Comment by throwuwu
3 years ago
Those fall under the second category in the article. No different from using a command line application and passing in a set of parameters and receiving an output.
3 years ago
Those fall under the second category in the article. No different from using a command line application and passing in a set of parameters and receiving an output.
No comments yet
Contribute on Hacker News ↗