Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Seems like it starts with some examples of what doesn't work well and then teases the reader with potential solutions, which don't have examples.


It does read like at some point the OP got tired of writing and just wrapped it up with a to-do list.


Ha, this is my article. Believe me when I say I had developed a truly remarkable solution of this problem which this blog post is too small contain.

More believably, this is a very basic introduction to the problem. More complex solutions are possible but are very tied to the specific datastructure and access patterns. It is hard to generalize advice once the problems get more involved so I just declared them out-of-scope and only mentioned some ideas in passing.

Maybe I will write a part II sometime. The comments here are interesting.


Sounds like the famous "How to Draw an Owl" tutorial. ;)




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: