acm - an acm publication
Follow us on social media...

Peter J. Denning, Editor in ChiefThe digitally connected world has become a large, swirling sea of information stripped of context. We help our readers make sense of it, find meaning in it, learn what to trust, and speculate on our future.

Peter J. Denning,
Editor-in-Chief

 

Ubiquity Has Been Upgraded!

  • You can propose article ideas to our editors—see Make A Pitch.
  • We are seeking for high-quality, reader submitted video content.
  • The editorial board has been organized into topic areas.
  • We are beefing up the Next-Gen Panel. Volunteer!
  • Our blog is being phased out and will be replaced by opinion commentaries.

LATEST ARTICLES

Symposium

When Good Machine Learning Leads to Bad Security: Big Data (Ubiquity symposium)

by Tegjyot Singh Sethi, Mehmed Kantardzic

Most recent publicity on cyber security has focused on preventing attacks by external hackers. While many of these attacks began with an insider, there has been much less discussion about preventing malicious insider exploits. Perhaps that is because untrustworthy insiders are hard to find and block before they strike. ...


Communication Corner

First write like you speak, then write like you write

by Philip Yaffe

Most recent publicity on cyber security has focused on preventing attacks by external hackers. While many of these attacks began with an insider, there has been much less discussion about preventing malicious insider exploits. Perhaps that is because untrustworthy insiders are hard to find and block before they strike. ...



Symposium

Developing an Open Source 'Big Data' Cognitive Computing Platform: Big Data (Ubiquity symposium)

March 2018
by Michael Kowolenko, Mladen A. Vouk

Most recent publicity on cyber security has focused on preventing attacks by external hackers. While many of these attacks began with an insider, there has been much less discussion about preventing malicious insider exploits. Perhaps that is because untrustworthy insiders are hard to find and block before they strike. ...


Symposium

High Performance Synthetic Information Environments
An integrating architecture in the age of pervasive data and computing: Big Data (Ubiquity symposium)

March 2018
by Christopher L. Barrett, Jeffrey Johnson, Madhav Marathe

Most recent publicity on cyber security has focused on preventing attacks by external hackers. While many of these attacks began with an insider, there has been much less discussion about preventing malicious insider exploits. Perhaps that is because untrustworthy insiders are hard to find and block before they strike. ...