• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • One Save File from More than One Library

    March 26, 2008 Hey, Ted

    I would like to place objects from several libraries in a save file. When I run a Save Library (SAVLIB) or Save Object (SAVOBJ) command that specifies more than one library, I receive message CPF3789: Only one library allowed with specified parameters. I really don’t want a bunch of save files. Is there another way?

    –Jackie

    A save file can contain other save files, so here’s a method you can try. To keep it simple, let’s say you want to save the contents of two libraries–MYLIB1 and MYLIB2–to one save file–SOMELIB/SOMESAVF.

    1. Create a save file for each library.

    CRTSAVF 
    …

    Read more
  • Performance Advice from a Mysterious Friend, Part 2

    March 26, 2008 Ted Holt

    On March 5 of this year, I told you that one of your fellow subscribers, who asked not to be identified, sent me some performance tips that he hoped you might find useful. This is the second of them.

    Here’s what he wrote: “Increase the journal receiver threshold to 6,500 MB.” So what does that mean? Let’s begin with the Create Journal Receiver command, CRTJRNRCV. This command has a THRESHOLD parameter that defaults to 1,500,000 KB, which is 1,500 MB. The threshold is the maximum size a journal receiver is allowed to reach before the system detaches the journal

    …

    Read more
  • Admin Alert: How System i Boxes Impersonate Each Other, Part 1

    March 26, 2008 Joe Hertvik

    There are three specific instances where System i administrator need to change the communications identity of an i5/OS box so that it impersonates another box and can take its place in the network. Unfortunately, there isn’t a readily available procedure to make sure that this process is easily accomplished. To help, this week and next I’m presenting a procedure for modifying a System i box to impersonate another machine.

    Why Bother To Impersonate?

    It’s handy to know how to modify a System i or iSeries box to impersonate another box in the following situations.

    1. When purchasing a new machine to
    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle