• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • One Save File from More than One Library

    March 26, 2008 Hey, Ted

    I would like to place objects from several libraries in a save file. When I run a Save Library (SAVLIB) or Save Object (SAVOBJ) command that specifies more than one library, I receive message CPF3789: Only one library allowed with specified parameters. I really don’t want a bunch of save files. Is there another way?

    –Jackie

    A save file can contain other save files, so here’s a method you can try. To keep it simple, let’s say you want to save the contents of two libraries–MYLIB1 and MYLIB2–to one save file–SOMELIB/SOMESAVF.

    1. Create a save file for each library.

    CRTSAVF 
    …

    Read more
  • Performance Advice from a Mysterious Friend, Part 2

    March 26, 2008 Ted Holt

    On March 5 of this year, I told you that one of your fellow subscribers, who asked not to be identified, sent me some performance tips that he hoped you might find useful. This is the second of them.

    Here’s what he wrote: “Increase the journal receiver threshold to 6,500 MB.” So what does that mean? Let’s begin with the Create Journal Receiver command, CRTJRNRCV. This command has a THRESHOLD parameter that defaults to 1,500,000 KB, which is 1,500 MB. The threshold is the maximum size a journal receiver is allowed to reach before the system detaches the journal

    …

    Read more
  • Admin Alert: How System i Boxes Impersonate Each Other, Part 1

    March 26, 2008 Joe Hertvik

    There are three specific instances where System i administrator need to change the communications identity of an i5/OS box so that it impersonates another box and can take its place in the network. Unfortunately, there isn’t a readily available procedure to make sure that this process is easily accomplished. To help, this week and next I’m presenting a procedure for modifying a System i box to impersonate another machine.

    Why Bother To Impersonate?

    It’s handy to know how to modify a System i or iSeries box to impersonate another box in the following situations.

    1. When purchasing a new machine to
    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
  • Three Things For IBM i Shops To Consider About DevSecOps
  • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
  • As I See It: Retirement Challenges
  • IBM i PTF Guide, Volume 27, Number 41
  • Stacking Up Power11 Entry Server Performance To Older Iron
  • Big Blue Boosts IBM i Support In Instana, Adds Tracing
  • It Is Time To Tell Us What You Are Thinking And Doing
  • IBM i PTF Guide, Volume 27, Number 40
  • The GenAI Boom Is Only Slightly Louder Than The Dot Com Boom

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle