Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Nope, just some internal facing code. The challenges boiled down to tracking what parts of the data got successfully sent to which recipients and how to get proof the data were transmitted correctly

I wish I would have found a 3rd party tool to do all this, but I never did



Is this not basically just torrenting?


I guess, but some of the recipients are just 3rd party automated systems with a standard set of instructions, so I have no control over the protocol used




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: