Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not the ones I’ve tried. They make a go of it but their results have been generally inferior, often wildly so. Because they can’t make intuitive connections as easily, I assume they need both the rules and examples of implementations to produce workable output.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: