Vai al contenuto principale della pagina
Autore: | Hole Kjell Jørgen |
Titolo: | Anti-fragile ICT Systems [[electronic resource] /] / by Kjell Jørgen Hole |
Pubblicazione: | Springer Nature, 2016 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | |
Edizione: | 1st ed. 2016. |
Descrizione fisica: | 1 online resource (XVIII, 151 pages) ; : 44 illustrations, 22 illustrations in colour; digital, PDF file(s) |
Disciplina: | 004.6 |
Soggetto topico: | Computer organization |
Computers | |
Artificial intelligence | |
Computer simulation | |
Computer Systems Organization and Communication Networks | |
Information Systems and Communication Service | |
Artificial Intelligence | |
Simulation and Modeling | |
Soggetto non controllato: | Computer Systems Organization and Communication Networks |
Information Systems and Communication Service | |
Artificial Intelligence | |
Simulation and Modeling | |
Computer Engineering and Networks | |
Database Management System | |
Computer Science | |
Anomaly detection | |
Anti-fragility | |
Cloud computing | |
Complex adaptive systems | |
DevOps (Development and Operation) | |
Diversity | |
Loose coupling | |
Malware | |
Malware detection | |
Microservices | |
Modules | |
Monitoring | |
Redundancy | |
Risk analysis | |
Software architecture | |
Software design | |
System dependencies | |
Tight coupling | |
Trust | |
Weak links | |
Computer networking & communications | |
Computer modelling & simulation | |
Note generali: | Bibliographic Level Mode of Issuance: Monograph |
Nota di bibliografia: | Includes bibliographical references (pages 141-145) and index. |
Nota di contenuto: | Preface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index. |
Sommario/riassunto: | This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts. |
Titolo autorizzato: | Anti-fragile ICT Systems |
ISBN: | 3-319-30070-9 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910136809003321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |