• Gem #63: The Effect of Pragma Suppress

    Ada Gem #63 — The features of Ada have generally been designed to prevent violating the properties of data types, enforced either by compile-time rules or, in the case of dynamic properties, by using run-time checks. Ada allows run-time checks to be suppressed, but not with the intent of allowing programmers to subvert the type system. Continue Reading »

    Gary Dismukes
    AdaCore
  • Gem #53: Safe and Secure Software: Chapter 12: Conclusion

    Gem #53 is the concluding chapter of John Barnes' new booklet:

    Safe and Secure Software: An Introduction to Ada 2005.

    We hope you have enjoyed this series. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet.

    Continue Reading »

    John Barnes
  • Gem #51: Safe and Secure Software: Chapter 11, Certified Safe with SPARK

    Gem #51 is the eleventh chapter of John Barnes' new booklet:

    Safe and Secure Software: An Introduction to Ada 2005.

    Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet.

    Continue Reading »

    John Barnes
  • Gem #49: Safe and Secure Software: Chapter 10, Safe Concurrency

    Gem #49 is the tenth chapter of John Barnes' new booklet:

    Safe and Secure Software: An Introduction to Ada 2005.

    Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet.

    Continue Reading »

    John Barnes
  • Gem #47: Safe and Secure Software : Chapter 9, Safe Communication

    Gem #47 is the ninth chapter of John Barnes' new booklet:

    Safe and Secure Software: An Introduction to Ada 2005.

    Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet.

    Continue Reading »

    John Barnes
  • Gem #45: Safe and Secure Software : Chapter 8, Safe Startup

    Gem #45 is the eighth chapter of John Barnes' new booklet:

    Safe and Secure Software: An Introduction to Ada 2005.

    Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet.

    Continue Reading »

    John Barnes
  • Gem #44: Accessibility Checks (Part III)

    Ada Gem #44 — 'Unchecked_Access can be used to bypass the accessibility rules, and controlled types can be used to rein in this dangerous feature. Continue Reading »

    Bob Duff
    AdaCore
  • Gem #43: Safe and Secure Software : Chapter 7, Safe Memory Management

    Welcome back the Ada Gems series! We hope you had a great summer.

    Gem #43 is the seventh chapter of John Barnes' new booklet:

    Safe and Secure Software: An Introduction to Ada 2005.

    Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet.

    Continue Reading »

    John Barnes
  • Gem #42: Safe and Secure Software : Chapter 6, Safe Object Construction

    Welcome to the final gem before we take a break for the summer, which is the sixth chapter of John Barnes' new booklet:

    Safe and Secure Software: An Introduction to Ada 2005.

    Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet.

    The gems series will recommence in September. In the meantime, we hope you have a wonderful summer!

    Continue Reading »

    John Barnes
  • Gem #41: Accessibility Checks (Part II: Ada2005)

    Ada Gem #41 — Ada 2005 brings a number of improvements concerning access types, aimed at simplifying the programmer's task and adding flexibility to the language. But with greater power comes greater responsibility, so accessibility checks have also been extended to prevent these new features from creating dangling pointers. Continue Reading »

    Ramón Fernández
    AdaCore
  • Gem #40: Safe and Secure Software : Chapter 5, Safe Object Oriented Programming

    This week's gem is the fifth chapter of John Barnes' new booklet:

    Safe and Secure Software: An Introduction to Ada 2005.

    Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet. We hope you will enjoy the read!

    Continue Reading »

    John Barnes
  • Gem #38: Safe and Secure Software : Chapter 4, Safe Architecture

    This week's gem is the fourth chapter of John Barnes' new booklet:

    Safe and Secure Software: An Introduction to Ada 2005.

    Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet. We hope you will enjoy the read!

    Continue Reading »

    John Barnes
  • Gem #36: Safe and Secure Software : Chapter 3, Safe Pointers

    This week's gem is the third chapter of John Barnes' new booklet:

    Safe and Secure Software: An Introduction to Ada 2005.

    Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet. We hope you will enjoy the read!

    Continue Reading »

    John Barnes
  • Gem #32: Safe and Secure Software : Chapter 1, Safe Syntax

    This week's gem is the first chapter of John Barnes' new booklet:

    Safe and Secure Software: An Introduction to Ada 2005.

    Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of Gem #30 you can access the contents and bibliography for the entire booklet. We hope you will enjoy the read!

    Continue Reading »

    John Barnes
  • Gem #31: Preconditions/postconditions

    Ada Gem #31 — The notion of preconditions and postconditions is an old one. A precondition is a condition that must be true before a section of code is executed, and a postcondition is a condition that must be true after the section of code is executed. Continue Reading »

    Robert Dewar
    AdaCore
  • Gem #30: Safe and Secure Software : Introduction

    This week's gem is the introduction to John Barnes' new booklet:

    Safe and Secure Software: An Introduction to Ada 2005.

    Over the coming months, we will be publishing all thirteen chapters of the booklet. In the attachment at the bottom of this page you can access the contents and bibliography for the entire booklet. We hope you will enjoy the read!

    Continue Reading »

    John Barnes
  • Gem #24: Null Considered Harmful (Part 2—Efficiency)

    Ada Gem #24 — The "not null" syntax can make programs more efficient by removing the need for implicit run-time checks. Continue Reading »

    Bob Duff
    AdaCore