Solved

iSeries - Library Change Date

Posted on 2016-08-24
2
86 Views
Last Modified: 2016-08-25
Could someone tell me what the "Change Date/Time" signifies for a Library Object on the iSeries?  For example: I have a library named Library1. If I look at the attributes for that library object, it shows that the last change date/time was Today...even though I know that the object itself hasn't changed.

Does this attribute reflect that an object within the library has changed...or is it telling me that the actual library object has changed somehow...even though I know that no changes were made to it?

I just wanted to better understand what this might mean...

I appreciate any guidance...
0
Comment
Question by:Matthew Roessner
2 Comments
 
LVL 18

Assisted Solution

by:daveslash
daveslash earned 250 total points
ID: 41770450
Greetings, Matthew!

The "Change date/time" on a library object does not solely refer to the library object itself, but also to the contents of the library.

For example, when I came in this morning, the change date/time on my work-library was 2016-08-21. Then, is used SQL to create a table in that library. After creating the table, the change date/time on the library is 2016-08-25.

HTH,
DaveSlash
0
 
LVL 34

Accepted Solution

by:
Gary Patterson earned 250 total points
ID: 41770509
Lots of actions cause the Change Date/Time to be updated on a library object.  This IBM Knowledgebase article has a section that specifically addresses *LIB objects:

http://www-01.ibm.com/support/docview.wss?uid=nas8N1014753

Note that you can't really rely on the Change Date / Time field for every object, for example database files.  The object-level Change Date/Time is primarily used to determine if an object has changed since the last backup.  If you really need to know when an object was changed, and who did it, use auditing:

http://www.ibm.com/support/knowledgecenter/ssw_ibm_i_61/rzarl/rzarlrelationtoaud.htm

- Gary
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are many Password Managers (PM) out there to choose from. PM's can help with your password habits and routines, but they should not be a crutch you rely on too heavily. I also have an article for company/enterprise PM's.
Cloud-based technologies and services will continue to grow in popularity in 2017 thanks to the simple, scalable and cost-effective solutions they deliver. Here are three areas where cloud adoption is poised to really take off.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now