Ken Shirriff's blog
Computer history, restoring vintage computers, IC reverse engineering, and whatever
The 6502 overflow flag explained mathematically
›
The overflow flag on the 6502 processor is a source of myth and confusion. In this article, I explain signed and unsigned binary arithmetic...
24 comments:
JavaScript on the go: Programming from your phone
›
Have you ever wanted to write a program when the only computer available is your phone? You can use an Android phone to write and run Jav...
6 comments:
Teardown of the mysterious KMS 4-port USB charger
›
In this article I tear down a 4-port USB charger of puzzling origin. This charger is a huge step above the $2 counterfeit chargers I examine...
39 comments:
Obama on sorting 1M integers: Bubble sort the wrong way to go
›
Recently StackOverflow and Hacker News discussed the question of how to sort 1 million 8-digit numbers in 1 megabyte of RAM. This reminde...
4 comments:
How to create a new schematic symbol in the Eagle editor
›
This tutorial describes how to create a custom schematic symbol in the CadSoft Eagle editor . It assumes that you have some familiarity with...
5 comments:
Spectral analysis with the Tektronix 5000 oscilloscope
›
Many oscilloscopes have advanced spectral analysis features that perform Fourier Transforms on measured signals to generate a frequency spec...
‹
›
Home
View web version