Skip to Main Content
IBM Z Software


This portal is to open public enhancement requests against IBM Z Software products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Delivered
Categories Fast Path
Created by Guest
Created on Mar 25, 2016

FPSI Indexing Suspension Security Capability

This addresses the FPSI (Fast Path Secondary Indexing) capability that arrived with IMS V12.

Currently, FPSI functionality can be deliberately suspended for BMP processes by specifying a //DFSCTL DD card. This is something that can be done by any user of an IMS system authorized to create and run BMP processes against Fast Path DEDBs with secondary index declarations. This broadly available, 'almost-everyone-can-use' capability represents multiple opportunities for corruptions to be introduced between indexed Fast Path DEDBs and their indices by processes both unintended and malicious. An example of unintended corruptions might be BMPs running in an IMS system with a mix of transaction workload that update a Fast Path DEDB without creating index entries, completing successfully... the data from which is used in subsequent downstream processes, resulting in incorrect processing. An example of malicious corruptions are BMPs run by anyone with ill intent, the effects of which (in a mixed-use online IMS system) may not be discovered until much later after the corruptions occurred, making recovery problematic.

Idea priority Medium
  • Guest
    Reply
    |
    Oct 6, 2017

    Hi,

    Thank you for your interest in keeping IMS a vital and successful product. Software development has continuously evolved during IMS's lifetime, and so has IMS itself. We have kept pace with, adopted, and implemented many industry standard best practices within our organization, including Continuous Delivery, Design Thinking, and Agile.

    We are currently reviewing this item for consideration, and we plan to seek additional feedback from other IMS clients. When choosing new features to add from the list of requirements in our backlog, we assess which will bring the most value to as many clients as possible and our ability to deliver within the next 18 months and prioritize those.


    You will automatically be notified of ongoing progress associated with this RFE.


    Have a great day!
    Daphne Isom - dsteele4@is.ibm.com