From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: * X-Spam-Status: No, score=1.3 required=5.0 tests=BAYES_00,INVALID_MSGID, MSGID_RANDY autolearn=no autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: ffc1e,fb45e48e8dddeabd X-Google-Attributes: gidffc1e,public X-Google-Thread: 103376,fb45e48e8dddeabd X-Google-Attributes: gid103376,public From: Robert Dewar Subject: Re: Ada Protected Object Tutorial #1 Date: 1999/12/27 Message-ID: <846rk7$gba$1@nnrp1.deja.com>#1/1 X-Deja-AN: 565196838 References: <839toq$pu$1@bgtnsc03.worldnet.att.net> <385AC716.7E65BD5C@averstar.com> <845pgk$qkf$1@nnrp1.deja.com> X-Http-Proxy: 1.0 x33.deja.com:80 (Squid/1.1.22) for client 205.232.38.14 Organization: Deja.com - Before you buy. X-Article-Creation-Date: Mon Dec 27 05:06:20 1999 GMT X-MyDeja-Info: XMYDJUIDrobert_dewar Newsgroups: comp.programming.threads,comp.lang.ada X-Http-User-Agent: Mozilla/4.04 [en] (OS/2; I) Date: 1999-12-27T00:00:00+00:00 List-Id: In article , kaz@ashi.footprints.net wrote: > That's the sense that I get. For example, earlier in the debate I was told that > when the requirements change in certain ways, you have to abandon protected > objects. E.g. if you need an object's operation to call into another subsystem > which may call back. Really the point is that protected objects are best thought of as a framework for constructing very simple synchronization primitives with a minimum of active code. As soon as a protected object acquires complex internal logic, it is better represented by a separate Ada task. Sent via Deja.com http://www.deja.com/ Before you buy.