Hi.
We integrated the changes made by Thomas to the FileDataStore regarding the 
inUse weak hash map into 
our database-based implementation. Taking care of clearing it in the test, it 
appears to be working.
One question I have is who has the hard reference to the data identifier, and 
when/where it gets 
null'ed so that the weak reference can be collected.
Regards,

Esteban Franqueiro
[EMAIL PROTECTED] 


Notice:  This email message, together with any attachments, may contain 
information  of  BEA Systems,  Inc.,  its subsidiaries  and  affiliated 
entities,  that may be confidential,  proprietary,  copyrighted  and/or legally 
privileged, and is intended solely for the use of the individual or entity 
named in this message. If you are not the intended recipient, and have received 
this message in error, please immediately return this by email and then delete 
it.

Reply via email to