Navigating the Meltdown and Spectre Attacks

Navigating the Meltdown and Spectre Attacks

2018 is off to a vulnerable start in the technology world. Earlier this week, news circulated that two major security vulnerabilities, named Meltdown and Spectre, were uncovered by security researchers in systems that use processing chips from major vendors. The...
AMI Response for Intel® Management Engine Security Bulletin

AMI Response for Intel® Management Engine Security Bulletin

AMI response for the INTEL-SA-00086 Security Bulletin for Intel® Management Engine AMI is committed to providing the highest level of security in our firmware offerings. With our BIOS and BMC firmware offerings deployed on a majority of computing systems across the...
AI Pets: Making Their Way to Your Home?

AI Pets: Making Their Way to Your Home?

You’ve definitely heard us talking about artificial intelligence before. AI technology is hot these days, with many companies turning to AI for more advanced and automated technology. For example, Sony has had a long history of innovation. In 1999, Sony released...
What is BitLocker?

What is BitLocker?

BitLocker is a full disk encryption capability developed by Microsoft® that encrypts hard drives within the operating system for data protection. The main purpose of BitLocker is to mitigate the risks of data being stolen and/or accessed by unauthorized sources,...
Innovation Week is Here!

Innovation Week is Here!

Every year during the week before Thanksgiving, AMI’s employees are hustling and bustling throughout the place. Employees are preparing presentations, setting up demos and of course, getting their stomachs ready for a feast! So what’s exactly happening at...
Blue Screen of Death (BSOD) or Splash Screen?

Blue Screen of Death (BSOD) or Splash Screen?

You have probably experienced this at least once in your lifetime. You’re casually using your computer, playing games, watching too much Netflix, surfing the internet to read the latest Buzzfeed articles and/or spending copious amounts of money online shopping....
A Bad Case of Bluebug: Mitigating Risks of Bluetooth Attacks

A Bad Case of Bluebug: Mitigating Risks of Bluetooth Attacks

Bluetooth is a technology that has been around for awhile now. It uses high-speed, short-range radio frequency communication so devices, such as laptops, keyboards, cell phones, headsets, speakers and smart watches, can create a network and transfer data between the...
Support for Block SID PPI

Support for Block SID PPI

Recently, AMI added support for the Block SID Physical Presence Interface (PPI) specification for NVMe drives running Aptio® V UEFI firmware. The Block SID PPI specification is defined in the Trusted Computing Group’s (TCG) Storage Opal Integration Guidelines,...