• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Reader Feedback and Insights: Binder Language

    September 13, 2002 Timothy Prickett Morgan

    Hey, Ted:

    Great article, Ted! It was a very clever presentation, and I enjoyed reading it. I do have one comment and one question, though. I don’t always create binder source when I first create a service program. When I’ve later added another procedure, I create the service source with a *CURRENT signature and a *PRV signature that defines the original situation and that seems to prevent any problems with needing recompiles.

    Here’s my question: Someone once told me that when I created new procedures, or at least when I create the binder source, that new procedures must be added below the existing procedures for the *CURRENT group, or older programs would crash. Is this true? I see that you put the third procedure in front of the original one.

    — John

    I’m glad you enjoyed the article. You are correct that the new procedures should go at the bottom of the export list. I added the third export at the top when I was typing up the tip.

    A few other people wrote in with similar questions and comments. Jon Paris, of partner400.com, mentioned (rightfully) that I should have made this clear. Here is his comment:

    What you didn’t say was that the sequence of exports in *Current is what governs the order of the slots in the service program. This is what makes it vital that you add all additional procedures to the end of the *Current list. As far as the *PRV lists are concerned, they are only used to generate signatures–they have no impact on slot usage.

    Say the original set of exports was A, B, F and current is changed to A, B, C, F–people do this because it is tidy to put things in order–it appears that a previous signature of A, B, C will produce the desired result. Of course it won’t, and worse still there’s no signature violation, but whenever programs bound to the old version call procedure C they will be getting F instead.

    I suspect that you know this, but thought I’d mention it as we’ve seen so many customers make this mistake.

    Thanks to everybody who wrote in about this tip. I hope this helps.

    — Ted

    Sponsored By
    ADVANCED SYSTEMS CONCEPTS

    SEQUEL meets all your iSeries and AS/400 data access needs in a single, integrated solution:

    • Windows, Web or host user interfaces

    • Convert AS/400 data into PC file formats

    • E-mail or FTP query results, reports and spool files
    • Run-time prompted queries and reports for end users

    • IF-THEN-ELSE logic in queries and reports

    • Report, form and label formatting second to none

    • Easily convert date fields, character-to-numeric, numeric-to-character and other data manipulation

    • SORT or JOIN using a calculated field

    • Quick summarization of data with Tabling function

    • Run multiple SEQUEL requests as one with the SEQUEL Scripting function

    • OLAP Business Intelligence at a fraction of the cost of comparable solutions

    Take 6 minutes to view a SEQUEL ViewPoint ScreenCam movie to see how simple Windows-based AS/400 and iSeries data access can be! In just a few short minutes, you can find out ways to make your job easier and improve data access throughout your organization. Download the ViewPoint movie here.

    For more information or a FREE trial of SEQUEL, call 847/605-1311 or visit Advanced Systems Concepts.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mgo_rc, Volume 2, Number 70 -- September 13, 2002

    Sponsored by
    ARCAD Software

    DevSecOps & Peer Review – The Power of Automation

    In today’s fast-paced development environments, security can no longer be an afterthought. This session will explore how DevSecOps brings security into every phase of the DevOps lifecycle—early, consistently, and effectively.

    In this session, you’ll discover:

    • What DevSecOps is and why it matters?
    • Learn how to formalize your security concerns into a repeatable process
    • Discover the power of automation through pull requests, approval workflows, segregation of duties, peer review, and more—ensuring your data and production environments are protected without slowing down delivery.

    Whether you’re just getting started or looking to enhance your practices, this session will provide actionable insights to strengthen your security posture through automation and team alignment to bring consistency to the process.

    Watch Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Adding Subprocedures to a Service Program, Revisited Reader Feedback and Insights: More Binder Language

    Leave a Reply Cancel reply

MGO Volume: 2 Issue: 70

This Issue Sponsored By

    Table of Contents

    • Reader Feedback and Insights: Binder Language
    • Put Users On the Fast Track
    • Properly Sorting Numeric Arrays

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • IBM Pulls The Curtain Back A Smidge On Project Bob
    • IBM Just Killed Merlin. Here’s Why
    • Guru: Playing Sounds From An RPG Program
    • A Bit More Insight Into IBM’s “Spyre” AI Accelerator For Power
    • IBM i PTF Guide, Volume 27, Number 42
    • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
    • Three Things For IBM i Shops To Consider About DevSecOps
    • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
    • As I See It: Retirement Challenges
    • IBM i PTF Guide, Volume 27, Number 41

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle