Comment by JdeBP
5 years ago
It's an implementation strategy, one of at least two, explained at https://news.ycombinator.com/item?id=26298300 on this very page.
5 years ago
It's an implementation strategy, one of at least two, explained at https://news.ycombinator.com/item?id=26298300 on this very page.
No comments yet
Contribute on Hacker News ↗