Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Have coded a couple of full MRP systems for various large companies based on my own model and I would be intrigued to see how this will work. I usually include the default recommended security and DR practices and then add my own OTP-hash based layer for key authorisations. I thought I was paranoid, but your system sounds more like an end-of-the-world scenario rather than just keep the production-line going in the factory.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: