Harnessing the UEFI Shell

Harnessing the UEFI Shell

Author: Michael Rothman

Publisher: Walter de Gruyter GmbH & Co KG

Published: 2017

Total Pages: 341

ISBN-13: 1501505815

DOWNLOAD EBOOK

Focusing on the use of the UEFI Shell and its recently released formal specification, this book unlocks a wide range of usage models which can help people best utilize the shell solutions. This text also expands on the obvious intended utilization of the shell and explains how it can be used in various areas such as security, networking, configuration, and other anticipated uses such as manufacturing, diagnostics, etc. Among other topics, Harnessing the UEFI Shell demonstrates how to write Shell scripts, how to write a Shell application, how to use provisioning options and more. Since the Shell is also a UEFI component, the book will make clear how the two things interoperate and how both Shell developers as well as UEFI developers can dip into the other's field to further expand the power of their solutions. Harnessing the UEFI Shell is authored by the three chairs of the UEFI working sub-teams, Michael Rothman (Intel, chair of the UEFI Configuration and UEFI Shell sub-teams), Vincent Zimmer (Intel, chair of the UEFI networking sub-team and security sub-team), and Tim Lewis (Insyde Software, chair of the UEFI security sub-team). This book is perfect for any OEMs that ship UEFI-based solutions (which is all of the MNCs such as IBM, Dell, HP, Apple, etc.), software developers who are focused on delivering solutions targeted to manufacturing, diagnostics, hobbyists, or stand-alone kiosk environments.


Quick Boot

Quick Boot

Author: Pete Dice

Publisher: Walter de Gruyter GmbH & Co KG

Published: 2017

Total Pages: 296

ISBN-13: 1501506722

DOWNLOAD EBOOK

Quick Boot is designed to give developers a background in the basic architecture and details of a typical boot sequence. More specifically, this book describes the basic initialization sequence that allows developers the freedom to boot an OS without a fully featured system BIOS. Various specifications provide the basics of both the code bases and the standards. This book also provides insights into optimization techniques for more advanced developers. With proper background information, the required specifications on hand, and diligence, many developers can create quality boot solutions using this text. Pete Dice is Engineering Director of Verifone, where he manages OS Engineering teams in Dublin, Ireland and Riga Latvia. Dice successfully launched Intel(R) Quark(TM), Intel's first generation SoC as well as invented the Intel(R) Galileo(TM) development board and developed a freemium SW strategy to scale Intel IoT gateway features across product lines. He is also credited with architecting the "Moon Island" software stack and business model.


Beyond BIOS

Beyond BIOS

Author: Vincent Zimmer

Publisher: Walter de Gruyter GmbH & Co KG

Published: 2017

Total Pages: 319

ISBN-13: 1501505831

DOWNLOAD EBOOK

This book provides an overview of modern boot firmware, including the Unified Extensible Firmware Interface (UEFI) and its associated EFI Developer Kit II (EDKII) firmware. The authors have each made significant contributions to developments in these areas. The reader will learn to use the latest developments in UEFI on modern hardware, including open source firmware and open hardware designs. The book begins with an exploration of interfaces exposed to higher-level software and operating systems, and commences to the left of the boot timeline, describing the flow of typical systems, beginning with the machine restart event. Software engineers working with UEFI will benefit greatly from this book, while specific sections of the book address topics relevant for a general audience: system architects, pre-operating-system application developers, operating system vendors (loader, kernel), independent hardware vendors (such as for plug-in adapters), and developers of end-user applications. As a secondary audience, project technical leaders or managers may be interested in this book to get a feel for what their engineers are doing. The reader will find: An overview of UEFI and underlying Platform Initialization (PI) specifications How to create UEFI applications and drivers Workflow to design the firmware solution for a modern platform Advanced usages of UEFI firmware for security and manageability


Beyond BIOS

Beyond BIOS

Author: Vincent Zimmer

Publisher: Walter de Gruyter GmbH & Co KG

Published: 2017

Total Pages: 324

ISBN-13: 1501505696

DOWNLOAD EBOOK

Chapter 4 - Protocols You Should Know ; EFI OS Loaders ; Device Path and Image Information of the OS Loader ; Accessing Files in the Device Path of the OS Loader ; Finding the OS Partition ; Getting the Current System Configuration ; Getting the Current Memory Map.


Harnessing the UEFI Shell

Harnessing the UEFI Shell

Author: M. Rothman

Publisher:

Published: 2010-01-26

Total Pages: 413

ISBN-13: 9781934053140

DOWNLOAD EBOOK

In Harnessing the UEFI Shell the authors describe the features and capabilities of the UEFI Shell, with detailed descriptions of how to use it, including many real life examples including specialized memory tests for chip and board validation and manufacturing validation tests. Written specifically for the practicing software engineer, this book enables the reader to quickly become proficient in using and exploiting the UEFI Shell.


