Hacker News new | past | comments | ask | show | jobs | submit login

I actually agree with you if you redefine all the terms in this way, but then we are talking about something else.



that's exactly how the terms are defined in the article.


He goes quite deep over the full series and puts them into very rigidly defined boxes with whole sets of behaviors and even specific language and secret communication modes attributed to them.

If you loosen it all back up it's vague enough to be generally applicable.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: