Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Just to continue the idea: you wouldn't be constraining or tagging functions, you would relinquish control to a system that closely guards how you produce side effects. e.g doing a raw HTTP request from a task is prohibited, not intercepted.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: