Whole-known-network
<p><span class="h-card" translate="no"><a href="https://ioc.exchange/@azonenberg" class="u-url mention">@<span>azonenberg</span></a></span> this text doesn't appear to say anything about readback</p>
<p>Ethernet nerds: Does this section from 802.3-2022 actually require that you be able to read the currently negotiated speed and duplex state back from this register, or only write to force a specific speed?</p><p>Every PHY I've ever seen except the VSC8512 lets you read back the actual operating conditions, but reading the spec it seems that there's not actually a mandate that this capability be there.</p><p>The register is defined as readable but it's not well defined whether it reads the configured value or the negotiated value.</p>
<p><span class="h-card" translate="no"><a href="https://mastodon.social/@aleksorsist" class="u-url mention">@<span>aleksorsist</span></a></span> <a href="https://www.youtube.com/shorts/dsIMu6YqPCw" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="">youtube.com/shorts/dsIMu6YqPCw</span><span class="invisible"></span></a></p>
<p>I'm probably not the first to say it, but lockpicking do be kind of horny</p>
<p><span class="h-card" translate="no"><a href="https://mastodon.online/@tealeg" class="u-url mention">@<span>tealeg</span></a></span> I'm listening to "The Analyst Inside Cricket" talking about it right now! Definitely the best cricket podcast I've heard. There's always some new insight.</p>
<p><span class="h-card" translate="no"><a href="https://mstdn.social/@marick" class="u-url mention">@<span>marick</span></a></span> I saw Cliff Stoll talk about the Cuckoo's egg story to a rapt audience of about 500 people at Los Alamos. It was probably the single greatest "tech talk" I've ever witnessed--and I must say it made one hell of an impression on me as a lowly undergraduate intern. I still prize the signed book I got.</p>
<p>I bought a Klein Bottle¹ from Cliff Stoll, famous among oldsters for an early example of tracking down a hacker:</p><p>"One day in 1986 his supervisor asked him to resolve an accounting error of 75 cents in the computer usage accounts. Stoll traced the error to an unauthorized user who had apparently used nine seconds of computer time and not paid for it. Stoll eventually realized that the unauthorized user was a hacker who had acquired superuser access...”</p>
<p>girl who is flirting with me in between sending me videos of exploding drones where the delay between the light and the sound keeps getting lower and lower</p>
<p><span class="h-card" translate="no"><a href="https://functional.cafe/@edavies" class="u-url mention">@<span>edavies</span></a></span> ah, that's a substantive point, thanks for clarifying!</p>