Adam Leventhal
👤 PersonAppearances Over Time
Podcast Appearances
But that is the marketing of it, right? That is the ostensible value add of Redfish.
But that is the marketing of it, right? That is the ostensible value add of Redfish.
They're helping by not actively sabotaging us, is what it sounds like.
They're helping by not actively sabotaging us, is what it sounds like.
Robert, can you talk about what AGESA is and what we needed to do in that domain?
Robert, can you talk about what AGESA is and what we needed to do in that domain?
So how on earth did you do like, what was it just back to the code and reading more? Like it just, uh,
So how on earth did you do like, what was it just back to the code and reading more? Like it just, uh,
Were the iteration loops on this just like, you know, 5, 10, 20 minutes?
Were the iteration loops on this just like, you know, 5, 10, 20 minutes?
I'm factoring in the trip to the therapist and then the drive back home.
I'm factoring in the trip to the therapist and then the drive back home.
Uh, only Robert was describing a bit of it to me, uh, maybe a week or two ago, as I heard a lot of T6 buzz, but for, uh, T6 is the, the Nick Silicon that we're using in the next generation server, right?
Uh, only Robert was describing a bit of it to me, uh, maybe a week or two ago, as I heard a lot of T6 buzz, but for, uh, T6 is the, the Nick Silicon that we're using in the next generation server, right?
And so the way that normal folks would program their NIC is like having a little like a Norflash or whatever kind of strapped to it that had this configuration information and it loaded up autonomously. Is that...
And so the way that normal folks would program their NIC is like having a little like a Norflash or whatever kind of strapped to it that had this configuration information and it loaded up autonomously. Is that...
Right. And as you were saying, doing this every time allows us to put known, attested, valid bits there as opposed to having this question of what's living persistently and did some nefarious actor manage to wedge some bad bits down there?
Right. And as you were saying, doing this every time allows us to put known, attested, valid bits there as opposed to having this question of what's living persistently and did some nefarious actor manage to wedge some bad bits down there?
Is this about figuring out analog kind of coefficients and constant values that make things flow with minimal errors?
Is this about figuring out analog kind of coefficients and constant values that make things flow with minimal errors?