Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes, and in order to identify them, we need to separate the technology from the social context in which it is deployed. That's exactly what I'm saying, glad we agree.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: