Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There’s lots of protocols like what you describe and I’ve written a few myself. But they are a pain to teach to other people.

Csv isn’t perfect, but I’d rather live with its weaknesses than use anything else.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: