• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Reader Feedback and Insights: Avoiding Object Locks

    July 10, 2002 Timothy Prickett Morgan

    Hey, Ted:

    After reading the January 18 Midrange Guru article, “Avoiding Record Locks in RPG,”I still don’t understand how the record lock is avoided. The program acknowledged the condition by the indicator that was set, but how does this change the fact that the record is locked? Can you enlighten me?

    — Tom

    The technique doesn’t do anything about the lock, Tom. It can’t. But the technique does keep a program from freezing while waiting for a record lock, and it does tell which job has the record locked.

    Of course, since it tells you which job has the record locked, you could make the program cancel the other job by executing ENDJOB with QCMDEXC.

    — Ted

    Sponsored By
    WORKSRIGHT SOFTWARE

    On June 30, 2002,
    $$$$$$$$    Postal Rates went UP!    $$$$$$$$

    On July 1, 2002,
    $$$$$    you wanted your postage bill to go down.    $$$$$

    We have the solution! CASS certify your mailing names
    and addresses and presort your outgoing mail and save. Our CASS certification software ensures that your address files
    have valid ZIP Code and address information. Our presort software ensures that you can properly prepare you mail
    for delivery to your Post Office.

    WorksRight Software,
    Inc. is the number-one source for iSeries and AS/400 CASS,
    presort, ZIP Code, and area code software and data.

    Visit our Web site – www.worksright.com –
    to learn more about our CASS and presorting software, or contact WorksRight Software, Inc., phone 601-856-8337,

    e-mail software@worksright.
    com
    .

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mgo_rc, Volume 2, Number 51 -- July 10, 2002

    Sponsored by
    Raz-Lee Security

    The MFA Mobile App provides a secure and user-friendly way to add strong authentication without complicating access. It enables users to approve login requests or generate one-time passwords directly from their mobile device, ensuring that access is granted only after a second, trusted factor is verified.

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Distinct File and Record Names with SQL Reader Feedback and Insights: Service Program Catch-22 Simplified

    Leave a Reply Cancel reply

MGO Volume: 2 Issue: 51

This Issue Sponsored By

    Table of Contents

    • Reader Feedback and Insights: Avoiding Object Locks
    • Use Query/400 to Find IFS Files in BRMS
    • Delete Badly-Named OS/400 IFS Files, Take Two

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • After A Few Short Years, VS Code Passes Rational Developer for i
    • Why Logical Replication Has Become The New Standard for IBM i HA/DR
    • Guru: Managing The Lifecycle Of Your Service Programs – Updates Without Chaos
    • IT Spending Forecast Keeps Going Up And Up, But It Won’t Go Away
    • IBM i PTF Guide, Volume 28, Number 8
    • It’s Time To Get An Offsite Data Protection Strategy
    • Where We Are And Where We Are Headed With AI On IBM i
    • IBM Unveils Expert Query To Replace Db2 Web Query
    • Guru: Are Binding Directories A Shortcut Or A Source Of Chaos?
    • IBM Takes On The Memory Crunch With New FlashSystem Lineup

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle