Unified Extensible Firmware Interface (UEFI)
Unified Extensible Firmware Interface (UEFI) is a specification for a software program that connects a computer's firmware to its operating system (OS). UEFI is expected to eventually replace BIOS.
Like BIOS, UEFI is installed at the time of manufacturing and is the first program that runs when a computer is turned on. It checks to see what hardware components the computing device has, wakes the components up and hands them over to the operating system. The new specification addresses several limitations of BIOS, including restrictions on hard disk partition size and the amount of time BIOS takes to perform its tasks.
Because UEFI is programmable, original equipment manufacturer (OEM) developers can add applications and drivers, allowing UEFI to function as a lightweight operating system.
The Unified Extensible Firmware Interface is managed by a group of chipset, hardware, system, firmware, and operating system vendors called the UEFI Forum.The specification is most often pronounced by naming the letters U-E-F-I.
Continue reading about UEFI:
Andrew Regenscheid, a mathematician with the computer security division of the National Institute of Standards and Technology (NIST), is concerned about the security issues UEFI presents.
Sebastian Anthony demystifies the long-overdue BIOS replacement.
Eric Parizo explains how NIST guidelines seek to minimize risk of BIOS attacks.
Microsoft's Steven Sinofsky describes how UEFI enables secure boot.
Join the conversation
4 comments
-ADS BY GOOGLE
File Extensions and File Formats
SearchCompliance
risk management
Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.
compliance as a service (CaaS)
Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...
data protection impact assessment (DPIA)
A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...
SearchSecurity
Port Scan
A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...
DMZ (networking)
In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...
quantum supremacy
Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...
SearchHealthIT
medical practice management (MPM) software
Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...
Regional Health Information Organization (RHIO)
A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share ...
remote patient monitoring (RPM)
Remote patient monitoring (RPM) is a subcategory of homecare telehealth that allows patients to use mobile medical devices or ...
SearchDisasterRecovery
business continuity plan (BCP)
A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...
disaster recovery team
A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...
cloud insurance
Cloud insurance is any type of financial or data protection obtained by a cloud service provider.
SearchStorage
iSCSI (Internet Small Computer System Interface)
ISCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over ...
DRAM (dynamic random access memory)
Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...
RAID 10 (RAID 1+0)
RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.