|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910136809003321 |
|
|
Autore |
Hole Kjell Jørgen |
|
|
Titolo |
Anti-fragile ICT Systems [[electronic resource] /] / by Kjell Jørgen Hole |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Springer Nature, 2016 |
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2016.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVIII, 151 pages) ; : 44 illustrations, 22 illustrations in colour; digital, PDF file(s) |
|
|
|
|
|
|
|
|
Collana |
|
Simula SpringerBriefs on Computing, , 2512-1677 ; ; 1 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer organization |
Computers |
Artificial intelligence |
Computer simulation |
Computer Systems Organization and Communication Networks |
Information Systems and Communication Service |
Artificial Intelligence |
Simulation and Modeling |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (pages 141-145) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Preface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional |
|
|
|
|
|
|
|
|
|
|
risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts. |
|
|
|
|
|
| |