We are currently in the process of converting the website to the new design. Some pages, like this one, are still broken. We appreciate your patience.
RISCY BUSINESS»Episode Guide
2.4-2.5
?
?

Keyboard Navigation

Global Keys

[, < / ], > Jump to previous / next episode
W, K, P / S, J, N Jump to previous / next marker
t / T Toggle theatre / SUPERtheatre mode
V Revert filter to original state Y Select link (requires manual Ctrl-c)

Menu toggling

q Quotes r References f Filter y Link c Credits

In-Menu Movement

a
w
s
d
h j k l


Quotes and References Menus

Enter Jump to timecode

Quotes, References and Credits Menus

o Open URL (in new tab)

Filter Menu

x, Space Toggle category and focus next
X, ShiftSpace Toggle category and focus previous
v Invert topics / media as per focus

Filter and Link Menus

z Toggle filter / linking mode

Credits Menu

Enter Open URL (in new tab)
0:01Recap and set the stage for the day
🗩
0:01Recap and set the stage for the day
🗩
0:01Recap and set the stage for the day
🗩
1:49Review where we're at
1:49Review where we're at
1:49Review where we're at
2:27Chapter 2.4 - RV32I Integer Computation1
2:27Chapter 2.4 - RV32I Integer Computation1
2:27Chapter 2.4 - RV32I Integer Computation1
3:43A few words on the Spectre and Meltdown vulnerabilities due to branch-prediction and speculative execution
🗩
3:43A few words on the Spectre and Meltdown vulnerabilities due to branch-prediction and speculative execution
🗩
3:43A few words on the Spectre and Meltdown vulnerabilities due to branch-prediction and speculative execution
🗩
8:19Chapter 2.4 continued2
8:19Chapter 2.4 continued2
8:19Chapter 2.4 continued2
10:08Point out the mistake in the book's description of the "call" pseudo-instruction3
🗩
10:08Point out the mistake in the book's description of the "call" pseudo-instruction3
🗩
10:08Point out the mistake in the book's description of the "call" pseudo-instruction3
🗩
13:30Chapter 2.4 continued, on RISC-V's simple arithmetic instructions4
13:30Chapter 2.4 continued, on RISC-V's simple arithmetic instructions4
13:30Chapter 2.4 continued, on RISC-V's simple arithmetic instructions4
16:47A few words of praise for the concision of the RISC-V base ISA
🖌
16:47A few words of praise for the concision of the RISC-V base ISA
🖌
16:47A few words of praise for the concision of the RISC-V base ISA
🖌
19:36Plug Casey's Meow hash,5,6 Mārtiņš's ports to ARMv87 and C without special hardware instructions,8 and Miblo's plea for a RISC-V port9 which miotatsu will happily contribute10 once RISC-V gets the proposed vector and crypto extensions11
19:36Plug Casey's Meow hash,5,6 Mārtiņš's ports to ARMv87 and C without special hardware instructions,8 and Miblo's plea for a RISC-V port9 which miotatsu will happily contribute10 once RISC-V gets the proposed vector and crypto extensions11
19:36Plug Casey's Meow hash,5,6 Mārtiņš's ports to ARMv87 and C without special hardware instructions,8 and Miblo's plea for a RISC-V port9 which miotatsu will happily contribute10 once RISC-V gets the proposed vector and crypto extensions11
37:01Chapter 2.4 continued, on RISC-V's comparison and branching instructions12
37:01Chapter 2.4 continued, on RISC-V's comparison and branching instructions12
37:01Chapter 2.4 continued, on RISC-V's comparison and branching instructions12
39:15Summarise the concept of auipc and jal to allow for 32-bit immediates
🖌
39:15Summarise the concept of auipc and jal to allow for 32-bit immediates
🖌
39:15Summarise the concept of auipc and jal to allow for 32-bit immediates
