Originally shared by Li Zan Hiu
Lindy, you totally made my day, always such a joy to watch your vlogs. Thank you so much for sharing again and again š
Originally shared by Li Zan Hiu
Lindy, you totally made my day, always such a joy to watch your vlogs. Thank you so much for sharing again and again š

Originally shared by Google
Welcome to El Capitan in Yosemite National ParkĀ — the most iconic rock climb on earth. Tighten your harness and double-check your knot, then join climbers Lynn Hill, Alex Honnold, and Tommy Caldwell on a 3,000 foot interactive journey up El Capitan, now on Google MapsĀ ā http://goo.gl/aGtCna
Originally shared by Dragos Ruiu
Originally shared by Vincent Granville
This may lead to a practical, feasible solution, to factor the product of two very large prime numbers (with thousands of digits), making many security systems vulnerable to new types of attacks: factoring encryption keys, en masse. Let’s start with the pictures. The patterns (as well as how to leverage them) are explained below.

A museum with a penchant for the surreal…





















Sunset at Wailea

Quintessential photobomb š

Originally shared by Guido Stepken
Complex “finite state machines” – easily implemented:
A short tutorial: http://www.gedan.net/2008/09/08/finite-state-machine-matrix-style-c-implementation/
And one #FSM with function pointers: http://stackoverflow.com/questions/1371460/state-machines-tutorials
Both are working with decision tables, which are very easy to verify. You can even print them out, edit them in EXCEL, … No longer “if then else if if …” – orgies, no complex parsers, … just plain “C”.
And i can tell you – blindingly faaaaaaast!!!
Very well suited for implementing “Business Administration Rules” ( #BPM Business Process Management, #BRMS, #RuleML) or for defining “behaviour” of RPi GPIO, traffic lights, robots, ….
Have fun!