Sequoia

Latest

  • Cray Computing

    Cray is building a supercomputer to manage the US' nuclear stockpile

    by 
    Rachel England
    Rachel England
    08.13.2019

    Supercomputers are used for everything from mapping weather patterns to developing medicine –- now, they're looking after the nation's nuclear stockpile. The US Department of Energy (DOE) and National Nuclear Security Administration (NNSA) have announced they've signed a contract with Cray Computing for the NNSA's first exascale supercomputer, "El Capitan."

  • Toyota

    Toyota adds Android Auto and Apple CarPlay to its trucks and SUVs

    by 
    Jon Fingas
    Jon Fingas
    02.07.2019

    Toyota dragged its heels on smartphone integration for years, but it's making up for that in style. The automaker is introducing Android Auto and Apple CarPlay support to its 2020 trucks and SUVs, including the Tacoma (above), Tundra, 4Runner and Sequoia. Yes, you too can navigate with Google Maps or stream Apple Music while you're off-roading. They also support Alexa in case you'd like to bark commands to Amazon's voice assistant.

  • Sequoia supercomputer breaks simulation speed record, 41 times over

    by 
    Jon Fingas
    Jon Fingas
    04.30.2013

    While we've seen supercomputers break records before, rarely have we seen the barrier smashed quite so thoroughly as by Lawrence Livermore National Laboratory's Sequoia supercomputer. Researchers at both LLNL and Rensselaer Polytechnic Institute have used planet-scale calculations on the Blue Gene/Q-based cluster to set an all-time simulation speed record of 504 billion events per second -- a staggering 41 times better than the 2009 record of 12.2 billion. The partnership also set a record for parallelism, too, by making the supercomputer's 1.97 million cores juggle 7.86 million tasks at once. If there's a catch to that blistering performance, it's not knowing if Sequoia reached its full potential. LLNL and RPI conducted their speed run during an integration phase, when Sequoia could be used for public experiments; now that it's running classified nuclear simulations, we can only guess at what's possible.

  • Stanford seizes 1 million processing cores to study supersonic noise

    by 
    Zachary Lutz
    Zachary Lutz
    01.29.2013

    In short order, the Sequoia supercomputer and its 1.57 million processing cores will transition to a life of top-secret analysis at the National Nuclear Security Administration, but until that day comes, researchers are currently working to ensure its seamless operation. Most recently, a team from Stanford took the helm of Sequoia to run computational fluid dynamics simulations -- a process that requires a finely tuned balance of computation, memory and communication components -- in order to better understand engine noise from supersonic jets. As an encouraging sign, the team was able to successfully push the CFD simulation beyond 1 million cores, which is a first of its kind and bodes very well for the scalability of the system. This and other tests are currently being performed on Sequoia as part of its "shakeout" period, which allows its caretakers to better understand the capabilities of the IBM BlueGene/Q computer. Should all go well, Sequoia is scheduled to begin a life of government work in March. In the meantime, you'll find a couple views of the setup after the break.

  • Google brings five California-based US National Parks into Street View

    by 
    Darren Murph
    Darren Murph
    07.14.2012

    Taking a virtual tour of the Amazon or Antarctica? Totally doable with Street View. But some of America's finest National Parks? Yeah, those have been a long time coming. Today, Google announced the inclusion of five California-based US National Parks in Street View, and for those who haven't had the opportunity (of a lifetime) to visit, they're absolutely worth a look. Starting at the top, Redwoods National Park provides a street level look at some of the world's most mysterious trees, while those looking for even more Treebeard-type characters can point their browser to Sequoia & Kings Canyon National Parks. Naturally, Yosemite and Joshua Tree (shown above) are included as well, and the 360-degree views Google's cadre of motorcars managed to capture really do a fairly astounding job at capturing the splendor. The toughest part? Knowing which one to traverse first.

  • Sequoia e-voting machine hacked to play Pac-Man (video)

    by 
    Vlad Savov
    Vlad Savov
    08.20.2010

    Oh Sequoia, why are you so changeable? The thoroughly hacked electronic voting machine is back with another ignoble showing, courtesy of researchers from the universities of Michigan and, of course, Princeton. Picking up an AVC-Edge box that had seen live duty in collecting votes for the 2008 Virginia primaries, they quickly and all too easily managed to supplant the embedded psOS+ software with DOS, which was promptly followed by the installation of Pac-Man. Given that the underlying circuit boards were populated with such luminaries as a 486 processor and 32 megabytes of RAM, we find this a most appropriate match of hardware and software. As to that whole voting security thing, maybe next time we should let people do it with their BlackBerrys, eh? See the Pac do his thing on video after the break.

