Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Anti-fragile ICT systems
~
Hole, Kjell Jorgen.
Anti-fragile ICT systems
Record Type:
Electronic resources : Monograph/item
Title/Author:
Anti-fragile ICT systemsby Kjell Jorgen Hole.
Author:
Hole, Kjell Jorgen.
Published:
Cham :Springer International Publishing :2016.
Description:
xviii, 151 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Computer networksReliability.
Online resource:
http://dx.doi.org/10.1007/978-3-319-30070-2
ISBN:
9783319300702$q(electronic bk.)
Anti-fragile ICT systems
Hole, Kjell Jorgen.
Anti-fragile ICT systems
[electronic resource] /by Kjell Jorgen Hole. - Cham :Springer International Publishing :2016. - xviii, 151 p. :ill. (some col.), digital ;24 cm. - Simula SpringerBriefs on computing ;v.1. - Simula SpringerBriefs on computing ;v.1..
Preface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index.
Open access.
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix's media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta's anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
ISBN: 9783319300702$q(electronic bk.)
Standard No.: 10.1007/978-3-319-30070-2doiSubjects--Topical Terms:
226626
Computer networks
--Reliability.
LC Class. No.: TK5105.5
Dewey Class. No.: 004.6
Anti-fragile ICT systems
LDR
:02698nmm a2200337 a 4500
001
483794
003
DE-He213
005
20160910140620.0
006
m d
007
cr nn 008maaau
008
161012s2016 gw s 0 eng d
020
$a
9783319300702$q(electronic bk.)
020
$a
9783319300689$q(paper)
024
7
$a
10.1007/978-3-319-30070-2
$2
doi
035
$a
978-3-319-30070-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.5
072
7
$a
UT
$2
bicssc
072
7
$a
COM067000
$2
bisacsh
082
0 4
$a
004.6
$2
23
090
$a
TK5105.5
$b
.H729 2016
100
1
$a
Hole, Kjell Jorgen.
$3
741739
245
1 0
$a
Anti-fragile ICT systems
$h
[electronic resource] /
$c
by Kjell Jorgen Hole.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
xviii, 151 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Simula SpringerBriefs on computing ;
$v
v.1
505
0
$a
Preface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index.
506
$a
Open access.
520
$a
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix's media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta's anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
650
0
$a
Computer networks
$x
Reliability.
$3
226626
650
1 4
$a
Computer Science.
$3
212513
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
273709
650
2 4
$a
Information Systems and Communication Service.
$3
274025
650
2 4
$a
Artificial Intelligence (incl. Robotics)
$3
252959
650
2 4
$a
Simulation and Modeling.
$3
273719
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Simula SpringerBriefs on computing ;
$v
v.1.
$3
741740
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-30070-2
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000123584
電子館藏
1圖書
電子書
EB TK5105.5 H729 2016
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-30070-2
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login