146 lines
8.8 KiB
Plaintext
146 lines
8.8 KiB
Plaintext
[video member=miotatsu stream_platform=twitch project=book title="2.4" vod_platform=youtube id=dzZl1zpp8XA annotator=Miblo]
|
|
[0:12][Shout-out to Wasim with a note on the stream organisation][:speech]
|
|
[2:55][Plug the new RISCY BUSINESS and Book Club Early Access site[ref
|
|
site="RISCY BUSINESS and Book Club \[Early Access\]"
|
|
url=https://guide.riscy.tv/]]
|
|
[7:03][Thoughts on LTR vs RTL languages][:language :speech]
|
|
[9:25][Wasim's perspective on numbers in RTL languages][:language :authored]
|
|
[11:49][Set up to dive into Chapter 2.4, noting the two's complement adder we described on [~riscy RISCY BUSINESS][ref
|
|
site="RISCY BUSINESS Annotated Episode Guide"
|
|
page="two's complement"
|
|
url=https://riscy.handmade.network/episode/riscy#two's%20complement]]
|
|
[17:43][Chapter 2.4 Signed and Unsigned Numbers[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]]
|
|
[19:20][Information theory and the "bit" as the fundamental unit of data][:speech]
|
|
[20:57][Chapter 2.4 continued[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]]
|
|
[21:25][Numerical base][:blackboard :mathematics]
|
|
[29:30][Plug pcalc, in-development but already available to backers at $5 or more][:speech]
|
|
[30:35][Understanding bases of unsigned numbers][:blackboard :mathematics]
|
|
[32:51][Chapter 2.4 continued[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]]
|
|
[37:33][Bytes split into nibbles][:blackboard]
|
|
[44:25][Why 64-bits? Because that's the register width of the HiFive Unleashed][:blackboard]
|
|
[49:06][Chapter 2.4 continued, including bit significance and the RISC-V doubleword bit length[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[52:28][Understanding sums of powers][:blackboard :mathematics]
|
|
[57:11][Chapter 2.4 continued, 64-bit unsigned number representations[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[57:53][Tip of the day: Counting binary numbers on your hand][:mathematics :speech]
|
|
[1:03:21][Chapter 2.4 continued, 64-bit unsigned number representations[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[1:05:20][Representing negative numbers][:blackboard :mathematics]
|
|
[1:07:10][Chapter 2.4 continued, 64-bit unsigned number representations[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[1:07:53][Chapter 2.4 :Hardware / Software Interface[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[1:08:08]["Natural" bases in human history][:mathematics :speech]
|
|
[1:11:31][Chapter 2.4 :Hardware / Software Interface, continued[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[1:11:39][Tidbit: Various bases in computer history][:mathematics :speech]
|
|
[1:13:02][Chapter 2.4 :Hardware / Software Interface, continued[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[1:14:19][On the physical constraints of computers in terms of their numerical representation][:mathematics :speech]
|
|
[1:18:54][Chapter 2.4 continued, on overflow[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[1:19:21][Thoughts on overflow / underflow, and programming for machines][:speech]
|
|
[1:22:00][Chapter 2.4 continued, on sign and magnitude[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[1:22:26][Two's complement as a way to represent both positive and negative numbers on the same :hardware[ref
|
|
site="RISCY BUSINESS Annotated Episode Guide"
|
|
page="two's complement"
|
|
url=https://riscy.handmade.network/episode/riscy#two's%20complement]][:mathematics :speech]
|
|
[1:23:58][Chapter 2.4 continued, shortcomings of sign and magnitude[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[1:25:23][Positive and negative 0][:blackboard :mathematics]
|
|
[1:28:14][Chapter 2.4 continued, two's complement[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[1:34:10][Understanding negative numbers in two's complement, by counting with 0s][:mathematics :speech]
|
|
[1:39:00][Chapter 2.4 continued, positive and negative numbers in two's complement[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[1:43:54][On two's complement being good for :hardware designers[ref
|
|
site="RISCY BUSINESS Annotated Episode Guide"
|
|
page="Ripple Carry Adders & Two's Complement"
|
|
url=https://riscy.handmade.network/episode/riscy/riscy012/#596]][:mathematics :speech]
|
|
[1:46:56][Chapter 2.4 continued, two's complement[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[1:47:30][Efficient sign-checking in two's complement][:mathematics :speech]
|
|
[1:50:11][Chapter 2.4 continued, two's complement[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[1:52:35][Chapter 2.4 Example 1 - Binary to Decimal Conversion[ref
|
|
title="Computer Organization and Design RISC-V Edition"
|
|
author="David Patterson & John Hennessy"
|
|
publisher="Morgan Kaufmann"
|
|
isbn=9780128122754
|
|
url=https://www.elsevier.com/books/computer-organization-and-design-risc-v-edition/patterson/978-0-12-812275-4]][:mathematics]
|
|
[1:59:30][End it here with a glimpse into the next episode, thoughts on it all tying in to [~riscy RISCY BUSINESS] and thanks for all the support][:mathematics :speech]
|
|
[/video]
|