That sounds like a reasonable approach. Generally if you want to control access 
to something and that something provides it's own locking mechanisms, it's wise 
to use them. That's what you're doing here.

View the original post : 
http://www.jboss.org/index.html?module=bb&op=viewtopic&p=4266333#4266333

Reply to the post : 
http://www.jboss.org/index.html?module=bb&op=posting&mode=reply&p=4266333
_______________________________________________
jboss-user mailing list
jboss-user@lists.jboss.org
https://lists.jboss.org/mailman/listinfo/jboss-user

Reply via email to