Ken Shirriff's blog
Computer history, restoring vintage computers, IC reverse engineering, and whatever
The 6502 CPU's overflow flag explained at the silicon level
›
In this article, I show how overflow is computed in the 6502 microprocessor at the transistor and silicon level. I've discussed the mat...
16 comments:
The 6502 overflow flag explained mathematically
›
The overflow flag on the 6502 processor is a source of myth and confusion. In this article, I explain signed and unsigned binary arithmetic...
28 comments:
JavaScript on the go: Programming from your phone
›
Have you ever wanted to write a program when the only computer available is your phone? You can use an Android phone to write and run Jav...
7 comments:
Teardown of the mysterious KMS 4-port USB charger
›
In this article I tear down a 4-port USB charger of puzzling origin. This charger is a huge step above the $2 counterfeit chargers I examine...
39 comments:
Obama on sorting 1M integers: Bubble sort the wrong way to go
›
Recently StackOverflow and Hacker News discussed the question of how to sort 1 million 8-digit numbers in 1 megabyte of RAM. This reminde...
4 comments:
How to create a new schematic symbol in the Eagle editor
›
This tutorial describes how to create a custom schematic symbol in the CadSoft Eagle editor . It assumes that you have some familiarity with...
5 comments:
‹
›
Home
View web version