000 04148nam a22005895i 4500
001 978-3-319-30070-2
003 DE-He213
005 20210511120920.0
007 cr nn 008mamaa
008 160322s2016 gw | s |||| 0|eng d
020 _a9783319300702
_9978-3-319-30070-2
024 7 _a10.1007/978-3-319-30070-2
_2doi
050 4 _aQA76.9.C643
050 4 _aTK5105.5-5105.9
072 7 _aUT
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUT
_2thema
082 0 4 _a004.6
_223
100 1 _aHole, Kjell Jørgen.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_95220
245 1 0 _aAnti-fragile ICT Systems
_h[electronic resource] /
_cby Kjell Jørgen Hole.
250 _a1st ed. 2016.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aXVIII, 151 p. 44 illus., 22 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSimula SpringerBriefs on Computing ;
_v1
505 0 _aPreface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index.
506 0 _aOpen Access
520 _aThis book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
650 0 _aComputer organization.
_92988
650 0 _aComputers.
_9718
650 0 _aArtificial intelligence.
_95221
650 0 _aComputer simulation.
_9356
650 1 4 _aComputer Systems Organization and Communication Networks.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I13006
_92993
650 2 4 _aInformation Systems and Communication Service.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I18008
_91176
650 2 4 _aArtificial Intelligence.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I21000
_95222
650 2 4 _aSimulation and Modeling.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I19000
_9361
710 2 _aSpringerLink (Online service)
_9141
776 0 8 _iPrinted edition:
_z9783319300689
776 0 8 _iPrinted edition:
_z9783319300696
830 0 _aSimula SpringerBriefs on Computing ;
_v1
_94861
856 4 0 _uhttps://doi.org/10.1007/978-3-319-30070-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-SOB
942 _cEBK
_w1
_xAdministrator Library
_y1
_z Administrator Library
999 _c1064
_d1064
773 _tSpringer Nature Open Access eBook