Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Cool to see a write up on this! Discovered the same method years ago and also wondered why it doesn’t show up in academic literature.

I implemented this in a decentralized context and as a CRDT though, so that the properties hold (commutative, idempotent and associative).



If the idea is to have an alternative to CRDT, what did you gain from building it as CRDT?


It wasn’t really that we wanted to have a CRDT per se, but as it was implemented on top of an op-based append-only log CRDT, it turned out to hold those properties, which makes it a CRDT. We wanted to have the edits to be able to arrive in any order or after delays due to network partitions (this was for a p2p network).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: