Tom de Ruijter,</em></a><em> </em><a href=https://hackernoon.com/"https://medium.com/u/9fdf9ae0d8fd">Steven Reitsma</em></a><em> and </em><a href=https://hackernoon.com/"https://twitter.com/laurenskoppenol">Laurens Koppenol</em></a><em> for proof reading this post.</em>"/>Tom de Ruijter,</em></a><em> </em><a href=https://hackernoon.com/"https://medium.com/u/9fdf9ae0d8fd">Steven Reitsma</em></a><em> and </em><a href=https://hackernoon.com/"https://twitter.com/laurenskoppenol">Laurens Koppenol</em></a><em> for proof reading this post.</em>"/>Tom de Ruijter,</em></a><em> </em><a href=https://hackernoon.com/"https://medium.com/u/9fdf9ae0d8fd">Steven Reitsma</em></a><em> and </em><a href=https://hackernoon.com/"https://twitter.com/laurenskoppenol">Laurens Koppenol</em></a><em> for proof reading this post.</em>"/>
Share Your Thoughts