ç¥ãããããããã«ã¼ãã®çæ ãå¿çã«ã¤ãã¦ã¾ã¤ãã¨ããã²ãæ°ãç´¹ä»ãã人æ°é£è¼ãITmediaã«ç»å ´ãããã«ã¼ã®çãæ¹ãç¥ããã¨ã¯ãããªããããè¯ãããã°ã©ãã¼ã«ãªãã®ã«å½¹ç«ã¤ããããã¾ããããã¡ããä¿è¨¼ã¯ã§ãã¾ãããã ããã«ã¡ã¯ãã¯ããã¾ãã¦ãã¾ã¤ãã¨ããã²ãã¨ç³ãã¾ããä¸éã§ã¯Rubyã¨ããããã°ã©ãã³ã°è¨èªã®ä½è ã¨ãã¦ç¥ãããè·æ¥ã¯ããã°ã©ãã¼ã§èªç§°ããã«ã¼ã§ãããã¾ãããã®é£è¼ã§ã¯ããããã¡ãããã«ã¼ãã®çæ ãå¿çã«ã¤ãã¦ç´¹ä»ã§ããã°ã¨èãã¦ãã¾ãã ããã«ã¼ã¨ã¯ ãããã«ã¼ãã¨ãã£ã¦ããããã¯ã¼ã¯çµç±ã§ã·ã¹ãã ä¾µå ¥ãè¡ã£ããããã¹ã¯ã¼ããç ´ã£ãããããããªæªè ã§ã¯ããã¾ãããããããã°ãæè¿ãããã誤ç¨ããã¾ãè³ã«ããªããªãã¾ãããã ããã«ã¼ï¼Hackerï¼ã¨ã¯æåã©ãããHackãã人ãã¨ããæå³ã§ãããHackãã¨ããã®ã¯ãã¨ãã¨ã¯ãï¼æ§ãªã©ã§ï¼ãããåããã¨ããæå³ã§ã
{{#tags}}- {{label}}
{{/tags}}