• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Reader Feedback and Insights: Suggestions for a Temporary Library

    May 29, 2002 Timothy Prickett Morgan

    Hey, Ted:

    In the April 24 issue of Midrange Guru, OS/400 Edition, you described a method of creating a temporary library that would provide the same function as QTEMP. I would like to make a couple of comments:

    ASC

    In addition to creating the temp library, it would be a good idea to add this library to the top of the library list. QTEMP is already there, and including the temp library would allow *LIBL to be used.

    To retain this temporary library, you suggested creating data area KEEPTEMP in a library in the job’s library list. I would

    …

    Read more
  • String Parameters of Various Lengths

    May 29, 2002 Timothy Prickett Morgan

    Hey, Ted:

    I have an RPG IV subprocedure that I call from several different programs. I use what I call the QCMDEXC method to pass a character string to it. That is, I pass two parameters–the character string and the length of the character string. I would like to eliminate the second parameter.

    ASC

    The subprocedure would have to determine the length of the character string that is passed to it. Is that possible?

    — Karen

    Yes, it’s possible. Your subprocedure needs the operational descriptor of the parameter. Here’s what you need to do.

    Add the OPDESC keyword to the parameter

    …

    Read more
  • Prevent Someone Else from Peeking at Your Window 2000/XP System

    May 29, 2002 Timothy Prickett Morgan

    Dear Readers:

    If you have a Windows 2000 or Windows XP machine connected to the Internet, chances are good that your computer’s security information, including user profiles, account policies, and share names are freely available to any hacker on the Internet.

    BCD Int'l

    This is because, by default, Windows 2000 and Windows XP do not restrict anonymous access to the above listed information.

    However, you can very easily prevent others from gaining access to this sensitive information on your PC by making one very simple change to the Windows Registry.

    Here’s how:

    1. Click on the Windows Start button.

    2. Click Run.

    3. Enter “Regedit”

    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
  • Three Things For IBM i Shops To Consider About DevSecOps
  • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
  • As I See It: Retirement Challenges
  • IBM i PTF Guide, Volume 27, Number 41
  • Stacking Up Power11 Entry Server Performance To Older Iron
  • Big Blue Boosts IBM i Support In Instana, Adds Tracing
  • It Is Time To Tell Us What You Are Thinking And Doing
  • IBM i PTF Guide, Volume 27, Number 40
  • The GenAI Boom Is Only Slightly Louder Than The Dot Com Boom

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle