Hacker News new | past | comments | ask | show | jobs | submit login

What's it take, to implement it correctly? What are the most common implementation mistakes?



Would love some pointers too, I've run into it once implement in a way j could t circumvent and was blown away. I'd love to develop the skills to do the same myself.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: