Ken Shirriff's blog

Computer history, restoring vintage computers, IC reverse engineering, and whatever

The 6502 CPU's overflow flag explained at the silicon level

›
In this article, I show how overflow is computed in the 6502 microprocessor at the transistor and silicon level. I've discussed the mat...
16 comments:

The 6502 overflow flag explained mathematically

›
The overflow flag on the 6502 processor is a source of myth and confusion. In this article, I explain signed and unsigned binary arithmetic...
28 comments:

JavaScript on the go: Programming from your phone

›
Have you ever wanted to write a program when the only computer available is your phone? You can use an Android phone to write and run Jav...
7 comments:

Teardown of the mysterious KMS 4-port USB charger

›
In this article I tear down a 4-port USB charger of puzzling origin. This charger is a huge step above the $2 counterfeit chargers I examine...
39 comments:

Obama on sorting 1M integers: Bubble sort the wrong way to go

›
Recently StackOverflow and Hacker News discussed the question of how to sort 1 million 8-digit numbers in 1 megabyte of RAM. This reminde...
4 comments:

How to create a new schematic symbol in the Eagle editor

›
This tutorial describes how to create a custom schematic symbol in the CadSoft Eagle editor . It assumes that you have some familiarity with...
5 comments:
‹
›
Home
View web version
Powered by Blogger.