Anti-fragile ICT Systems

This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events,...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Hole, Kjell Jørgen (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2016.
Έκδοση:1st ed. 2016.
Σειρά:Simula SpringerBriefs on Computing ; 1
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03557nam a22005415i 4500
001 978-3-319-30070-2
003 DE-He213
005 20160322183449.0
007 cr nn 008mamaa
008 160322s2016 gw | s |||| 0|eng d
020 |a 9783319300702  |9 978-3-319-30070-2 
024 7 |a 10.1007/978-3-319-30070-2  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.C643 
050 4 |a TK5105.5-5105.9 
072 7 |a UT  |2 bicssc 
072 7 |a COM067000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
100 1 |a Hole, Kjell Jørgen.  |e author. 
245 1 0 |a Anti-fragile ICT Systems  |h [electronic resource] /  |c by Kjell Jørgen Hole. 
250 |a 1st ed. 2016. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2016. 
300 |a XVIII, 151 p. 44 illus., 22 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Simula SpringerBriefs on Computing ;  |v 1 
505 0 |a Preface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index. 
506 0 |a Open Access 
520 |a This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts. 
650 0 |a Computer science. 
650 0 |a Computer organization. 
650 0 |a Computers. 
650 0 |a Artificial intelligence. 
650 0 |a Computer simulation. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Systems Organization and Communication Networks. 
650 2 4 |a Information Systems and Communication Service. 
650 2 4 |a Artificial Intelligence (incl. Robotics). 
650 2 4 |a Simulation and Modeling. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319300689 
830 0 |a Simula SpringerBriefs on Computing ;  |v 1 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-30070-2  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)