bart,
Sort of, but I can say in all honesty that I didn't even get the idea, let alone any code, from those slides.
As best as I can decipher the slides:
An anonymous hash is set up with a couple special keys
These keys are code refs that alter the hash itself
I think you would need a "method" key as an accessor/mutator for each "regular" key. If not, you could wipe out your own methods
You mentioned in the CB here that you thought this might be a memory leak (circular references) - I think the possibility exists
My approach doesn't have the drawbacks of the last two points. Additionally, you can add additional lexicals in my technique as a way to add "pieces" to the pseudo object, so you are not limited to a single hash.
Cheers - L~R