Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

He clearly says on the book that it's written using the tools that most people use, and that this is not a recommendation for the tools in any way.

He also gives a counterexample about implementing it in Prolog.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: