000 | 04148nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-319-30070-2 | ||
003 | DE-He213 | ||
005 | 20210511120920.0 | ||
007 | cr nn 008mamaa | ||
008 | 160322s2016 gw | s |||| 0|eng d | ||
020 |
_a9783319300702 _9978-3-319-30070-2 |
||
024 | 7 |
_a10.1007/978-3-319-30070-2 _2doi |
|
050 | 4 | _aQA76.9.C643 | |
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUT _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUT _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
100 | 1 |
_aHole, Kjell Jørgen. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _95220 |
|
245 | 1 | 0 |
_aAnti-fragile ICT Systems _h[electronic resource] / _cby Kjell Jørgen Hole. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXVIII, 151 p. 44 illus., 22 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSimula SpringerBriefs on Computing ; _v1 |
|
505 | 0 | _aPreface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index. | |
506 | 0 | _aOpen Access | |
520 | _aThis book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts. | ||
650 | 0 |
_aComputer organization. _92988 |
|
650 | 0 |
_aComputers. _9718 |
|
650 | 0 |
_aArtificial intelligence. _95221 |
|
650 | 0 |
_aComputer simulation. _9356 |
|
650 | 1 | 4 |
_aComputer Systems Organization and Communication Networks. _0https://scigraph.springernature.com/ontologies/product-market-codes/I13006 _92993 |
650 | 2 | 4 |
_aInformation Systems and Communication Service. _0https://scigraph.springernature.com/ontologies/product-market-codes/I18008 _91176 |
650 | 2 | 4 |
_aArtificial Intelligence. _0https://scigraph.springernature.com/ontologies/product-market-codes/I21000 _95222 |
650 | 2 | 4 |
_aSimulation and Modeling. _0https://scigraph.springernature.com/ontologies/product-market-codes/I19000 _9361 |
710 | 2 |
_aSpringerLink (Online service) _9141 |
|
776 | 0 | 8 |
_iPrinted edition: _z9783319300689 |
776 | 0 | 8 |
_iPrinted edition: _z9783319300696 |
830 | 0 |
_aSimula SpringerBriefs on Computing ; _v1 _94861 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-30070-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-SOB | ||
942 |
_cEBK _w1 _xAdministrator Library _y1 _z Administrator Library |
||
999 |
_c1064 _d1064 |
||
773 | _tSpringer Nature Open Access eBook |