From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=0.1 required=5.0 tests=BAYES_05,INVALID_MSGID autolearn=no autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: 103376,577c9f9c0cdd76d X-Google-Attributes: gid103376,public From: dvdeug@x8b4e53cd. (David Starner) Subject: Re: Confusing language, was Re: Help help.. please.i am totaly new in ada programing Date: 1999/11/04 Message-ID: <7vs4g9$7hs1@news.cis.okstate.edu>#1/1 X-Deja-AN: 544410563 References: <7vqgs2$lcc$1@nnrp1.deja.com> Organization: Oklahoma State University User-Agent: slrn/0.9.5.7 (UNIX) Newsgroups: comp.lang.ada Date: 1999-11-04T00:00:00+00:00 List-Id: On Thu, 04 Nov 1999 04:51:59 GMT, tmoran@bix.com wrote: >>Just so no one else gets confused, Ada Core Technologies does >>not deal in proprietary software at all. Our software is >>copyrighted (mostly the copyrights are held by the Free Software > "Proprietary - Held under patent, trademark, or copyright by a >private person or company." Also: >>From WordNet (r) 1.6 [wn]: proprietary produced or distributed by one having exclusive rights; (Which, for the most part, ACT has none in GNAT.) >>From The Free On-line Dictionary of Computing (07Oct99) [foldoc]: proprietary 2. In the language of hackers and users, inferior; implies a product not conforming to {open-systems} {standard}s, and thus one that puts the customer at the mercy of a vendor who can inflate service and upgrade charges after the initial sale has locked the customer in. As usual, there's more than one definition. I personally understood his use perfectly, as would many programmers, even though it didn't match any of those stated so far. -- David Starner - dstarner98@aasaa.ofe.org