Skip to Main Content
The Adabas & Natural Ideas Portal does not contain ideas from products ApplinX and EntireX. Please refer to the IBM Ideas Portal for these products (IBMid required).
ADD A NEW IDEA

Natural for z/OS

Showing 37 of 361

Allow spacer element (“1X”) in COMPRESS statement

With a COMPRESS statement the contents of one or more operands (Vari or Const) can be concatenated into a single target field. Beside some other options, two different clauses are available to determine the value separation behavior. (1) With LEAV...
Thomas Frischmann about 1 year ago in Natural for z/OS / Natural (NAT) / Programing Syntax (Cross platforms) 0 Planned

Create a user exit in SYSEXT to perform a SCAN across all FUSER or FNAT

Create a user exit in SYSEXT to perform a SCAN across all FUSER or FNAT .It can be similar to the existing SCAN tool. The replace function is not required and may be a bit dangerous. This way we can search all source code for a specific string, be...
Dana Sherbondy about 1 year ago in Natural for z/OS / Natural (NAT) / Utilities 2 Not in Plan

Allow wildcard notation “?” inside input edit mask for MOVE EDITED

With the MOVE EDITED statement you can apply an edit mask for Operand1 to output a field of any format (except H/C) into an alpha string (A/U/B) with a specific layout described by the edit mask. The edit mask can be considered as an output edit m...
Thomas Frischmann about 1 year ago in Natural for z/OS / Natural (NAT) / Programing Syntax (Cross platforms) 0 Planned

Allow (CV=) after a literal string

Natural allows the use of dynamic control variables during INPUT and WRITE. BUT: the use of those (CV=<control_variable>) is restricted to a variable, not to a literal text. If you want to have a different visual behavior for a string, you m...
Philippe Van Coppenolle about 1 year ago in Natural for z/OS / Programing Syntax (Cross platforms) 0 Future consideration

Natural Buffer Pool (SYSBPM): TotalUC#2 new Use count field for depicting Level-1 executions of natural objects

Under Natural Buffer Pool (SYSBPM), we noticed while investigating a performance issue in production that when a Natural Object has multi-level, the TotalUC value for the primary object is a cumulative sum of all the sub-routines being called. Th...
Zaffer Khan over 1 year ago in Natural for z/OS / Natural (NAT) 4 Future consideration

Encrypt NSC Password to FIPS 140-3 Compliance

The current standard of encrypting the Natural Security password with Electronic Code Book (ECB) encryption to not comply with IRS standards. Enhance Natural Security so that the NSC password is encrypted to meet FIPS 140-3 compliance.
Gary Athaide almost 2 years ago in Natural for z/OS / Natural Security (NSC) 0 Under Review

Parameter SUBSID in NDV configuration

We had recently iTrac NATMF-28544: "NDV server ABEND U4087 during clean-up at SESSION_TIMEOUT". Analysis of the problem showed that a LX value for NATASM was 0, and further that the subsystem name was "$#@$", because customer had migrated from NAT...
Philippe Van Coppenolle almost 2 years ago in Natural for z/OS / Natural Development Server (NDV) 0 Future consideration

Function "ODD()"

If you want to know if a number is odd or even, you can do the following now: IF #I <> #I / 2 * 2 THEN ... END-IF This takes however quite a bit of CPU, but it can already by simplified by following declarations: 1 #I (I4)1 REDEFINE #I 2 FIL...
Philippe Van Coppenolle almost 2 years ago in Natural for z/OS / Programing Syntax (Cross platforms) 0 Future consideration

ISP Editor - keep range selection after applying the range to a "copy" or "move"

More and more ISP users, since program editor disabled. ISP - feature idea (from EVI): the ISP editor should keep the range selection (e.g. lines 5 - 10) after a copy or move command. This is done by the program editor.
Georg Schmitt almost 2 years ago in Natural for z/OS / Natural ISPF (ISP) 1 Not in Plan

Decrypt NSC records from PLOG

From SI-505073, create a utility to allow the decryption of NSC records after they have been extracted from a PLOG. This would be an alternative / secondary way to retrieve modifications to the FSEC when the NSC logging records are not available. ...
Chad Scott about 2 years ago in Natural for z/OS / Natural Security (NSC) 0 Under Review