From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=ham autolearn_force=no version=3.4.4 X-Google-Thread: 103376,f2690a5e963b61b6 X-Google-Attributes: gid103376,public X-Google-Language: ENGLISH,ASCII-7-bit Path: g2news1.google.com!news3.google.com!news.glorb.com!border1.nntp.dca.giganews.com!nntp.giganews.com!local01.nntp.dca.giganews.com!nntp.clear.net.nz!news.clear.net.nz.POSTED!not-for-mail NNTP-Posting-Date: Fri, 08 Jul 2005 12:52:10 -0500 From: Craig Carey Newsgroups: comp.lang.ada Subject: Re: GCC 4.0 Ada.Containers Cursor danger. Date: Sat, 09 Jul 2005 05:52:23 +1200 Message-ID: References: <1120575076.876798.108220@g44g2000cwa.googlegroups.com> <1120583470.429264.325450@g43g2000cwa.googlegroups.com> <42cb8d21$0$22761$9b4e6d93@newsread2.arcor-online.net> <1120740766.343393.168420@g14g2000cwa.googlegroups.com> <1120758578.848856.21380@g14g2000cwa.googlegroups.com> <1120761335.688823.141360@g49g2000cwa.googlegroups.com> X-Newsreader: Forte Agent 2.0/32.652 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Original-NNTP-Posting-Host: ip-210-185-5-222.internet.co.nz X-Original-Trace: 9 Jul 2005 06:45:10 +1200, ip-210-185-5-222.internet.co.nz Organization: "ICONZ Ltd." X-Original-NNTP-Posting-Host: news.nz.asiaonline.net X-Original-Trace: 9 Jul 2005 05:52:07 +1200, news.nz.asiaonline.net NNTP-Posting-Host: 203.97.37.6 X-Trace: sv3-1oqFpa77QFMnog2cXnxxcZJheRMXkXCTt8w4Tm2H0M7OJe2h/LtfutXZQkOQlldF8xXne2clXyYGiWm!eAwh5NeuNZwx39cG9TcR9+5mbPEiZzi2kaWM8R+UPrSOh2iBHTkCFRhL75M+rdVb8HuKO5FywI98!/A4FyHw= X-Complaints-To: Complaints to abuse@clear.net.nz X-DMCA-Complaints-To: Complaints to abuse@clear.net.nz X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly X-Postfilter: 1.3.32 Xref: g2news1.google.com comp.lang.ada:11967 Date: 2005-07-09T05:52:23+12:00 List-Id: On 7 Jul 2005 11:35:35 -0700, "Matthew Heaney" wrote: > > >Dmitriy Anisimkov wrote: >> >> <> performance. It is why i propose to have containers implementation >> without cursors. Who need a cursors would pay by size and >> performance.>> > >A couple of points. The ARG solicited proposals for a container API >over three years ago. The ARG is composed of namable individuals. Certainly not Mr Brukardt's ARG, since he anonymizes (so freely) the names of men like Tucker Taft, when voting at ARG meetings. The reward of anonymity is all part of the provided view. There was a global resource shortage, e.g. of the mere names of American individuals who are personally devoted to the success of (under the curiously effective 50% idealism that Mr Brukardt gives us a view of). Both Taft and Leroy created the total secrecy of AG discussions in about October 2002. Suppose Brukardt personally desired to maintain the hold over the ARG. He could create a rubbishy containers proposal using you as a pawn, and the old IBM/360 seemed to get the correct answers, so it would all adore secrecy. Also I got an all-false e-mail from Tucker Taft dated "Tue, 05 Apr 2005 22:15:23 -0400", that explained the secrecy of having all discussions at the covert arg@ada-auth.org mailing list, was absent, which is extremely untrue. I presented evidence here by ranking the ARG members by their secretiveness. Mr Brukardt is very more due attention than Mr Taft. In fact, Taft didn't seem to be lying but more imagining that any story goes so long as it can't be shot up or contradicted. AI-302 is a pretext, a vessel named 'wrong purpose' that carries the world to the shores of the Ada language. Who solicited proposals?; or better still, what was the precise purpose the Brukardtian anonymizing of the ARG. I ask my readers to check for the unasked for and inescapable awarding of anonymity (or less reliably, secrecy instead). It suggests an abuse of power. Ada is for powerful people. ... >The other issue is that there is no cost in size or performance to have >cursors. Implementations don't have to do anything special to >implement cursors. Even without cursors, it's doubtful implementations >would change at all. > >The only cost in size or performance is the overhead necessary to >detect dangling cursor references (and not, as you suggest above, to >merely provide cursors). Also check for strange views. Maybe Matt render more services of value to the hierarchy (oh, that view was missing: a little mistake but beginners would learn...) Craig Carey The old ranking of names by secretiveness: http://www.ijs.co.nz/ada_95.htm