🖌
46:16Figure 2.4 - The registers of RV32I13,14
46:16Figure 2.4 - The registers of RV32I13,14
46:16Figure 2.4 - The registers of RV32I13,14
52:27Chapter 2.4 continued, on the differences between RISC-V and ARM15
52:27Chapter 2.4 continued, on the differences between RISC-V and ARM15
52:27Chapter 2.4 continued, on the differences between RISC-V and ARM15
55:36Chapter 2.4 Elaboration 1 - "Bit twiddling" instructions16
55:36Chapter 2.4 Elaboration 1 - "Bit twiddling" instructions16
55:36Chapter 2.4 Elaboration 1 - "Bit twiddling" instructions16
55:54Chapter 2.4 Elaboration 2 - xor enables a magic trick17
55:54Chapter 2.4 Elaboration 2 - xor enables a magic trick17
55:54Chapter 2.4 Elaboration 2 - xor enables a magic trick17
59:47XOR swap, thanks to algebraic reversibility
🖌
59:47XOR swap, thanks to algebraic reversibility
🖌
59:47XOR swap, thanks to algebraic reversibility
🖌
1:19:12Chapter 2.4 Elaboration 2 continued18
1:19:12Chapter 2.4 Elaboration 2 continued18
1:19:12Chapter 2.4 Elaboration 2 continued18
1:21:54XOR linked list, again thanks to algebraic reversibility19,20
🖌
1:21:54XOR linked list, again thanks to algebraic reversibility19,20
🖌
1:21:54XOR linked list, again thanks to algebraic reversibility19,20
🖌
1:43:36Chapter 2.5 - RV32I Loads and Stores21
1:43:36Chapter 2.5 - RV32I Loads and Stores21
1:43:36Chapter 2.5 - RV32I Loads and Stores21
1:46:23Recommend Fabian's videos on CPU µArch22
1:46:23Recommend Fabian's videos on CPU µArch22
1:46:23Recommend Fabian's videos on CPU µArch22
1:50:55Chapter 2.5 continued, on differences in load / store instruction between RISC-V and MIPS and ARM23
1:50:55Chapter 2.5 continued, on differences in load / store instruction between RISC-V and MIPS and ARM23
1:50:55Chapter 2.5 continued, on differences in load / store instruction between RISC-V and MIPS and ARM23
1:51:52Recommend Robert Baruch's LMARV-1 video series24
1:51:52Recommend Robert Baruch's LMARV-1 video series24
1:51:52Recommend Robert Baruch's LMARV-1 video series24
1:53:23Chapter 2.5 Elaboration - Endianness25
1:53:23Chapter 2.5 Elaboration - Endianness25
1:53:23Chapter 2.5 Elaboration - Endianness25
1:55:27Endianness from Gulliver's Travels26
1:55:27Endianness from Gulliver's Travels26
1:55:27Endianness from Gulliver's Travels26
1:59:19That's the end of 2.5
🗩
1:59:19That's the end of 2.5
🗩
1:59:19That's the end of 2.5
🗩
1:59:59krish2nasa I missed this episode
🗪
1:59:59krish2nasa I missed this episode
🗪
1:59:59krish2nasa I missed this episode
🗪
2:02:06Endianness in practice in pcalc27
2:02:06Endianness in practice in pcalc27
2:02:06Endianness in practice in pcalc27
2:02:18krish2nasa I have a question for you: Is hamming distance implemented in RISC-V ISA and the compiler for more energy / code efficiency?
🗪
2:02:18krish2nasa I have a question for you: Is hamming distance implemented in RISC-V ISA and the compiler for more energy / code efficiency?
🗪
2:02:18krish2nasa I have a question for you: Is hamming distance implemented in RISC-V ISA and the compiler for more energy / code efficiency?
🗪
2:05:31Endianness in practice in pcalc continued,28 including connecting to an X11 server using the ~/.Xauthority file
2:05:31Endianness in practice in pcalc continued,28 including connecting to an X11 server using the ~/.Xauthority file
2:05:31Endianness in practice in pcalc continued,28 including connecting to an X11 server using the ~/.Xauthority file
2:12:05End the episode there
🗩
2:12:05End the episode there
🗩
2:12:05End the episode there
🗩