Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You tend to find a decent solution when you're under attack and iterate until something works, and then iterate more to fine tune it after complaints of breakages from legitimate users (such as downstream distro packages pulling from your CGIT).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: