
Blog
An Insight Into the AdaCore Ecosystem

Apr 16, 2026
Claire Dross
Formally Verified Hashed Sets in Ada SPARK
This blog explores the formal verification of an implementation of bounded hashed sets in Ada SPARK.
Read More

Jul 07, 2008
Gem #42: Safe and Secure Software : Chapter 6, Safe Object Construction

Jun 30, 2008
Gem #41: Accessibility Checks (Part II: Ada2005)

Jun 16, 2008
Gem #40: Safe and Secure Software : Chapter 5, Safe Object Oriented Programming

Jun 09, 2008
Gem #39: Efficient Stream I/O for Array Types

Jun 02, 2008
Gem #38: Safe and Secure Software : Chapter 4, Safe Architecture

May 26, 2008
Gem #37: Bounded Buffer package in GNAT Hierarchy (Part 2)

May 19, 2008
Gem #36: Safe and Secure Software : Chapter 3, Safe Pointers

May 12, 2008
Gem #35: Bounded buffer package in GNAT hierarchy (Part 1)

May 05, 2008
Gem #34: Safe and Secure Software : Chapter 2, Safe Typing

Apr 28, 2008
Gem #33: Accessibility Checks (Part I: Ada95)

Apr 21, 2008
Gem #32: Safe and Secure Software : Chapter 1, Safe Syntax

Apr 14, 2008


