Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I would be very interested in knowing how you manage to win that argument. The only sure way I know of is in a post-mortem after a major data corruption disaster, so if you can suggest a less dramatic angle of attack I'd love to hear it.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: