castano, I don't get why IHVs hide their tools within layers of security and identity validation steps, that then don't work as intended and prevent developers from using those tools. What are they trying to protect?
On the other hand, AMD's approach is so refreshing.
Add comment