Comment by throwuwu
2 years ago
Those fall under the second category in the article. No different from using a command line application and passing in a set of parameters and receiving an output.
2 years ago
Those fall under the second category in the article. No different from using a command line application and passing in a set of parameters and receiving an output.
No comments yet
Contribute on Hacker News ↗