Embedded Systems Conference
Breaking News
Blog

Chris summit Kilimanjaro: Part i

Blog
11/11/2010 01:38 PM EST

 5 comments   post a comment
NO RATINGS
View Comments: Newest First | Oldest First | Threaded View
ReneCardenas
User Rank
Author
re: Chris summit Kilimanjaro: Part i
ReneCardenas   1/2/2011 6:01:02 PM
NO RATINGS
Congratulations Chris, in reading your description of your troubles you shared a great story of drive and self motivation.

Chris McAneny
User Rank
Author
re: Chris summit Kilimanjaro: Part i
Chris McAneny   11/18/2010 10:30:16 AM
NO RATINGS
Alex , sounds like you have experience here . Standing on top of a peak no matter how high really is a great feeling !! I came , I challenged ,...I survived !! ;-)

Chris McAneny
User Rank
Author
re: Chris summit Kilimanjaro: Part i
Chris McAneny   11/18/2010 10:26:08 AM
NO RATINGS
Hi Silicon Smith . I have trekked the Anapurna Circuit three years ago. Nepal is an amazing country and wonderful people . Life is all too short so Kilimanjaro was another great adventure !! Namaste...In Nepalese I Honour and Respect You . Sherpa Chris ;-)

t.alex
User Rank
Author
re: Chris summit Kilimanjaro: Part i
t.alex   11/15/2010 2:38:59 PM
NO RATINGS
I totally understand the feelings, especially the headaches and the sickness one encounters at high altitude. However, a great sense of achievement in the end!

Silicon_Smith
User Rank
Author
re: Chris summit Kilimanjaro: Part i
Silicon_Smith   11/13/2010 10:44:20 AM
NO RATINGS
Somehow, I feel this would be more interesting had this been in the Himalayas! More capricious weather and mountains.

More Blogs
Industrial networks are increasingly vulnerable to cyber attacks. Their security requires a multi-layered approach.
MacSpace is a collaborative R&D project aiming to research and develop a many-core DSP chip and computer for use in space.
Faced with the challenges of new materials and new components, PCB designers must also deal with continuing electromagnetic compatibility and interference problems.
A Bluetooth expert debunks myths and untangles messy methodologies that have resulted in security snafus in the Internet of Things
With software becoming a competitive differentiator even in hardware designs, it is important to use behavioral analytics tools that protect proprietary software IP from theft.
Most Recent Comments
Flash Poll
Like Us on Facebook

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Times on Twitter
EE Times Twitter Feed
Top Comments of the Week