Welcome to El Capitan in Yosemite National Park — the most iconic rock climb on earth. Tighten your harness and double-check your knot, then join climbers Lynn Hill, Alex Honnold, and Tommy Caldwell on a 3,000 foot interactive journey up El Capitan, now on Google Maps → http://goo.gl/aGtCna
This may lead to a practical, feasible solution, to factor the product of two very large prime numbers (with thousands of digits), making many security systems vulnerable to new types of attacks: factoring encryption keys, en masse. Let’s start with the pictures. The patterns (as well as how to leverage them) are explained below.
Both are working with decision tables, which are very easy to verify. You can even print them out, edit them in EXCEL, … No longer “if then else if if …” – orgies, no complex parsers, … just plain “C”.
And i can tell you – blindingly faaaaaaast!!!
Very well suited for implementing “Business Administration Rules” ( #BPM Business Process Management, #BRMS, #RuleML) or for defining “behaviour” of RPi GPIO, traffic lights, robots, ….