• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Add Outfile Support to Your Applications

    October 12, 2011 Ted Holt

    Note: The code accompanying this article is available for download here.

    When I compare IBM i to other operating systems, I am amazed. This well-designed, well-built operating system has numerous features that are foreign concepts to other operating systems. One of those features is that of “outfiles”, files that are built by display-type and work-type commands. If you haven’t done so, consider that it may be advantageous to write your own commands with outfile support.

    In general, programs that write to database files always write to certain database files, and that’s as it should be. A file maintenance program that allows users to add, delete, and change customer information always sends output to the customer master file.

    But consider a file that is the result of a query process. There are good reasons that such data should be written to a file of the user’s choosing at run time. The user may want to use this file with a query tool, or send it to his PC in CSV format for use with Excel. Allowing a user to specify a file’s name at run time is not unlike his naming a document that he creates with a Word processor.

    Here’s a short example application that illustrates the process of creating outfiles. I call it XTRCUS (Extract Customer) because it extracts customer data from the database. It consists of these objects:

    Object

    Type

    Attribute

    Description

    XTRCUS

    *CMD

     

    Command interface

    XTRCUS001C

    *PGM

    CLLE

    Command-processing program

    XTRCUS001R

    *PGM

    RPGLE

    Data retrieval program

    XTRCUSPF

    *FILE

    PF

    Outfile template

     

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Precisely

    IBM i password policies are no longer sufficient. Password attacks have required stronger password management controls.

    Download this Whitepaper to learn why Multi-Factor Authentication (MFA) is a powerful technology for protecting sensitive data and how Precisely’s Assure Security can help.

    Download Now

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    TMW Unveils New Trucking Solutions at User Confab I/O, Memory Boosted On Entry, Enterprise Power Systems

    Leave a Reply Cancel reply

Volume 11, Number 30 -- October 12, 2011
None

Table of Contents

  • Adobe Flash Builder for the iSeries Programmer, Part 3
  • Add Outfile Support to Your Applications
  • Skipping Robot/SCHEDULE Runs on AS/400-Class Machines

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Why Open Source Is Critical for Digital Transformation
  • mrc Refreshes IBM i Low-Code Dev Tool
  • Unit Testing Automation Hits Shift Left Instead of Ctrl-Alt-Delete Cash
  • Four Hundred Monitor, March 3
  • IBM i PTF Guide, Volume 23, Number 9
  • Doing The Texas Two Step From Power9 To Power10
  • PHP’s Legacy Problem
  • Guru: For IBM i Newcomers, An Access Client Solutions Primer
  • IBM i 7.1 Extended Out To 2024 And Up To The IBM Cloud
  • Some Practical Advice On That HMC-Power9 Impedance Mismatch

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2021 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.