• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • One Save File from More than One Library

    March 26, 2008 Hey, Ted

    I would like to place objects from several libraries in a save file. When I run a Save Library (SAVLIB) or Save Object (SAVOBJ) command that specifies more than one library, I receive message CPF3789: Only one library allowed with specified parameters. I really don’t want a bunch of save files. Is there another way?

    –Jackie

    A save file can contain other save files, so here’s a method you can try. To keep it simple, let’s say you want to save the contents of two libraries–MYLIB1 and MYLIB2–to one save file–SOMELIB/SOMESAVF.

    1. Create a save file for each library.

    CRTSAVF 
    …

    Read more
  • Performance Advice from a Mysterious Friend, Part 2

    March 26, 2008 Ted Holt

    On March 5 of this year, I told you that one of your fellow subscribers, who asked not to be identified, sent me some performance tips that he hoped you might find useful. This is the second of them.

    Here’s what he wrote: “Increase the journal receiver threshold to 6,500 MB.” So what does that mean? Let’s begin with the Create Journal Receiver command, CRTJRNRCV. This command has a THRESHOLD parameter that defaults to 1,500,000 KB, which is 1,500 MB. The threshold is the maximum size a journal receiver is allowed to reach before the system detaches the journal

    …

    Read more
  • Admin Alert: How System i Boxes Impersonate Each Other, Part 1

    March 26, 2008 Joe Hertvik

    There are three specific instances where System i administrator need to change the communications identity of an i5/OS box so that it impersonates another box and can take its place in the network. Unfortunately, there isn’t a readily available procedure to make sure that this process is easily accomplished. To help, this week and next I’m presenting a procedure for modifying a System i box to impersonate another machine.

    Why Bother To Impersonate?

    It’s handy to know how to modify a System i or iSeries box to impersonate another box in the following situations.

    1. When purchasing a new machine to
    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle