AMD Ryzen™ + Aptio®V

AMD Ryzen™ + Aptio®V

Today, AMD announced the launch of their AMD Ryzen™ Threadripper™ Processors. AMI Aptio®V UEFI firmware is the reference BIOS on the AMD Ryzen™ Threadripper™ Processors and AMD EPYC™ 7000 Series data center processors and platforms. Here are some of our...
Urbanizing Our Way to Smarter Cities

Urbanizing Our Way to Smarter Cities

Previously we covered the future of smarter homes through automation and IoT. But on a larger scale, another topic comes to mind: smart cities. With increasing levels of urbanization and influx of people moving to urban areas, the concept of smart cities has become...
What is BIOS RoT?

What is BIOS RoT?

BIOS RoT is not about a piece of rotting code. It’s about trust. RoT or Root of Trust is based on the idea that you trust something that is part of something else that is already trusted. An example of this would be an infant girl having absolute trust in her...
Reboot System, Destruction Averted

Reboot System, Destruction Averted

It is generally accepted that POST (or Power-On Self-Test) is basically what takes place right after you power-on a system or device. In the 1990s, as part of POST, the BIOS would test the memory. The more memory you had, the longer the test would take. Think a few...
What is a Plugfest?

What is a Plugfest?

If you keep up with AMI, other IBVs and technology companies, you may have heard the term “plugfest” popping up every so often. AMI happens to plan, host, sponsor and attend various plugfests throughout the year and you may be wondering, what is a...
BIOS/UEFI Setup: Text-based or Graphical?

BIOS/UEFI Setup: Text-based or Graphical?

I was recently asked, “What is your biggest BIOS (UEFI) innovation?” From a techie point-of-view, I would have to say graphical setup in our client BIOS offering, AptioV… and not just any graphical setup, but Aptio ESA. (Extensible Setup...
Be Proactive About Firmware Security!

Be Proactive About Firmware Security!

Firmware is everywhere; in every system and nearly every technology device we use on a daily basis – clearest example would be computers/laptops. Firmware is also highly vulnerable to malware attacks, where hackers corrupt the firmware to create persistent...