  • Hang your head, Sequoia e-voting machine; you've been hacked again

    by 
    Tim Stevens
    Tim Stevens
    08.13.2009

    Oh, Princeton University, won't you leave the poor electronic voting machines alone? Haven't they suffered enough without you forming teams with researchers from the University of California, San Diego and the University of Michigan to spread their private moments even further asunder? That group of brainiacs came together to devise a new, even easier hack that allows someone with no special access to take complete control of a Sequoia AVC Advantage voting machine -- an example of which the team purchased legally at a government auction. The machine does not allow modifications to its ROM (because it has an O in the middle), but the team was able to use a technique called return-oriented programming to modify how the machine executes existing code, taking the bits they want and, ultimately, devising a way to re-program its behavior by simply inserting a cartridge into a slot -- presumably after blowing on it for good luck. The hack only works until the machine is powered off, but the attack even foils that, intercepting the switch signal and making the system only appear to power down. Today's top tip for electronic voting polling stations: unplug your boxes overnight. [Via Digg]

  • IBM's Sequoia: 20x faster than the world's fastest supercomputer

    by 
    Thomas Ricker
    Thomas Ricker
    02.03.2009

    Roadrunner? Pfff, your chart-topping 1.105 petaflops are laughable. IBM just announced its 20-freaking-petaflop Sequoia supercomputer due for delivery by 2012. While supercomputer speeds have steadily increased year-over-year, a near 20x jump in calculations per second since the last world ranking is unheard of, even if the system has yet to come on-line. Slated to spend its life simulating nuclear explosions, Sequoia will use 45-nm (PowerPC, presumably) processors with 16 cores per chip for as many as 4,096 processors per rack. That's a total of 1.6 million cores assisted by 1.6 petabytes of memory. Perhaps all this processing power might help IBM understand the futility of its Lotus Notes strategy.

  • Princeton publishes how-to guide for hacking Sequoia e-voting machines

    by 
    Tim Stevens
    Tim Stevens
    10.24.2008

    If you're American, it's nearly time to do your civic duty and pick the lesser of two evils for the greater good... and then to wonder if that vote actually got counted. With Diebold admitting its own machines are utterly insecure, competitor Sequoia is now under the microscope and, after a little quality time with the company's machines, Princeton researchers have filed a 158 page report on the ease of replacing their ROMs and winning yourself an election. Okay, we know what you're thinking: "Hacking hardware isn't exactly easy when the computer is in a locked box." Amazingly, it is. A researcher was able to bypass the physical security mechanisms in 13 seconds, despite never having picked a lock before. Now you're thinking: "But you'd need to do that on hundreds of them!" Not so; once infected that malicious code can spread itself to others, and, with no paper trail and an easily bypassed internal audit system, you're well on your way to whatever dark corner of Washington, D.C. you care to occupy![Via Ars Technica]

  • Sequoia takes aim at Princeton profs over e-voting analysis plans

    by 
    Donald Melanson
    Donald Melanson
    03.19.2008

    Princeton professors Ed Felten and Andrew Appel are certainly no strangers to drawing controversy, and it now looks like they've stirred the pot yet again, this time drawing the ire of Sequoia Voting Systems as a result of their plans to conduct some further e-voting analysis. At the heart of this latest brouhaha is plans that New Jersey election officials reportedly had to send some Sequoia Advantage e-voting machines to the profs for analysis, which Sequoia is unsurprisingly not so keen about. In fact, they've gone so far as to send Felten an email saying that such a plan violates Sequoia's licensing agreement for use of the systems, and that they've "retained counsel to stop any infringement of our intellectual properties, including any non-compliant analysis." No word on the professors' future plans just yet but, given their past history, we suspect they won't be backing down quite that easily.

  • Voting machine producers criticize critiques

    by 
    Darren Murph
    Darren Murph
    07.31.2007

    Voting machine makers scoffing at bad reviews? That's preposterous! Actually, it's not all that alarming to hear that Diebold, Hart InterCivic, and Sequoia Voting Systems all had less-than-amicable responses to a state study that "found that their machines could be breached by hackers." Of course, we're not exactly sure what all that groaning is about, as we've seen nothing but proof to back the investigation up. Nevertheless, Sequoia dubbed the review "an unrealistic, worst-case-scenario evaluation," Diebold kvetched that the study didn't look at its most recently developed software, Hart found "several inconsistencies, alternate conclusions, and errors," and Elections Systems & Software bypassed the rigmarole entirely by failing to provide their information to the secretary of state. Oh, the irony. [Warning: Read link requires subscription]

