Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm thinking also this case described in this article may be an outlier. The process you're describing is exactly what I'd expect.


The process in the article is for scale/large commercial operations. Smaller or family run ones will use different methods.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: