Methods for Processing Disk Files

*****************************************************************

*

PROGRAM NAME:

EMSTUPD

 

 

*

* RELATED FILES:

EMPMST

(Physical File)

 

*

*

 

CHANGE

(Physical File)

 

*

*

DESCRIPTION:

This program shows the processing

of records

*

*

 

using the random-by-key method. The CHAIN

*

*

 

operation code is used.

 

*

*

 

The physical file CHANGE contains

all the

*

*

 

changes made to the EMPMST file.

Its record

*

*

 

format name is CHGREC. There may

be some

*

*

 

fields in the CHGREC that are left blank,

*

*

 

in that case, no changes are made

to those

*

*

 

fields.

 

 

*

*****************************************************************

FCHANGE

IP

E

K

DISK

FEMPMST

UF

E

K

DISK

*As each record is read from the primary input file, CHANGE,

*the employee number (ENUM) is used as the search argument

*to chain to the corresponding record in the EMPMST file.

**IN03 will be set on if no corresponding record is found, wh￿ich

*occurs when an invalid ENUM is entered into the CHGREC rec￿ord.

C

ENUM

CHAIN

EMPREC

03

C

03

GOTO

NEXT

 

C

NNAME

IFNE

*BLANK

 

C

 

MOVE

NNAME

ENAME

C

 

ENDIF

 

 

C

NTYPE

IFNE

*BLANK

 

C

 

MOVE

NTYPE

ETYPE

C

 

ENDIF

 

 

C

NDEPT

IFNE

*ZERO

 

C

 

MOVE

NDEPT

EDEPT

C

 

ENDIF

 

 

C

NNHRS

IFNE

*ZERO

 

C

 

MOVE

NNHRS

ENHRS

C

 

ENDIF

 

 

C

 

UPDATE

EMPREC

 

C*

 

 

 

 

C

NEXT

TAG

 

 

 

 

Figure

151. Random-by-Key Processing of an Externally Described File

Sequential-within-Limits Processing

Sequential-within-limits processing by a record-address file is specified position 28 of the file description specifications and is valid for a access.

You can specify sequential-within-limits processing for an input or an up that is designated as a primary, secondary, or full-procedural file. T externally described or program-described (indexed). The file should ascending sequence.

To process a file sequentially within limits from a record-address file reads:

¹ A limits record from the record-address file

¹Records from the file being processed within limits with keys grea equal to the low-record key and less than or equal to the high-rec

300 ILE RPG for AS/400 Programmer's Guide

Page 324
Image 324
IBM AS/400 manual Sequential-within-Limits Processing, Change, Fchange

AS/400 specifications

The IBM AS/400, now known as the IBM iSeries, is a midrange computer system that has been a cornerstone of enterprise computing since its introduction in 1988. Designed to provide a robust platform for business applications, the AS/400 is celebrated for its reliability, scalability, and integrated database capabilities.

One of the key features of the AS/400 is its Integrated Operating Environment, which blends hardware and software resources seamlessly. This integration allows businesses to execute diverse workloads, ranging from traditional applications to modern web-based services, all on a single platform. The operating system, OS/400 (now IBM i), offers a rich set of APIs and tools for developers, simplifying application development and management.

Another standout characteristic of the AS/400 is its built-in database, DB2 for i. This powerful relational database management system allows for efficient data handling and provides advanced features such as support for SQL, XML, and JSON, making it easier for businesses to manage their data and integrate it with other systems. The database's tight integration with the operating system enables high performance and security.

In terms of scalability, the AS/400 can accommodate small businesses as well as large enterprises, with the ability to support hundreds of users simultaneously. Its architecture allows for easy upgrades in hardware, meaning that organizations can scale their systems without replacing the entire infrastructure.

Security is another critical attribute of the AS/400. With a sophisticated security model, it offers built-in user authentication, access control, encryption, and auditing capabilities to protect data and applications from unauthorized access.

The AS/400 also supports multiple programming languages, including RPG, COBOL, Java, and PHP, giving organizations the flexibility to choose the development tools that best fit their needs. This diversity helps maintain legacy applications while also developing new ones that leverage modern technologies.

Moreover, the platform supports both traditional green-screen interfaces and modern graphical user interfaces, allowing organizations to transition smoothly into contemporary user experience paradigms.

Overall, the IBM AS/400 stands out as a resilient, flexible, and secure computing platform that enables organizations to effectively manage their business operations, streamline processes, and adapt to changing market demands. Its unique combination of integrated features and capabilities ensures that it remains relevant in today's fast-paced technology landscape.