From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-2.9 required=5.0 tests=BAYES_00,MAILING_LIST_MULTI autolearn=unavailable autolearn_force=no version=3.4.4 X-Google-Thread: 103376,42490cad53ee37fa X-Google-Attributes: gid103376,public X-Google-Language: ENGLISH,ASCII-7-bit Path: g2news1.google.com!news1.google.com!proxad.net!usenet-fr.net!enst.fr!melchior!cuivre.fr.eu.org!melchior.frmug.org!not-for-mail From: "Alexander E. Kopilovich" Newsgroups: comp.lang.ada Subject: Re: NOACE- End of the road for Ada? Date: Fri, 11 Mar 2005 07:53:10 +0300 (MSK) Organization: Cuivre, Argent, Or Message-ID: References: NNTP-Posting-Host: lovelace.ada-france.org Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Trace: melchior.cuivre.fr.eu.org 1110516951 60269 212.85.156.195 (11 Mar 2005 04:55:51 GMT) X-Complaints-To: usenet@melchior.cuivre.fr.eu.org NNTP-Posting-Date: Fri, 11 Mar 2005 04:55:51 +0000 (UTC) To: comp.lang.ada@ada-france.org Return-Path: In-Reply-To: ; from Michael Card at Thu, 10 Mar 2005 13:42:34 GMT X-Mailer: Mail/@ [v2.45 MSDOS] X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at ada-france.org X-BeenThere: comp.lang.ada@ada-france.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Gateway to the comp.lang.ada Usenet newsgroup" List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , X-Original-Content-Transfer-Encoding: 7bit Xref: g2news1.google.com comp.lang.ada:9092 Date: 2005-03-11T07:53:10+03:00 Michael Card wrote: > Are you postulating here that the US DoD is deliberately choosing > programming languages that promote obfuscation for the purpose of > thwarting Chinese intelligence operations? First, I would not use the word "obfuscation" here, it is much too strong for the case. What is going is moving the bulk of that software development to the technologies, which are 1) more affordable for US than for China and 2) conveying less information through source code leakage. Second, I'm postulating nothing here. I'm just projecting relatively recent history onto current situation (well, it wasn't China in the past, as you can guess), and I see some similarities. Third, thwarting competitor/opponent's intelligence operation is certainly a significant, but still secondary aim. The primary aim is to maintain advantageous position for own development forces against the development forces of (less developed) competitor/opponent.