{"version":"1.0","provider_name":"AMI","provider_url":"https:\/\/www.ami.com","title":"An Efficient Approach Toward System Development Requires a Commitment to Best Practices","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"snZS3sdx2p\"><a href=\"https:\/\/www.ami.com\/resource\/an-efficient-approach-toward-system-development-requires-a-commitment-to-best-practices\/\">An Efficient Approach Toward System Development Requires a Commitment to Best Practices<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ami.com\/resource\/an-efficient-approach-toward-system-development-requires-a-commitment-to-best-practices\/embed\/#?secret=snZS3sdx2p\" width=\"600\" height=\"338\" title=\"&#8220;An Efficient Approach Toward System Development Requires a Commitment to Best Practices&#8221; &#8212; AMI\" data-secret=\"snZS3sdx2p\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ami.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.ami.com\/wp-content\/uploads\/2024\/07\/image.png","thumbnail_width":1280,"thumbnail_height":853,"description":"Ensuring best practices in the compute system supply chain is critical.\u00a0 This effort becomes challenging when managing multiple code streams and the certification keys that enable them. One area of concern that has been the reoccurance of firmware test keys found in production systems.\u00a0 These test keys support AMI\u2019s approach to increase efficiency of firmware [&hellip;]"}