acm - an acm publication
Follow us on social media...

Peter J. Denning, Editor in ChiefThe digitally connected world has become a large, swirling sea of information stripped of context. We help our readers make sense of it, find meaning in it, learn what to trust, and speculate on our future.

Peter J. Denning,
Editor-in-Chief

 

Ubiquity Has Been Upgraded!

  • You can propose article ideas to our editors—see Make A Pitch.
  • We are seeking for high-quality, reader submitted video content.
  • The editorial board has been organized into topic areas.
  • We are beefing up the Next-Gen Panel. Volunteer!
  • Our blog is being phased out and will be replaced by opinion commentaries.

LATEST ARTICLES

Symposium

Big Data: Business, Technology, Education, and Science: Big Data (Ubiquity symposium)

by Jeffrey Johnson, Luca Tesei, Marco Piangerelli, Emanuela Merelli, Riccardo Paci, Nenad Stojanovic, Paulo Leitão, José Barbosa, Marco Amador

Transforming the latent value of big data into real value requires the great human intelligence and application of human-data scientists. Data scientists are expected to have a wide range of technical skills alongside being passionate self-directed people who are able to work easily with others and deliver high quality outputs under pressure. There are hundreds of university, commercial, and online courses in data science and related topics. Apart from people with breadth and depth of knowledge and experience in data science, we identify a new educational path to train "bridge persons" who combine knowledge of an organization's business with sufficient knowledge and understanding of data science to "bridge" between non-technical people in the business with highly skilled data scientists who add value to the business. The increasing proliferation of big data and the great advances made in data science do not herald in an era where all problems can be solved by deep learning and artificial intelligence. Although data science opens up many commercial and social opportunities, data science must complement other science in the search for new theory and methods to understand and manage our complex world.

...


Symposium

Corporate Security is a Big Data Problem: Big Data (Ubiquity symposium)

by Louisa Saunier, Kemal A. Delic

In modern times, we have seen a major shift toward hybrid cloud architectures, where corporations operate in a large, highly extended eco-system. Thus, the traditional enterprise security perimeter is disappearing and evolving into the concept of security intelligence where the volume, velocity/rate, and variety of data have dramatically changed. Today, to cope with the fast-changing security landscape, we need to be able to transform huge data lakes via security analytics and big data technologies into effective security intelligence presented through a security "cockpit" to achieve a better corporate security and compliance level, support sound risk management and informed decision making. We present a high-level architecture for efficient security intelligence and the concept of a security cockpit as a point of control for the corporate security and compliance state. Therefore, we could conclude nowadays corporate security can be perceived as a big-data problem.

...



department

How to make dull information exciting

June 2018
by Philip Yaffe

Each "Communication Corner" essay is self-contained; however, they build on each other. For best results, before reading this essay and doing the exercise, go to the first essay "How an Ugly Duckling Became a Swan," then read each succeeding essay.

In this installment, Philip Yaffe explains how to give the reader what they want.

...


Commentary

P2P networks are inherently unstable

June 2018
by Ted G. Lewis

The P2P technology underlying file-sharing systems like Gnutella and distributed autonomous organizations like blockchain are inherently unstable because of self-organizing processes akin to Gause's competitive exclusion principle, and preferential attachment. To maintain an egalitarian P2P organization it is necessary to conserve the original network's entropy, defined as the random structure of the network and actions among peers.

...