Hacker News new | past | comments | ask | show | jobs | submit login

I've gone through the first 20 and don't think you are accurately characterizing them. Maybe 2 or 3 of them involved significant time hunting down a bug.

You would likely still encounter bugs while building the abstractions to not have bugs. It might be neat if you could pick out a particular example and show how your approach would have avoided the problem or be quicker though.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: