Skip to Main Content
IBM Z Software


This portal is to open public enhancement requests against IBM Z Software products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

All ideas

Showing 6146

IP Probe: A “telnet-like” IP probe utility for z/tpf

The release of this tool to the public domain has been requested and authorised by sncf tpf systems management. The full code and documentation is available at https://bitbucket.org/iansw/public/src/master/IP%20Probe/ Background: Whilst the use of...
over 1 year ago in z/TPF Product Family / z/TPF 1 Not under consideration

CPSM Audit Log needed for all CPSM EYUDREP resource changes

CICS provides complete audit logging of all changes made either through CEDA or CEMT. For example, a CEDA change to a program results in this in the MSGUSR DD output: TC20 CEDA CVMGT1 BEFORE 06/14/17 18:48:35 ALTER PROGRAM(GJTABCD) GROUP(TESTGJT) ...
over 7 years ago in CICS Transaction Server for z/OS / Runtime 1 Not under consideration

Need a field (attribute), of the TASK resource table, which allows me to have the CPU time of a "THREADSAFE" task.

In a threadsafe application, all DB2 Requests stays on L8 TCB.The cputime is only going to get updated when we come off the L8 TCB. (If it were a quasirent applicatoion and switched back to QR after every DB2 request, the cputime would be accumula...
almost 11 years ago in CICS Transaction Server for z/OS / Runtime 4 Not under consideration

DL/I Call Resource Governor

IMS should support a resource governor facility which can abort an inflight DL/I call after a certain amount of CPU, I/O, or elapsed time. The abort should abend the UR. This will help prevent situations where a problematic long running DL/I call ...
over 7 years ago in IMS Database Manager / DLI 2 Not under consideration

DB2 tooling: Add a feature to control the end users ability to save a DB2 connection password in the IDz clinet.

Currently there is the ability to disable the save password feature for connections to the RSE server using the following server side parameter. _RSE_JAVAOPTS="$_RSE_JAVAOPTS -DDENY_PASSWORD_SAVE=true" This feature does not extend to DB2 on z/OS c...
over 1 year ago in IBM Developer for z/OS / Other/Unknown 1 Not under consideration

COBOL-JAVA interoperability via JNI: use DirectByteBuffers and avoid copiyng data between COBOL workarea and Java byte array

The biggest hit we expect from DBB is that memory does not need to be copied between COBOL workarea and Java byte array Detail are described in the attached file
almost 8 years ago in COBOL Compilers 8 Not under consideration

AD Build Client settings to connect with DB2 using SSL/TLS Certificate

Client needs AD to support a secure connection with the DB2 database using a certificate/key file. Client also requires a centralized certificate configuration
over 4 years ago in Application Discovery and Delivery Intelligence / Application Discovery 2 Not under consideration

Reference Modification Abend if Lenght is a Not a Positive Integer

If the calculation of the length in a reference modification is zero or negative, there could be unpredictable/unexpected results. Due to our un-comfort with these unpredictable results, we'd like to see an abend, at runtime, when the length is ze...
almost 8 years ago in COBOL Compilers 5 Not under consideration

allowing limiting access on commands to individual TRANs and PGMs

Allow extra granularity for controlling and granting access to a group or individual to issues commands against specific transactions or programs, potentially by the program or transaction name to a RACF profile name.
almost 11 years ago in IMS System Services / Commands 1 Not under consideration

Variable number of containers in .sar

We have many programs allocating a variable number of containers (we identified programs where this occurs in output , but it could happen in input as well). All these containers are identical from structure point of view, their number and their n...
about 6 years ago in z/OS Connect 1 Not under consideration