Hacker News new | past | comments | ask | show | jobs | submit login

This is true to varying degrees, you could say that LLVM-IR and Java bytecode are two examples of this in action.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: