Ken Shirriff's blog

Computer history, restoring vintage computers, IC reverse engineering, and whatever

The 6502 overflow flag explained mathematically

›
The overflow flag on the 6502 processor is a source of myth and confusion. In this article, I explain signed and unsigned binary arithmetic...
28 comments:

JavaScript on the go: Programming from your phone

›
Have you ever wanted to write a program when the only computer available is your phone? You can use an Android phone to write and run Jav...
7 comments:

Teardown of the mysterious KMS 4-port USB charger

›
In this article I tear down a 4-port USB charger of puzzling origin. This charger is a huge step above the $2 counterfeit chargers I examine...
39 comments:

Obama on sorting 1M integers: Bubble sort the wrong way to go

›
Recently StackOverflow and Hacker News discussed the question of how to sort 1 million 8-digit numbers in 1 megabyte of RAM. This reminde...
4 comments:

How to create a new schematic symbol in the Eagle editor

›
This tutorial describes how to create a custom schematic symbol in the CadSoft Eagle editor . It assumes that you have some familiarity with...
5 comments:

Spectral analysis with the Tektronix 5000 oscilloscope

›
Many oscilloscopes have advanced spectral analysis features that perform Fourier Transforms on measured signals to generate a frequency spec...
‹
›
Home
View web version
Powered by Blogger.