking /origin data for web services routed by CICS RZ domain request streams processin

The explanation is that a new point of origin is created in the AOR when a web service pipeline handler transaction is routed over an MRO connection. as shown in this link : https://www.ibm.com/docs/en/cics-ts/5.6?topic=data-origin-characteristics...
over 2 years ago in CICS Transaction Server for z/OS / Runtime 1 Future consideration

Suppress specific log messages in Liberty

With JVM server profile option "LOG_LEVEL", I can control the level of messages, that will be written to Liberty "messages.log" and dfhjvmlog. For example "LOG_LEVEL=WARNING" supresses all Info-messages. We want to suppress only specific messages,...
about 3 years ago in CICS Transaction Server for z/OS / Runtime 1 Future consideration