That sounds like a reasonable approach. Generally if you want to control access to something and that something provides it's own locking mechanisms, it's wise to use them. That's what you're doing here.
View the original post : http://www.jboss.org/index.html?module=bb&op=viewtopic&p=4266333#4266333 Reply to the post : http://www.jboss.org/index.html?module=bb&op=posting&mode=reply&p=4266333 _______________________________________________ jboss-user mailing list jboss-user@lists.jboss.org https://lists.jboss.org/mailman/listinfo/jboss-user