Reboot System, Destruction Averted
Reboot System, Destruction Averted

It is generally accepted that POST (or Power-On Self-Test) is basically what takes place right after you power-on a system or device. In the 1990s, as part of POST, the BIOS would test the memory. The more memory you had, the longer the test would take. Think a few seconds. Also, POST happens everytime you re-boot the system.

Read More
Introduction to MegaRAC® Remote and BMC Management
Introduction to MegaRAC® Remote and BMC Management

One of the brands in the AMI product family that may not get as much attention as BIOS is the MegaRAC brand, which is the home for all of the remote and baseboard management controller (BMC) management technologies that AMI has developed and marketed over the years. Today’s Tech Blog Post will take a closer look at the products and history of MegaRAC, as well as some of the key strengths and opportunities we see for this product line.

Read More
What is a Plugfest?
What is a Plugfest?

If you keep up with AMI, other IBVs and technology companies, you may have heard the term "plugfest" popping up every so often. AMI happens to plan, host, sponsor and attend various plugfests throughout the year and you may be wondering, what is a plugfest? Today we cover what a plugfest is and what kinds of things happen at these plugfest events!

Read More
From the AMI Archives: AMIDiag® Hardware Diagnostic Software Suite
From the AMI Archives: AMIDiag® Hardware Diagnostic Software Suite

For today's post we have dug deep into our extensive AMI Archives to look more closely at AMIDiag, one of the many AMI products built on the same professional-grade, lab-tested diagnostic tools utilized daily by our engineers and still in use today!

Read More
BIOS/UEFI Setup: Text-based or Graphical?
BIOS/UEFI Setup: Text-based or Graphical?

I was recently asked, "What is your biggest BIOS (UEFI) innovation?" From a techie point-of-view, I would have to say graphical setup in our client BIOS offering, Aptio V... and not just any graphical setup, but Aptio ESA. (Extensible Setup Architecture).

Read More
Blockchain 101
Blockchain 101

There is a common buzzword that you may find yourself hearing more and more these days in news, blogs, online articles and the like, causing you to wonder to yourself: what exactly is "blockchain", or blockchain technology? In today's Tech Blog post, we will try to give a (very) brief and non-technical introduction to this fascinating subject.

Read More
From the AMI Archives: Panic Like It's 1999
From the AMI Archives: Panic Like It's 1999

Think back to the last few years of the 1990s and how there was widespread confusion and uncertainty with respect to how computers and industrial systems would handle the changing of the year to a new century in 2000. American Megatrends was among the many computer and software services companies that were spurred into action and the formulation of an appropriate response to this potential threat. For today's post we have dug deep into our extensive AMI Archives for a look at another product from an interesting vantage point in recent history.

Read More
If UEFI BIOS Were a Part of Your Body, Which Part Would It Be?
If UEFI BIOS Were a Part of Your Body, Which Part Would It Be?

Every so often we receive emails from people who have computers that suddenly display the American Megatrends logo. They think that they caught some sort of ransomware or computer virus. They visit our website and send us an email:

Read More
Happy 4th of July: AMI at AJC Peachtree Road Race
Happy 4th of July: AMI at AJC Peachtree Road Race

Every year, more than 60,000 runners participate in the Atlanta AJC Peachtree Road Race. Set for the 4th of July this year, some AMI runners will be participating in the annual 10k!

Read More
Be Proactive About Firmware Security!
Be Proactive About Firmware Security!

Firmware is everywhere; in every system and nearly every technology device we use on a daily basis - clearest example would be computers/laptops. Firmware is also highly vulnerable to malware attacks, where hackers corrupt the firmware to create persistent problems for the firmware despite "fixing" the initial issue. Firmware attacks are so common that people constantly research ways to prevent these kinds of attacks from happening, with Google search results for "firmware hack" and "firmware security" increasing year by year.

Read More

 

TOP