LEADER 05401nam 22006975 450 001 996465446703316 005 20200704190430.0 010 $a3-030-36899-8 024 7 $a10.1007/978-3-030-36899-9 035 $a(CKB)4940000000159092 035 $a(MiAaPQ)EBC6005219 035 $a(DE-He213)978-3-030-36899-9 035 $a(PPN)242848893 035 $a(EXLCZ)994940000000159092 100 $a20200102d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAnalysis and Design of Next-Generation Software Architectures$b[electronic resource] $e5G, IoT, Blockchain, and Quantum Computing /$fby Arthur M. Langer 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (322 pages) 311 $a3-030-36898-X 327 $a1. Introduction -- 2. Merging Internal Users and Consumer Requirements -- 3. Reviewing the Object Paradigm -- 4. Distributed Client/Server and Data -- 5. The Impact of 5g Wireless Communication -- 6. The Internet of Things -- 7. Blockchain Analysis and Design. 330 $aThis book provides a detailed ?how-to? guide, addressing aspects ranging from analysis and design to the implementation of applications, which need to be integrated within legacy applications and databases. The analysis and design of the next generation of software architectures must address the new requirements to accommodate the Internet of things (IoT), cybersecurity, blockchain networks, cloud, and quantum computer technologies. As 5G wireless increasingly establishes itself over the next few years, moving legacy applications into these new architectures will be critical for companies to compete in a consumer-driven and social media-based economy. Few organizations, however, understand the challenges and complexities of moving from a central database legacy architecture to a ledger and networked environment. The challenge is not limited to just designing new software applications. Indeed, the next generation needs to function more independently on various devices, and on more diverse and wireless-centric networks. Furthermore, databases must be broken down into linked list-based blockchain architectures, which will involve analytic decisions regarding which portions of data and metadata will be processed within the chain, and which ones will be dependent on cloud systems. Finally, the collection of all data throughout these vast networks will need to be aggregated and used for predictive analysis across a variety of competitive business applications in a secured environment. Certainly not an easy task for any analyst/designer! Many organizations will continue to use packaged products and open-source applications. These third-party products will need to be integrated into the new architecture paradigms and have seamless data aggregation capabilities, while maintaining the necessary cyber compliances. The book also clearly defines the roles and responsibilities of the stakeholders involved, including the IT departments, users, executive sponsors, and third-party vendors. The book?s structure also provides a step-by-step method to help ensure a higher rate of success in the context of re-engineering existing applications and databases, as well as selecting third-party products, conversion methods and cybercontrols. It was written for use by a broad audience, including IT developers, software engineers, application vendors, business line managers, and executives. 606 $aSoftware engineering 606 $aComputer communication systems 606 $aComputer engineering 606 $aInternet of things 606 $aEmbedded computer systems 606 $aQuantum computers 606 $aData protection 606 $aComputer software 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCyber-physical systems, IoT$3https://scigraph.springernature.com/ontologies/product-market-codes/T24080 606 $aQuantum Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/M14070 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aProfessional Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I29000 615 0$aSoftware engineering. 615 0$aComputer communication systems. 615 0$aComputer engineering. 615 0$aInternet of things. 615 0$aEmbedded computer systems. 615 0$aQuantum computers. 615 0$aData protection. 615 0$aComputer software. 615 14$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aCyber-physical systems, IoT. 615 24$aQuantum Computing. 615 24$aSecurity. 615 24$aProfessional Computing. 676 $a005.12 700 $aLanger$b Arthur M$4aut$4http://id.loc.gov/vocabulary/relators/aut$0877843 906 $aBOOK 912 $a996465446703316 996 $aAnalysis and Design of Next-Generation Software Architectures$91959949 997 $aUNISA