G'day all. Quoting Chung-chieh Shan <ccshan at post.harvard.edu>: > Yes. You can even do this portably, using nothing "unsafe", with Dylan > Thurston's technique: That paper gives you a choice between inefficient and leaky. I think I'll take unsafeCoerce#. :-) Cheers, Andrew Bromage