Solved

Renaming objects in IFS in a batch - remotely ?

Posted on 2001-06-25
5
489 Views
Last Modified: 2012-06-21
What options are there to rename objects in the IFS by batch (with an example if possible). Can it be done in DOS ?... or would it have to be a CL ? I'd be happy Telneting in to kick it off ... or using Client Access.

Background:-I used to ftp objects down to sites but things have changed and now I don't want to overwrite - I want to come back later and rename the copied objects at a more convenient time ...
0
Comment
Question by:exppad
  • 3
5 Comments
 
LVL 13

Expert Comment

by:samic400
ID: 6225597
Sure, it can be done in DOS provided you have mapped a drive to your AS400.
0
 

Author Comment

by:exppad
ID: 6225622
how do you run a .bat file from telnet session ? you can see it with wrklnk but can it be 'run' ?
0
 
LVL 16

Accepted Solution

by:
theo kouwenhoven earned 200 total points
ID: 6226657
Why dont you rename it with FTP?

To run it in batch create a FTP-script:

Example:

---------- Begin FTP Script ------
open 123.123.123.123
user-id
password
put c:\filea.txt mylib\filea.txt
ren mylib\filea.txt mylib\fileb.txt
quit
---------- End FTP Script ------
(Instead of the IP-address you can also use the system name.)

To use the script with windows type this command:
  FTP -s:ftp-sccriptname
For DOS I think it is the same parameter (-s:) but if that does not work try the help :
 FTP -h or FTP -?

Good luck



0
 

Author Comment

by:exppad
ID: 6226984
That seems good - I can ftp later with the renames (as I don't want the rename to action during the file transfer phase)
I'll wait a day to see if anyone comes up with something really radical - but I can certainly live with doing an ftp for a rename - thanks Murphey2!
0
 

Author Comment

by:exppad
ID: 6229342
seems odd using FTP not to copy files - but hey it works - well..!
Thanks Murphey2
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Wavelink TelnetCE keyboard 1 1,157
RPG to c# 3 340
Jobs on iSeries autoanswer by itselfs. 10 160
ODBC Informix Driver 11 113
Scenario: Your operations manager has discovered an anomaly in your security system. The business will start to suffer within 15 minutes if it is a major IT incident. What should she do? We have 6 recommendations for managing major incidents (https:…
An analysis of the phishing scam that has been affecting Google users, along with steps to take for protection, as well as what to do if you receive one of the emails.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now