See (p2,prompt1) about unprompt space banks, for example.
Promptness is likely to become a relative term. It is as if there were a hidden parameter in the term. This is satisfactory in most cases because a program need distinguish just two levels of promptness.
The following is a concrete example of the need for a program to determine the promptness of a start key before it calls the start key:
The creator should verify, by calling the transformer {(p2,sbtp)}, that the first bank is prompt.
The creator calls the first bank and if that bank were not prompt the creator might be out of business indefinitely. It is important that the second bank need not be prompt for the reasons described in (p2,prompt1).
This needs to be redesigned without requiring explicit calls on meters for reasons given in (p1,tj).
What about terminal dependent screen formatting orders?
This format allows "unlimited" length records.
Because this format does not have imbedded control information, it allows programs to easily process data on arbitrary delimiters.
This format is simple to implement and easy to understand.
This format allows for only sequential forward access.
Because this format does not have imbedded control information, it allows programs to easily process data on arbitrary delimiters.
This format is simple to implement and easy to understand.
This format allows for only sequential forward access.
This format allows for random access.
This format does not allow for the segment length convention.
For the moment we will define a failure to be when a virtual domain keeper (vdk) creates a real DDT over the domain. Other definitions will be necessary for programs like Pascal and PL/I which trap all failures through SPIE and STAE. It may be the use of the standard input/output keys by their internal debugger/error monitor. It would be useful for the %F command in DDT to clean up the DDT and restore the virtual domain keeper as keeper of the domain.
the owner of the object {via a mail system}.
Notes on Above by Norm {with comments by *Bill})
A practical problem is that now every meter must be equipped with a keeper, which is not now the case. In fact each keeper should obey this convention. I am not sure about the loyality of some of these keepers.
This convention would somehow {I have faith} be thwarted in some cases by factories because it is counter to the purpose of keeping the object inventor uninformed. Indeed in the classic factory justification there is no one{!} who can look into the domain. I hasten to admit that something like the above is needed in common cases however.
I am reminded of the dilemma of "how soon do you send out a search party" after a failure to return.
I am attracted to the semantics of PL/I's SIGNALS except I don't know how to implement them {efficiently & transparently} and I am not sure that they are any more compatible with Gnosis principles.
I think that the PL/I semantics can be described as follows: Suppose that each PL/I procedure were augmented by a "in case of error" parameter and that each procedure call were augmented by a "in case of error" argument. The value passed in these cases would be a procedure. This procedure is called upon error. Any of the so augmented routines is free to execute an "ON ERROR" command and effectively replace the error procedure for the duration of its activation.
Several qualities come to mind that justify such treatment:
A given bank is prone to delay by each such diversion. If one bank is subject to each diversion that another one is, we might say that the second one is as prompt as the first.
Integrity (No Sabotage)
To be able to destroy without being able to sabotage seems unlikely just now.
In each of the above cases we can measure the quality in terms of a set of obstacles to that quality. An obstacle to durability is that some particular space bank in an object is guarded. This is manifest in that some key to a guard, if invoked, will ruin the object. We say that this key is a guard for the object. If the set of guard keys for A is included in the set of guard keys for B we say that A is as durable as B. It seems that the obstacles to other qualities are keys also.
We judge that this increase in discreetness may be unimportant and that implementations of key set value abstractions will be constant when keys disappear. We might justify this by saying the key to the old object still exists, merely that slots holding keys to the old object get DK(0) when that object ceases to exist.
This greatly simplifies the implementation of the key set abstraction. A key set value is now constant after its creation.