Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

More of the latter than the former. The protocol itself is constrained to a set of well-defined primitives, but clients can do a bunch of pre-processing before invoking any of them.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: