ILE Program Using CRTBNDRPG

Related Information

Converting

to

RPG

IV

“Converting Your Source” on page 382

One-step

creation

process

Chapter 6, “Creating a Program with the

 

 

 

 

CRTBNDRPG

Command”

on

page 57

ILE static

binding

Chapter 10,

“Calling

Programs and

 

 

 

 

Procedures”

on

page 127;ILE alsoCon-

 

 

 

 

cepts

 

 

 

 

Exception

handling

differences

“Differences between OPM and ILE RPG

 

 

 

 

Exception

Handling”

on page 222

Strategy 2: ILE Program

Using

CRTBNDRPG

 

 

 

 

 

Strategy 2 results in an

ILE program

that

can take advantage of ILE

Your source can contain static procedure

calls because you can bind

other

modules

or

service

programs

using a

binding directory. You can

the activation group in which the

program

will

run.

Method

 

 

 

 

 

 

 

 

Use

the following

general

approach

to

create

such a program:

1.If starting with RPG III source, convert your source to RPG I CVTRPGSRC command.

If converting, be sure to convert all /COPY members and any progra called by the source you are converting. Also, if you are using program, you should also make sure that you are using ILE CL inste CL.

2. Determine the activation group the program will run in.

You may want to name it after the application name, as in this e

3. Identify the names of the binding directories, if any, to be

It

is assumed

with

this approach that if you are using a bindi

one

that

is

already

created

for

you. For

example,

there may b

service

program

that

you

may

want

to

bind

to

your

source. Consequ

you

need to

know is

the

name

of

the

binding

directory.

4. Create an ILE program using CRTBNDRPG, specifying DFTACTGRP(*NO), the activation group on the ACTGRP parameter, and the binding directory, on the BNDDIR parameter.

Note that if ACTGRP(*CALLER) is specified and this program is called by program running in the default activation group, then this program will according to ILE semantics in the areas of override scoping, open s

RCLRSC.

The main drawback of this strategy is that you do not have a perm object that you can later reuse to bind with other modules to cre program. Furthermore, any procedure calls must be to modules or servi grams that are identified in a binding directory. If you want to modules without using a binding directory when you create the progra to use the third strategy.

Chapter 3. Program Creation Strategies25

Page 49
Image 49
IBM AS/400 manual Related Information, Strategy 2 ILE Program, ILE Program Using Crtbndrpg

AS/400 specifications

The IBM AS/400, now known as the IBM iSeries, is a midrange computer system that has been a cornerstone of enterprise computing since its introduction in 1988. Designed to provide a robust platform for business applications, the AS/400 is celebrated for its reliability, scalability, and integrated database capabilities.

One of the key features of the AS/400 is its Integrated Operating Environment, which blends hardware and software resources seamlessly. This integration allows businesses to execute diverse workloads, ranging from traditional applications to modern web-based services, all on a single platform. The operating system, OS/400 (now IBM i), offers a rich set of APIs and tools for developers, simplifying application development and management.

Another standout characteristic of the AS/400 is its built-in database, DB2 for i. This powerful relational database management system allows for efficient data handling and provides advanced features such as support for SQL, XML, and JSON, making it easier for businesses to manage their data and integrate it with other systems. The database's tight integration with the operating system enables high performance and security.

In terms of scalability, the AS/400 can accommodate small businesses as well as large enterprises, with the ability to support hundreds of users simultaneously. Its architecture allows for easy upgrades in hardware, meaning that organizations can scale their systems without replacing the entire infrastructure.

Security is another critical attribute of the AS/400. With a sophisticated security model, it offers built-in user authentication, access control, encryption, and auditing capabilities to protect data and applications from unauthorized access.

The AS/400 also supports multiple programming languages, including RPG, COBOL, Java, and PHP, giving organizations the flexibility to choose the development tools that best fit their needs. This diversity helps maintain legacy applications while also developing new ones that leverage modern technologies.

Moreover, the platform supports both traditional green-screen interfaces and modern graphical user interfaces, allowing organizations to transition smoothly into contemporary user experience paradigms.

Overall, the IBM AS/400 stands out as a resilient, flexible, and secure computing platform that enables organizations to effectively manage their business operations, streamline processes, and adapt to changing market demands. Its unique combination of integrated features and capabilities ensures that it remains relevant in today's fast-paced technology landscape.