Hacker News new | past | comments | ask | show | jobs | submit login

Presumably something along the lines of what is outlined in this book: http://www.worldcat.org/oclc/809937327



And this one http://www.worldcat.org/oclc/738336560 - which I've read, and it seemed to make some sort of sense at the time.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: