Author: | Jim Drew (guest: search) | |
Date: | Tue, May 15th, 2012 @ 01:01 ( . ) |
Keep in mind that the custom copier just calls routines from the core code. Bounty Bob just requires half tracked writes that are interleaved so that wide head destroys areas not used. There was no real magic to this. Had they used more than 50% of the track (in each half track), it would have not been possible to use a CBM drive to write the data back. |
--- 0 Users Online --- 0 Recent Unique Posters |