Ken Shirriff's blog

Computer history, restoring vintage computers, IC reverse engineering, and whatever

Bitcoins the hard way: Using the raw Bitcoin protocol

›
All the recent media attention on Bitcoin inspired me to learn how Bitcoin really works, right down to the bytes flowing through the netwo...
88 comments:

How Hacker News ranking really works: scoring, controversy, and penalties

›
The basic formula for Hacker News ranking has been known for years , but questions remained. Does the published code give the real algorithm...
15 comments:

The Z-80's 16-bit increment/decrement circuit reverse engineered

›
The 8-bit Z-80 processor was very popular in the late 1970s and early 1980s, powering many personal computers such as the Osborne 1, TRS-80,...
13 comments:

The Z-80 has a 4-bit ALU. Here's how it works.

›
The 8-bit Z-80 processor is famed for use in many early personal computers such the Osborne 1, TRS-80, and Sinclair ZX Spectrum, and it is s...
23 comments:

Intel x86 documentation has more pages than the 6502 has transistors

›
Microprocessors have become immensely more complex thanks to Moore's Law, but one thing that has been lost is the ability to fully under...
6 comments:

Reverse-engineering the Z-80: the silicon for two interesting gates explained

›
I've been reverse-engineering the Z-80 processor, using images from the Visual 6502 team. One interesting thing about the Z-80's s...
4 comments:
‹
›
Home
View web version
Powered by Blogger.