Adam Leventhal
๐ค SpeakerAppearances Over Time
Podcast Appearances
I don't know.
I know. Those air quotes are just like screaming.
I know. Those air quotes are just like screaming.
But that is the marketing of it, right? That is the ostensible value add of Redfish.
But that is the marketing of it, right? That is the ostensible value add of Redfish.
They're helping by not actively sabotaging us, is what it sounds like.
They're helping by not actively sabotaging us, is what it sounds like.
Robert, can you talk about what AGESA is and what we needed to do in that domain?
Robert, can you talk about what AGESA is and what we needed to do in that domain?
So how on earth did you do like, what was it just back to the code and reading more? Like it just, uh,
So how on earth did you do like, what was it just back to the code and reading more? Like it just, uh,
Were the iteration loops on this just like, you know, 5, 10, 20 minutes?
Were the iteration loops on this just like, you know, 5, 10, 20 minutes?
I'm factoring in the trip to the therapist and then the drive back home.
I'm factoring in the trip to the therapist and then the drive back home.
Uh, only Robert was describing a bit of it to me, uh, maybe a week or two ago, as I heard a lot of T6 buzz, but for, uh, T6 is the, the Nick Silicon that we're using in the next generation server, right?
Uh, only Robert was describing a bit of it to me, uh, maybe a week or two ago, as I heard a lot of T6 buzz, but for, uh, T6 is the, the Nick Silicon that we're using in the next generation server, right?
And so the way that normal folks would program their NIC is like having a little like a Norflash or whatever kind of strapped to it that had this configuration information and it loaded up autonomously. Is that...
And so the way that normal folks would program their NIC is like having a little like a Norflash or whatever kind of strapped to it that had this configuration information and it loaded up autonomously. Is that...
Right. And as you were saying, doing this every time allows us to put known, attested, valid bits there as opposed to having this question of what's living persistently and did some nefarious actor manage to wedge some bad bits down there?