• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Using Timestamps as Unique Keys

    July 17, 2002 Timothy Prickett Morgan

    Hey, Ted:

    We need to generate unique keys for each record written to a file and thought that the timestamp would make a good unique key for a file. Then we ran into a problem. The RPG TIME op code fills in only the first three digits of the microseconds portion of a timestamp field. The last three digits are always zeros.

    Is there another way in RPG to fill the timestamp with a unique time, such as an op code that fills the last three digits as well?

    — Michael

    Since your concern is that you have a unique value, not that you have an accurate timestamp, let me suggest an alternate approach. Compare the timestamp to the timestamp that was retrieved for the previous record. If they are the same, add one microsecond to get a unique key value.

    D key             s               z                     
    D timestamp       s               z                     
    D timestampsave   s               z                     
    
    C                time                    timestamp   
    C                if        timestamp <> timestampsave
    C                eval      key = timestamp           
    C                eval      timestampsave = timestamp 
    C                else                                
    C                adddur    1:*mseconds   key         
    C                endif                               
    

    — Ted

    Sponsored By
    TRAMENCO

    The Training and Mentoring Company (Tramenco) is dedicated to just one thing: Advancing your career by giving you the skills you need to solve real-world business problems.

    Choose from a menu of training options to fit your needs: onsite seminars, public seminars, mentoring, consulting, books, CBTs, and Web-based training.

    For more information about Tramenco’s career enhancing opportunities, call (800)421-8031 or go to www.tramenco.com.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mgo_rc, Volume 2, Number 53 -- July 17, 2002

    Sponsored by
    Raz-Lee Security

    The MFA Mobile App provides a secure and user-friendly way to add strong authentication without complicating access. It enables users to approve login requests or generate one-time passwords directly from their mobile device, ensuring that access is granted only after a second, trusted factor is verified.

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    SQL and System/36 File Names Deleting a Badly Named IFS File

    Leave a Reply Cancel reply

MGO Volume: 2 Issue: 53

This Issue Sponsored By

    Table of Contents

    • Readers Insights and Feedback: Dealing with Record Locks
    • SQL and System/36 File Names
    • Using Timestamps as Unique Keys

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Spring IBM i Tech Refreshes Will Come A Bit Later This Year
    • You Are Much More Than Power Systems, And So Are We
    • Startup Seeks The “Golden Path” for IBM i Modernization
    • What Can IBM Do To Make The Future Power S1112 Mini System Compelling?
    • IBM i PTF Guide, Volume 28, Number 15
    • Bob 1.0 Users Bugged By Lack Of One Feature
    • Here Come The AI-Based Code Modernization Offerings
    • Guru: Cohesion First – What A Procedure Should Be Responsible For
    • IBM Offers Trade-Ins On Storage To Grease The Upgrade Skids
    • IBM i PTF Guide, Volume 28, Number 14

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle