語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Analysis and design of next-generati...
~
Langer, Arthur M.
Analysis and design of next-generation software architectures5G, IoT, Blockchain, and Quantum Computing /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Analysis and design of next-generation software architecturesby Arthur M. Langer.
其他題名:
5G, IoT, Blockchain, and Quantum Computing /
作者:
Langer, Arthur M.
出版者:
Cham :Springer International Publishing :2020.
面頁冊數:
xxii, 308 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Software architecture.
電子資源:
https://doi.org/10.1007/978-3-030-36899-9
ISBN:
9783030368999$q(electronic bk.)
Analysis and design of next-generation software architectures5G, IoT, Blockchain, and Quantum Computing /
Langer, Arthur M.
Analysis and design of next-generation software architectures
5G, IoT, Blockchain, and Quantum Computing /[electronic resource] :by Arthur M. Langer. - Cham :Springer International Publishing :2020. - xxii, 308 p. :ill., digital ;24 cm.
1. Introduction -- 2. Merging Internal Users and Consumer Requirements -- 3. Reviewing the Object Paradigm -- 4. Distributed Client/Server and Data -- 5. The Impact of 5g Wireless Communication -- 6. The Internet of Things -- 7. Blockchain Analysis and Design.
This book provides a detailed "how-to" guide, addressing aspects ranging from analysis and design to the implementation of applications, which need to be integrated within legacy applications and databases. The analysis and design of the next generation of software architectures must address the new requirements to accommodate the Internet of things (IoT), cybersecurity, blockchain networks, cloud, and quantum computer technologies. As 5G wireless increasingly establishes itself over the next few years, moving legacy applications into these new architectures will be critical for companies to compete in a consumer-driven and social media-based economy. Few organizations, however, understand the challenges and complexities of moving from a central database legacy architecture to a ledger and networked environment. The challenge is not limited to just designing new software applications. Indeed, the next generation needs to function more independently on various devices, and on more diverse and wireless-centric networks. Furthermore, databases must be broken down into linked list-based blockchain architectures, which will involve analytic decisions regarding which portions of data and metadata will be processed within the chain, and which ones will be dependent on cloud systems. Finally, the collection of all data throughout these vast networks will need to be aggregated and used for predictive analysis across a variety of competitive business applications in a secured environment. Certainly not an easy task for any analyst/designer! Many organizations will continue to use packaged products and open-source applications. These third-party products will need to be integrated into the new architecture paradigms and have seamless data aggregation capabilities, while maintaining the necessary cyber compliances. The book also clearly defines the roles and responsibilities of the stakeholders involved, including the IT departments, users, executive sponsors, and third-party vendors. The book's structure also provides a step-by-step method to help ensure a higher rate of success in the context of re-engineering existing applications and databases, as well as selecting third-party products, conversion methods and cybercontrols. It was written for use by a broad audience, including IT developers, software engineers, application vendors, business line managers, and executives.
ISBN: 9783030368999$q(electronic bk.)
Standard No.: 10.1007/978-3-030-36899-9doiSubjects--Topical Terms:
230927
Software architecture.
LC Class. No.: QA76.754 / .L35 2020
Dewey Class. No.: 005.12
Analysis and design of next-generation software architectures5G, IoT, Blockchain, and Quantum Computing /
LDR
:03684nmm a2200325 a 4500
001
575549
003
DE-He213
005
20200102062134.0
006
m d
007
cr nn 008maaau
008
201027s2020 sz s 0 eng d
020
$a
9783030368999$q(electronic bk.)
020
$a
9783030368982$q(paper)
024
7
$a
10.1007/978-3-030-36899-9
$2
doi
035
$a
978-3-030-36899-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.754
$b
.L35 2020
072
7
$a
UMZ
$2
bicssc
072
7
$a
COM051230
$2
bisacsh
072
7
$a
UMZ
$2
thema
082
0 4
$a
005.12
$2
23
090
$a
QA76.754
$b
.L276 2020
100
1
$a
Langer, Arthur M.
$3
274510
245
1 0
$a
Analysis and design of next-generation software architectures
$h
[electronic resource] :
$b
5G, IoT, Blockchain, and Quantum Computing /
$c
by Arthur M. Langer.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xxii, 308 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
1. Introduction -- 2. Merging Internal Users and Consumer Requirements -- 3. Reviewing the Object Paradigm -- 4. Distributed Client/Server and Data -- 5. The Impact of 5g Wireless Communication -- 6. The Internet of Things -- 7. Blockchain Analysis and Design.
520
$a
This book provides a detailed "how-to" guide, addressing aspects ranging from analysis and design to the implementation of applications, which need to be integrated within legacy applications and databases. The analysis and design of the next generation of software architectures must address the new requirements to accommodate the Internet of things (IoT), cybersecurity, blockchain networks, cloud, and quantum computer technologies. As 5G wireless increasingly establishes itself over the next few years, moving legacy applications into these new architectures will be critical for companies to compete in a consumer-driven and social media-based economy. Few organizations, however, understand the challenges and complexities of moving from a central database legacy architecture to a ledger and networked environment. The challenge is not limited to just designing new software applications. Indeed, the next generation needs to function more independently on various devices, and on more diverse and wireless-centric networks. Furthermore, databases must be broken down into linked list-based blockchain architectures, which will involve analytic decisions regarding which portions of data and metadata will be processed within the chain, and which ones will be dependent on cloud systems. Finally, the collection of all data throughout these vast networks will need to be aggregated and used for predictive analysis across a variety of competitive business applications in a secured environment. Certainly not an easy task for any analyst/designer! Many organizations will continue to use packaged products and open-source applications. These third-party products will need to be integrated into the new architecture paradigms and have seamless data aggregation capabilities, while maintaining the necessary cyber compliances. The book also clearly defines the roles and responsibilities of the stakeholders involved, including the IT departments, users, executive sponsors, and third-party vendors. The book's structure also provides a step-by-step method to help ensure a higher rate of success in the context of re-engineering existing applications and databases, as well as selecting third-party products, conversion methods and cybercontrols. It was written for use by a broad audience, including IT developers, software engineers, application vendors, business line managers, and executives.
650
0
$a
Software architecture.
$3
230927
650
1 4
$a
Software Engineering.
$3
274511
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Cyber-physical systems, IoT.
$3
836359
650
2 4
$a
Quantum Computing.
$3
573152
650
2 4
$a
Security.
$3
760527
650
2 4
$a
Professional Computing.
$3
763344
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-3-030-36899-9
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000181505
電子館藏
1圖書
電子書
EB QA76.754 .L276 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-36899-9
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入