skip to main content
column
Free Access

There’s Still Some Life Left in Ada: When it comes to survival of the fittest, Ada ain’t no dinosaur.

Published:01 October 2004Publication History
Skip Abstract Section

Abstract

Ada remains the Rodney Dangerfield of computer programming languages, getting little respect despite a solid technical rationale for its existence. Originally pressed into service by the U.S. Department of Defense in the late 1970s, these days Ada is just considered a remnant of bloated military engineering practices.

References

  1. Smith, J. What about Ada? The state of the technology in 2003. Technical Note-021 (July 2003), Carnegie Mellon University Software Engineering Institute; www.sei.cmu.edu/publications/documents/03.reports/03tn021.html.Google ScholarGoogle Scholar
  2. Lanfear, C. The embedded software strategic market intelligence program 2001-2002: Ada in embedded systems. Venture Development Corp. (March 2002); http://www.vdc-corp.com/embedded/white/02/02embeddedada.pdf.Google ScholarGoogle Scholar
  3. Taft, S. T. Fixing software before it breaks: Using static analysis to help solve the software quality quagmire. Ninth International Conference on Reliable Software Technologies Ada-Europe 2004; http://dmi.uib.es/~AE2004/AE2004speakers.html#tuc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Feldman, M. Ada as a foundation programming language. SIGAda (Spring 2002); http://www.seas.gwu.edu/~mfeldman/ada-foundation.html.Google ScholarGoogle Scholar

Index Terms

  1. There’s Still Some Life Left in Ada: When it comes to survival of the fittest, Ada ain’t no dinosaur.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Queue
          Queue  Volume 2, Issue 7
          RFID
          October 2004
          60 pages
          ISSN:1542-7730
          EISSN:1542-7749
          DOI:10.1145/1035594
          Issue’s Table of Contents

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 October 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • column
          • Opinion
          • Editor picked
        • Article Metrics

          • Downloads (Last 12 months)268
          • Downloads (Last 6 weeks)52

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format