That sounds like a reasonable approach. Generally if you want to control access to
something and that something provides it's own locking mechanisms, it's wise to
use them. That's what you're doing here.
View the original post :
http://www.jboss.org/index.html?module=bb&op=viewtopic&p=4266333#...
Reply to the post :
http://www.jboss.org/index.html?module=bb&op=posting&mode=reply&a...