LEADER 05698 am 22010933u 450 001 9910136809003321 005 20221206182142.0 010 $a3-319-30070-9 024 7 $a10.1007/978-3-319-30070-2 035 $a(CKB)3710000000627504 035 $a(SSID)ssj0001654249 035 $a(PQKBManifestationID)16433860 035 $a(PQKBTitleCode)TC0001654249 035 $a(PQKBWorkID)14982822 035 $a(PQKB)11402651 035 $a(DE-He213)978-3-319-30070-2 035 $a(MiAaPQ)EBC5588201 035 $a(Au-PeEL)EBL5588201 035 $a(OCoLC)945766733 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/32497 035 $a(PPN)192774581 035 $a(EXLCZ)993710000000627504 100 $a20160322d2016 u| 0 101 0 $aeng 135 $aurm|#|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAnti-fragile ICT Systems$b[electronic resource] /$fby Kjell Jørgen Hole 205 $a1st ed. 2016. 210 $cSpringer Nature$d2016 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XVIII, 151 pages) ;$c44 illustrations, 22 illustrations in colour; digital, PDF file(s) 225 1 $aSimula SpringerBriefs on Computing,$x2512-1677 ;$v1 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-30068-7 320 $aIncludes bibliographical references (pages 141-145) and index. 327 $aPreface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index. 330 $aThis book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix?s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta?s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts. 410 0$aSimula SpringerBriefs on Computing,$x2512-1677 ;$v1 606 $aComputer organization 606 $aComputers 606 $aArtificial intelligence 606 $aComputer simulation 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aSimulation and Modeling$3https://scigraph.springernature.com/ontologies/product-market-codes/I19000 610 $aComputer Systems Organization and Communication Networks 610 $aInformation Systems and Communication Service 610 $aArtificial Intelligence 610 $aSimulation and Modeling 610 $aComputer Engineering and Networks 610 $aDatabase Management System 610 $aComputer Science 610 $aAnomaly detection 610 $aAnti-fragility 610 $aCloud computing 610 $aComplex adaptive systems 610 $aDevOps (Development and Operation) 610 $aDiversity 610 $aLoose coupling 610 $aMalware 610 $aMalware detection 610 $aMicroservices 610 $aModules 610 $aMonitoring 610 $aRedundancy 610 $aRisk analysis 610 $aSoftware architecture 610 $aSoftware design 610 $aSystem dependencies 610 $aTight coupling 610 $aTrust 610 $aWeak links 610 $aComputer networking & communications 610 $aComputer modelling & simulation 615 0$aComputer organization. 615 0$aComputers. 615 0$aArtificial intelligence. 615 0$aComputer simulation. 615 14$aComputer Systems Organization and Communication Networks. 615 24$aInformation Systems and Communication Service. 615 24$aArtificial Intelligence. 615 24$aSimulation and Modeling. 676 $a004.6 700 $aHole$b Kjell Jørgen$4aut$4http://id.loc.gov/vocabulary/relators/aut$0979466 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910136809003321 996 $aAnti-fragile ICT Systems$92233319 997 $aUNINA