|
On 05/04/2012 16.31, Dimitris Papavasiliou wrote:
It doesn't bother me really and I imagine it can be useful at times, [...]
It can be useful, for example, to have 'nil propagation' in a chain of table accesses without having to check for key validity at each step.
(sort of analogous to NaN propagation in numeric computations) -- Enrico