Some hash-iterator thoughts

2000-08-14 Thread Randy J. Ray
on, would notice a significant improvement in manipulating the hash keys in various list contexts. Randy -- """"""""""""""""""""""""""""""""&qu

Re: Stuff in core (was Re: date interface, on language (wasRe: perl6 requirements, on bootstrap))

2000-08-02 Thread Randy J. Ray
ess effective than shaving 2 cycles off of one that runs 1000. Randy -- """"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""" Randy J. Ray| "NSA doesn't need a key to compromise security in [EMAIL PROTECTED]| Windows. Programs like Back Orifice can do it without 415-777-9810 x246 | any keys." --Bruce Schneier on the MS/NSA controversy