Category Archives: ken shirriff

Fixing An IBM 1401 Computer To Get It Printing Again

The IBM 1401 is a classic computer which IBM marketed throughout the 1960s, late enough for it to have used transistors rather than vacuum tubes, which is probably a good thing for this story. For small businesses, it was often used as their main data processing machine along with the 1403 printer. For larger businesses with mainframes, the 1401 was used to handle the slower peripherals such as that 1403 printer as well as card readers.

The Computer History Museum in Mountain View, CA has two working 1401s as well as at least one 1403 printer, and recently whenever the …read more

Continue reading

Posted in computer hacks, IBM 1401, ken shirriff, printer, retrocomputing | Leave a comment

How The 8087 Coprocessor Got Its Bias

Most of us have been there. You build a device but realize you need two or more voltages. You could hook up multiple power supplies but that can be inconvenient and just not elegant. Alternatively, you can do something in the device itself to create the extra voltages starting with just one. When [Ken Shirriff] decapped an 8087 coprocessor to begin exploring it, he found it had that very problem. It needed: +5 V, a ground, and an additional -5 V.

His exploration starts with a smoking gun. After decapping the chip and counting out all the bond wires going …read more

Continue reading

Posted in charge pump, classic hacks, hardware, ken shirriff, reverse engineering, ring oscillator | Leave a comment

[Ken Shirriff] Becomes a Core Memory Repairman (Again)

Lately, [Ken Shirriff] has been on some of the most incredible hardware adventures. In his most recent undertaking we find [Ken] elbow-deep in the core memory of a 50-year-old machine, the IBM 1401. The computer wasn’t shut down before mains power was cut, and it has refused to boot ever since. The culprit is in the core memory support circuitry, and thanks to [Ken’s] wonderful storytelling we can travel along with him to repair an IBM 1401.

From a hardware standpoint core memory makes us giddy. It’s a grid of wires with ferrite toroids at every intersection. Bits can be …read more

Continue reading

Posted in IBM 1401, ken shirriff, psu, repair, repair hacks | Leave a comment

Reverse Engineering Space Invaders Sound Chip

Around here, a new blog post from [Ken Shirriff] is almost as exciting as a new Star Trek movie. This time, [Ken] tears apart a 76477 sound effects chip. This chip was state-of-the-art in 1978 and used in Space Invaders, along with plenty of other pinball machines and games.

[Ken] started out with a die photo from [Sean Riddle] and mapped its functions. Unlike a modern sound chip, this one created sounds based on networks of attached resistors and capacitors. Even if you aren’t interested in the chip, per se, [Ken] explains how the die implements active and passive …read more

Continue reading

Posted in ken shirriff, musical hacks, space invaders | Leave a comment

Explaining The Operation Of The 74181 ALU

You will all no doubt be familiar with the 74 series logic integrated circuits, they provide the glue logic for countless projects. If you look back through old listings of the series you’ll find alongside the familiar simple gates a host of now obsolete chips that reveal their roots in the pre-microprocessor computer industry of the late 1960s, implementing entire functions that would now be integrated.

One of the more famous of these devices is the 74181, a cascadable 4-bit arithmetic logic unit, or ALU. An ALU is the heart of a microprocessor, performing its operations. The 74181 appeared in …read more

Continue reading

Posted in ken shirriff, parts, ttl | Leave a comment

Yes, You Can Reverse Engineer this 74181

[Ken Shirriff] is the gift that keeps on giving this new year. His latest is a reverse engineering of the 74181 Algorithmic Logic Unit (ALU). The great news is that the die image and complexity are both optimized for you to succeed at doing your own reverse engineering.

We have most recently seen [Ken] at work explaining his decapping and reverse engineering process at the Hackaday SuperCon followed soon after by his work on the 8008. That chip is crazy with complexity and a die-ogling noob (like several of us on the Hackaday crew) stands no chance of doing more …read more

Continue reading

Posted in ken shirriff, logic, logic gates, reverse engineering, silicon | Leave a comment

8008 Exposed

[Ken Shirriff] is no stranger to Hackaday. His latest blog post is just the kind of thing we expect from him: a tear down of the venerable 8008 CPU. We suspect [Ken’s] earlier post on early CPUs pointed out the lack of a good 8008 die photo. Of course, he wasn’t satisfied to just snap the picture. He also does an analysis of the different constructs on the die.

Ever wonder why the 8008 ALU is laid out in a triangle shape? In all fairness, you probably haven’t, but you might after you look at the photomicrograph of the die. …read more

Continue reading

Posted in ic, ken shirriff, Microcontrollers, photomicroscopy | Leave a comment

Ken Shirriff Takes Us Inside the IC, For Fun

[Ken Shirriff] has seen the insides of more integrated circuits than most people have seen bellybuttons. (This is an exaggeration.) But the point is, where we see a crazy jumble of circuitry, [Ken] sees a riddle to be solved, and he’s got a method that guides him through the madness.

In his talk at the 2016 Hackaday SuperConference, [Ken] stepped the audience through a number of famous chips, showing how he approaches them and how you could do the same if you wanted to, or needed to. Reading an IC from a photo is not for the faint of heart, …read more

Continue reading

Posted in ic, ken shirriff, reverse engineering | Leave a comment