  • California prepares to crack down on e-voting manufacturers

    by 
    Evan Blass
    Evan Blass
    05.09.2007

    In an unprecedented attempt to shore up any possible flaws in its counties' electronic voting machines -- the same machines that have been examined and criticized nationwide on many occasions -- California will undertake a so-called "top-to-bottom" review of numerous systems from some half-a-dozen vendors, who must meet a set of seemingly rigid criteria if they want to receive certification for the 2008 election. Giving the proposed three-pronged approach -- initiated by Secretary of State Debra Bowen in collaboration with the University of California -- some real teeth is the fact that each of the three teams tasked with the actual work will be spearheaded by respected academics and leading private sector consultants, including none other than Princeton's Ed Felten, whose tireless efforts to expose the dangers of these shoddy machines are well known to readers of this site. Specifically, each system from manufacturers such as Sequoia, ES&S, and yes, everyone's favorite whipping boy Diebold will see a thorough review of their source code and documentation, along with what are being referred to as "red team penetration" attacks to test the terminals' hardware and software. Since companies are required to submit equipment for testing if they wish to partake in future elections, we could be seeing Diebold make the same begrudging exit from the Golden State as it did from North Carolina, for what we are not alone in suspecting is fear of exposing its flimsy code. Anyone who does choose to participate still risks being forced to make significant changes to their gear or perhaps even complete decertification, so when you Californians go to cast your votes in about eighteen months, don't be surprised if you have to mark up a piece of paper and drop it into a Equalivote-brand ballot box. [Via Slashdot]

  • Princeton prof picks up e-voting machines on the cheap

    by 
    Evan Blass
    Evan Blass
    02.16.2007

    It's no secret that e-voting machines here in the US and around the world have more security holes than a slice of Lorraine Swiss, but it took a Princeton professor and $82 to discover just how bad the situation really is. Now, one would think that election officials would destroy their old terminals instead of selling them to the general public for practically nothing (the ~$5,000 devices are going for less than $20 apiece), yet that's exactly what Buncombe County, North Carolina did with 144 of its retired Sequoia AVC Advantages. First manufactured in the late 80's, the Advantages use old-school push buttons and lamps instead of the touchscreens found on more modern models -- and yet according to Princeton's Andrew Appel, they're actually more secure than those Diebold machines that fellow faculty member Ed Felten totally pwned several months back. Still, Appel and his students found numerous problems with these Sequoias that are still being used in parts of Colorado, New Jersey, Pennsylvania, and all across Louisiana: not only were they able to pick the machines' locks in under seven seconds, they discovered that the non-soldered ROM chips were easily replaceable, allowing a hacker-in-the-know to potentially swap them out with outcome-altering data. A Sequoia spokesperson claims that any tampering with the machines would set off an alarm at their headquarters, but Appel argues that this security precaution could easily be overridden with the right code. So this is just great: now we know that a determined individual could easily pick up still-in-use machines (for a song), reverse engineer them to figure out the security roadblocks, and then sneak into a church basement or gymnasium where many of these terminals gather dust for 364 days a year. This is a big problem, folks, and let's hope it doesn't take an election Enron for some serious changes and regulations to be enacted by the feds.

  • Sequoia voting gear allows for ballot stuffing, calls it a "feature"

    by 
    Cyrus Farivar
    Cyrus Farivar
    11.03.2006

    There's an old adage in election-year politics: "Vote early, and vote often." While that second part is usually meant as a little humorous jab, Sequoia Voting Systems apparently wasn't in on the joke. See, in California and other states, some polling places have these e-voting devices (made by Sequoia) known as AVC Edge voting machines, and each machine comes with a yellow button located on the back of each device. The button is designed as a manual backup, which activists claim allows people to vote as many times as they like. Fear not, though: Sequoia will resubmit the system for certification (after the election), and doesn't really consider this button to be a flaw at all. As Michelle Shafer, vice president of communications for Sequoia, told internetnews.com: "It's a deliberate back-up feature to prevent the Edge from having a single point of failure -- an inoperable card activator -- at a polling location and preventing voters from casting their ballots." Plus, Shafer continued, even if someone did push the button, the machine issues a loud beep when it's pressed -- obviously a completely foolproof system. The California Secretary of State's office has already issued instructions to poll workers to listen for the fateful beeping, so voters can rest assured that no one will try this hack. Goodness knows what will happen if a bunch of voters come in with pagers that all go off simultaneously, though. [Via TechDirt]