acm - an acm publication
Follow us on social media...

Peter J. Denning, Editor in ChiefThe digitally connected world has become a large, swirling sea of information stripped of context. We help our readers make sense of it, find meaning in it, learn what to trust, and speculate on our future.

Peter J. Denning,
Editor-in-Chief

 

Ubiquity Has Been Upgraded!

  • You can propose article ideas to our editors—see Make A Pitch.
  • We are seeking for high-quality, reader submitted video content.
  • The editorial board has been organized into topic areas.
  • We are beefing up the Next-Gen Panel. Volunteer!
  • Our blog is being phased out and will be replaced by opinion commentaries.

LATEST ARTICLES

Interview

Artificial intelligence in politics: an interview with Sven Körner and Mathias Landhäußer of thingsTHINKING

Interviewed by Walter Tichy

In this interview, we learn about five fascinating subjects: security in manufacturing, negotiating trust in the web, updating logical databases, differential privacy, and scientific computing (including its security issues). ...


Symposium

Big Data: Business, Technology, Education, and Science: Big Data (Ubiquity symposium)

by Jeffrey Johnson, Luca Tesei, Marco Piangerelli, Emanuela Merelli, Riccardo Paci, Nenad Stojanovic, Paulo Leitão, José Barbosa, Marco Amador

In this interview, we learn about five fascinating subjects: security in manufacturing, negotiating trust in the web, updating logical databases, differential privacy, and scientific computing (including its security issues). ...



Symposium

Corporate Security is a Big Data Problem: Big Data (Ubiquity symposium)

July 2018
by Louisa Saunier, Kemal A. Delic

In this interview, we learn about five fascinating subjects: security in manufacturing, negotiating trust in the web, updating logical databases, differential privacy, and scientific computing (including its security issues). ...


department

How to make dull information exciting

June 2018
by Philip Yaffe

In this interview, we learn about five fascinating subjects: security in manufacturing, negotiating trust in the web, updating logical databases, differential privacy, and scientific computing (including its security issues). ...