Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That's easy to say but the bad interaction happens when the algorithms operate at opposite ends of the connection, and you often don't control both ends.

The bottom line is, you need to understand the semantics of your application protocol to best know how to apply them.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: