[ ALL_RESOURCES ] [ AIX FUNDAMENTALS ] [ ARTIFICIAL INTELLIGENCE ] [ BACKUP AND RECOVERY SOLUTIONS ] [ CAREER DEVELOPMENT ] [ CLOUD COMPUTING ] [ CYBER SECURITY ] [ CYBERSECURITY ] [ CYBERSECURITY AND LINUX ] [ DATA PROTECTION ] [ DATA SECURITY ] [ DATABASE ANALYTICS ] [ DATABASE CONNECTIVITY ] [ DATABASE INTEGRATION ] [ DATABASE MANAGEMENT ] [ DATABASE MANAGEMENT / RPG PROGRAMMING ] [ DATABASE MIGRATION ] [ DATABASE MIGRATION AND PERFORMANCE OPTIMIZATION ] [ DATABASE OPTIMIZATION ] [ DATABASE PROGRAMMING ] [ DEVELOPMENT TOOLS ] [ DEVOPS & SYSTEM ADMINISTRATION ] [ ENTERPRISE SOFTWARE MODERNIZATION ] [ IBM AIX TRAINING ] [ IBM I (AS/400) CAREER INSIGHTS ] [ IBM I (AS/400) DEVELOPMENT ] [ IBM I (AS/400) HISTORY AND MARKETING ] [ IBM I (AS/400) JOB MANAGEMENT ] [ IBM I (AS/400) OVERVIEW ] [ IBM I (AS/400) PROGRAMMING ] [ IBM I (AS/400) TECHNICAL ANALYSIS ] [ IBM I (AS/400) TECHNICAL OVERVIEW ] [ IBM I (AS/400) TECHNICAL TRAINING ] [ IBM I (AS/400) TECHNOLOGY ] [ IBM I (AS/400) TRAINING ] [ IBM I (AS/400) TUTORIALS ] [ IBM I / AS/400 PROGRAMMING ] [ IBM I / AS400 PROGRAMMING ] [ IBM I / AS400 TUTORIALS ] [ IBM I ADMINISTRATION ] [ IBM I ARCHITECTURE ] [ IBM I DEVELOPMENT ] [ IBM I MODERNIZATION ] [ IBM I PROGRAMMING ] [ IBM I RPG PROGRAMMING ] [ IBM I SECURITY ] [ IBM I SYSTEM ADMINISTRATION ] [ IBM I SYSTEMS ] [ IBM I SYSTEMS ADMINISTRATION ] [ IBM I SYSTEMS ARCHITECTURE ] [ IBM I SYSTEMS MANAGEMENT ] [ IBM I TECHNICAL ] [ IBM I TECHNICAL ANALYSIS ] [ IBM I TECHNICAL DOCUMENTATION ] [ IBM I TECHNICAL OVERVIEW ] [ IBM I TECHNICAL RESOURCES ] [ IBM I TECHNICAL SOLUTIONS ] [ IBM I TECHNICAL SUPPORT ] [ IBM I TECHNICAL TRAINING ] [ IBM I TECHNICAL UPDATES ] [ IBM I TECHNOLOGY ] [ IBM LOTUS NOTES/DOMINO ADMINISTRATION ] [ IBM MQ ADMINISTRATION ] [ IBM NOTES AND DOMINO ADMINISTRATION ] [ IDENTITY & ACCESS MANAGEMENT ] [ IT SPENDING ] [ MONITORING TOOLS ] [ PROGRAMMING ] [ PROGRAMMING / RPGLE ] [ PROGRAMMING LANGUAGES ] [ PROGRAMMING TUTORIAL ] [ RPG PROGRAMMING ] [ RPG/CL PROGRAMMING ] [ RPGLE PROGRAMMING ] [ SECURITY ] [ SERVER MARKET ANALYSIS ] [ SOFTWARE DEVELOPMENT ] [ STORAGE SOLUTIONS ] [ SYSTEM ADMINISTRATION ] [ SYSTEMS ADMINISTRATION ] [ TECHNICAL CATEGORY ] [ TECHNICAL COMPARISON ] [ TECHNICAL INSIGHTS ] [ TECHNICAL INTERVIEW PREPARATION ] [ TECHNICAL OVERVIEW ] [ TECHNOLOGY REFRESH ] [ VERSION CONTROL AND DEVELOPMENT TOOLS ]
TYPE_VIDEO FILE_REF: 0x41b7

Battle between Sub Routine Vs Sub Procedure - RPGLE (IBM i)

> ANALYSIS_OF: BATTLE_BETWEEN_SUB_ROUTINE_VS_SUB_PROCEDURE_-_RPGLE_(IBM_I)_

This video provides a comprehensive analysis of sub routines and sub procedures in RPGLE.
  • Sub Routines: These are traditional methods of code reuse in RPG. They allow programmers to define a block of code that can be called multiple times throughout a program. Sub routines do not support parameters, which limits their flexibility.
  • Sub Procedures: Introduced in RPG IV, sub procedures enhance modular programming. They support parameters, enabling data to be passed in and out, which promotes better code organization and reusability. Sub procedures can return values, making them more versatile than sub routines.
  • Performance: Sub procedures generally offer better performance due to their ability to handle parameters and return values efficiently. This leads to cleaner and more maintainable code.
  • Scope and Lifetime: Sub procedures have a defined scope and lifetime, which helps in managing variable visibility and memory usage effectively.
  • Best Practices: The video emphasizes using sub procedures for new development to leverage modern programming practices, while sub routines may still be used for legacy code.
Understanding these differences is crucial for RPG/CL programmers aiming to write efficient and maintainable code.