Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The key isn't the specific file abstraction used today. The key is being able to name data. Whether that is through a traditional hierarchical file system, through an activity log, through URLs, through some hash-based key-value store, the requirement is being able to refer to data independent of the application that produced it.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: