From: Georg Bauhaus <rm.dash-bauhaus@futureapps.de>
Subject: Re: Presentations on-line - Ada&SPARK for Education&Research
Date: Fri, 05 Mar 2010 11:46:06 +0100
Date: 2010-03-05T11:46:07+01:00 [thread overview]
Message-ID: <4b90e0ef$0$6723$9b4e6d93@newsspool2.arcor-online.net> (raw)
In-Reply-To: <hmqi16$5nh$1@news.eternal-september.org>
J-P. Rosen schrieb:
> Georg Bauhaus a écrit :
>> True? With some effort, it seems possible to break an Ada
>> monitor implemented as a protected object.
>>
> With enough pointers, you can make anything unreliable ;-), but the
> important point in your remark is "with some effort". If you make a
> special effort to publicly export something that is meant to be
> protected, it ceases to be protected. But this can happen only if the
> author of the PO provides facility for doing that; it cannot happen due
> to misuse on the client side.
Thanks, this is wording I had been looking for.
next prev parent reply other threads:[~2010-03-05 10:46 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-03-02 21:22 Presentations on-line - Ada&SPARK for Education&Research Dirk Craeynest
2010-03-05 8:03 ` Georg Bauhaus
2010-03-05 9:14 ` J-P. Rosen
2010-03-05 10:46 ` Georg Bauhaus [this message]
2010-03-06 8:43 ` Jerry van Dijk
2010-03-08 5:54 ` AdaMagica
2010-03-05 9:19 ` Dmitry A. Kazakov
2010-03-05 12:11 ` Peter Hermann
2010-03-06 12:40 ` Marco
replies disabled
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox