• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • One Save File from More than One Library

    March 26, 2008 Hey, Ted

    I would like to place objects from several libraries in a save file. When I run a Save Library (SAVLIB) or Save Object (SAVOBJ) command that specifies more than one library, I receive message CPF3789: Only one library allowed with specified parameters. I really don’t want a bunch of save files. Is there another way?

    –Jackie

    A save file can contain other save files, so here’s a method you can try. To keep it simple, let’s say you want to save the contents of two libraries–MYLIB1 and MYLIB2–to one save file–SOMELIB/SOMESAVF.

    1. Create a save file for each library.

    CRTSAVF 
    …

    Read more
  • Performance Advice from a Mysterious Friend, Part 2

    March 26, 2008 Ted Holt

    On March 5 of this year, I told you that one of your fellow subscribers, who asked not to be identified, sent me some performance tips that he hoped you might find useful. This is the second of them.

    Here’s what he wrote: “Increase the journal receiver threshold to 6,500 MB.” So what does that mean? Let’s begin with the Create Journal Receiver command, CRTJRNRCV. This command has a THRESHOLD parameter that defaults to 1,500,000 KB, which is 1,500 MB. The threshold is the maximum size a journal receiver is allowed to reach before the system detaches the journal

    …

    Read more
  • Admin Alert: How System i Boxes Impersonate Each Other, Part 1

    March 26, 2008 Joe Hertvik

    There are three specific instances where System i administrator need to change the communications identity of an i5/OS box so that it impersonates another box and can take its place in the network. Unfortunately, there isn’t a readily available procedure to make sure that this process is easily accomplished. To help, this week and next I’m presenting a procedure for modifying a System i box to impersonate another machine.

    Why Bother To Impersonate?

    It’s handy to know how to modify a System i or iSeries box to impersonate another box in the following situations.

    1. When purchasing a new machine to
    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle