Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you had used any of those, you'd know they clearly don't work well enough for such long tasks. We're not yet at the point where we have general purpose fire-and-forget frameworks. But there have been a few research examples from constrained environments with a complex custom setup.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: