Handbook: Cyber-Risk Oversight 2020

The Internet Security Alliance (ISA) and the European Confederation of Directors’ Associations (ecoDa) released Cyber-Risk Oversight 2020, a handbook on cyber-risk management for corporate boards of directors in Europe. Improving cybersecurity and risk… Continue reading Handbook: Cyber-Risk Oversight 2020

Supercon Keynote: Megan Wachs Breaks Down RISC-V

The 2019 Hackaday Superconference kicked off with a marvelous, and marvelously geeky, keynote talk on the subject of RISC-V by Dr. Megan Wachs. She is VP of Engineering at SiFive, a company that makes RISC-V processors in silicon, but the talk is a much more general introduction to the RISC-V …read more

Continue reading Supercon Keynote: Megan Wachs Breaks Down RISC-V

ISA Global Cybersecurity Alliance: Your Expertise is Needed

The ISA/IEC 62443 series of standards, developed by the ISA99 committee and adopted by the International Electrotechnical Commission, provides a flexible framework to address and mitigate current and future security vulnerabilities in industrial automa… Continue reading ISA Global Cybersecurity Alliance: Your Expertise is Needed

RISC-V: Why The ISA Battles Aren’t Over Yet

A computer processor uses a so-called Instruction Set Architecture to talk with the world outside of its own circuitry. This ISA consists of a number of instructions, which essentially define the functionality of that processor, which explains why so many ISAs still exist today. It’s hard to find that one …read more

Continue reading RISC-V: Why The ISA Battles Aren’t Over Yet

Recovering Data From A Vintage MFM Drive

Even if you aren’t a vintage computer aficionado, you’re probably aware that older computer hard drives were massive and didn’t hold much data. Imagine a drive that weighs several pounds, and only holds 1/1000th of what today’s cheapest USB flash drives can. But what you might not realize is that if you go back long enough, the drives didn’t just have lower capacity, they utilized fundamentally different technology and relied on protocols which are today little more than historical footnotes.

A case in point is the circa 1984 Modified Frequency Modulation (MFM) drive which [Michał Słomkowski] was tasked with recovering …read more

Continue reading Recovering Data From A Vintage MFM Drive

Making Vintage Computing Easy, The Hard Way

If you want to not take for granted how easy and seamless computers have become, take up vintage computing as a hobby. If you venture down the retro path, you’ll quickly question how anyone ever got any useful work done with computers, and the farther back you go in computer history, the more difficult everything seems to become.

Case in point: how do you easily transfer files between a home-brew PC/XT and your modern desktop? Back in the day we did it with null modem cables or by sneaker-netting stacks of floppies, but [Scott M. Baker] found another way — …read more

Continue reading Making Vintage Computing Easy, The Hard Way

A Retrocomputer Disk On A Chip

There have been a lot of different mass storage methods over the relatively short lifespan of the computer. Magnetic tapes, drums, all sorts of disks, and flash memory have each had their time. Each of these new innovations required some time to become easy to use. One of the early attempts to simplify using flash memory was the M-Systems DiskOnChip device. Looking like a standard 8K JEDEC-compatible memory device, it actually provided access to a flash disk drive ranging from 16MB to 1GB. [Smbakeryt] bought some of these devices and built an ISA board to provide a disk and clock …read more

Continue reading A Retrocomputer Disk On A Chip

Find Instructions Hidden In Your CPU

There was a time when owning computer meant you probably knew most or all of the instructions it could execute. Your modern PC, though, has a lot of instructions, many of them meant for specialized operating system, encryption, or digital signal processing features.

There are known undocumented instructions in a lot of x86-class CPUs, too. What’s more, these days your x86 CPU might really be a virtual machine running on a different processor, or your CPU could have a defect or a bug. Maybe you want to run sandsifter–a program that searches for erroneous or undocumented instructions. Who knows what …read more

Continue reading Find Instructions Hidden In Your CPU