Advanced Technologies in Robotics and Intelligent Systems

Advanced Technologies in Robotics and Intelligent Systems

Author: Sergey Yu. Misyurin

Publisher: Springer Nature

Published: 2020-01-01

Total Pages: 419

ISBN-13: 3030334910

DOWNLOAD EBOOK

This volume gathers the latest advances, innovations, and applications in the field of intelligent systems such as robots, cyber-physical and embedded systems, as presented by leading international researchers and engineers at the International Conference on Intelligent Technologies in Robotics (ITR), held in Moscow, Russia on October 21-23, 2019. It covers highly diverse topics, including robotics, design and machining, control and dynamics, bio-inspired systems, Internet of Thing, Big Data, RFID technology, blockchain, trusted software, cyber-physical systems (CFS) security, development of CFS in manufacturing, protection of information in CFS, cybersecurity of CFS. The contributions, which were selected by means of a rigorous international peer-review process, highlight numerous exciting ideas that will spur novel research directions and foster multidisciplinary collaboration among different specialists, demonstrating that intelligent systems will drive the technological and societal change in the coming decades.


Implementing IBM InfoSphere BigInsights on IBM System x

Implementing IBM InfoSphere BigInsights on IBM System x

Author: Mike Ebbers

Publisher: IBM Redbooks

Published: 2013-06-12

Total Pages: 224

ISBN-13: 0738438286

DOWNLOAD EBOOK

As world activities become more integrated, the rate of data growth has been increasing exponentially. And as a result of this data explosion, current data management methods can become inadequate. People are using the term big data (sometimes referred to as Big Data) to describe this latest industry trend. IBM® is preparing the next generation of technology to meet these data management challenges. To provide the capability of incorporating big data sources and analytics of these sources, IBM developed a stream-computing product that is based on the open source computing framework Apache Hadoop. Each product in the framework provides unique capabilities to the data management environment, and further enhances the value of your data warehouse investment. In this IBM Redbooks® publication, we describe the need for big data in an organization. We then introduce IBM InfoSphere® BigInsightsTM and explain how it differs from standard Hadoop. BigInsights provides a packaged Hadoop distribution, a greatly simplified installation of Hadoop and corresponding open source tools for application development, data movement, and cluster management. BigInsights also brings more options for data security, and as a component of the IBM big data platform, it provides potential integration points with the other components of the platform. A new chapter has been added to this edition. Chapter 11 describes IBM Platform Symphony®, which is a new scheduling product that works with IBM Insights, bringing low-latency scheduling and multi-tenancy to IBM InfoSphere BigInsights. The book is designed for clients, consultants, and other technical professionals.


Tomorrow's Learning: Involving Everyone. Learning with and about Technologies and Computing

Tomorrow's Learning: Involving Everyone. Learning with and about Technologies and Computing

Author: Arthur Tatnall

Publisher: Springer

Published: 2018-01-25

Total Pages: 688

ISBN-13: 3319743104

DOWNLOAD EBOOK

This book constitutes the refereed post-conference proceedings of the 11th IFIP TC 3 World Conference on Computers in Education, WCCE 2017, held in Dublin, Ireland, in July 2017. The 57 revised full papers and 10 short papers were carefully reviewed and selected from 116 submissions during two rounds of reviewing and improvement. The papers are organized in the following topical sections: futures of technology for learning and education; innovative practices with learning technologies; and computer science education and its future focus and development. Also included is "The Dublin Declaration" which identifies key aspects of innovation, development successes, concerns and interests in relation to ICT and education.


Zero Days, Thousands of Nights

Zero Days, Thousands of Nights

Author: Lillian Ablon

Publisher: Rand Corporation

Published: 2017-03-09

Total Pages: 133

ISBN-13: 083309761X

DOWNLOAD EBOOK

Zero-day vulnerabilities--software vulnerabilities for which no patch or fix has been publicly released-- and their exploits are useful in cyber operations--whether by criminals, militaries, or governments--as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that could augment conventional proxy examples and expert opinion, complement current efforts to create a framework for deciding whether to disclose or retain a cache of zero-day vulnerabilities and exploits, inform ongoing policy debates regarding stockpiling and vulnerability disclosure, and add extra context for those examining the implications and resulting liability of attacks and data breaches for U.S. consumers, companies, insurers, and for the civil justice system broadly. The authors provide insights about the zero-day vulnerability research and exploit development industry; give information on what proportion of zero-day vulnerabilities are alive (undisclosed), dead (known), or somewhere in between; and establish some baseline metrics regarding the average lifespan of zero-day vulnerabilities, the likelihood of another party discovering a vulnerability within a given time period, and the time and costs involved in developing an exploit for a zero-day vulnerability"--Publisher's description.