acm - an acm publication
Follow us on social media...

Peter J. Denning, Editor in ChiefThe digitally connected world has become a large, swirling sea of information stripped of context. We help our readers make sense of it, find meaning in it, learn what to trust, and speculate on our future.

Peter J. Denning,
Editor-in-Chief

 

Ubiquity Has Been Upgraded!

  • You can propose article ideas to our editors—see Make A Pitch.
  • We are seeking for high-quality, reader submitted video content.
  • The editorial board has been organized into topic areas.
  • We are beefing up the Next-Gen Panel. Volunteer!
  • Our blog is being phased out and will be replaced by opinion commentaries.

LATEST ARTICLES

Symposium

Big data: technology and business challenges of big data in the digital economy

by Dave Penkler

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...


Communication Corner

Why putting yourself in the mind of your reader is easier---and more challenging---than you might have imagined

by Philip Yaffe

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...



Symposium

Big data: big data for social science research

January 2018
by Mark Birkin

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...


Symposium

Big Data and the Attention Economy: Big Data (Ubiquity symposium)

December 2017
by Bernardo A. Huberman

Cyber-attacks and breaches are often detected too late to avoid damage. In this article we examine the ability of redundancy-based anomaly detectors to recognize some high-risk and difficult to detect attacks on web servers. We discuss practical relevance of the approach in the context of providing high-assurance Web-services that may belong to autonomous IoT applications and devices. ...