Franklin

Anti-fragile ICT Systems [electronic resource] / by Kjell Jørgen Hole.

Author/Creator:
Hole, Kjell Jørgen. author., Author,
Publication:
Cham : Springer International Publishing : Imprint: Springer, 2016.
Format/Description:
Book
1 online resource (XVIII, 151 pages) : 44 illustrations, 22 illustrations in color.
Edition:
1st ed. 2016.
Series:
Computer Science (Springer-11645)
Simula SpringerBriefs on Computing ; 1
Simula SpringerBriefs on Computing ; 1
Contained In:
Springer eBooks
Status/Location:
Loading...

Options
Location Notes Your Loan Policy

Details

Subjects:
Computer organization.
Computers.
Artificial intelligence.
Computer simulation.
Local subjects:
Computer Systems Organization and Communication Networks. (search)
Information Systems and Communication Service. (search)
Artificial Intelligence. (search)
Simulation and Modeling. (search)
System Details:
text file PDF
Summary:
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix's media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta's anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
Contents:
Preface
Part I: The Concept of Anti-Fragility: 1 Introduction
2 Achieving Anti-Fragility
3 The Need to Build Trust
4 Principles Ensuring Anti-Fragility
Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions
6 An Anti-Fragile e-Government System
7 Anti-Fragile Cloud-Based Telecom Systems
Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading
9 Robustness to Malware Reinfections
10 Anti-Fragility to Malware Spreading
Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm
12 Detecting Anomalies with the CLA
Part V: Future Anti-Fragile Systems: 13 Summary and Future Work
About the Author
References
Index.
Contributor:
SpringerLink (Online service)
Other format:
Printed edition:
Printed edition:
ISBN:
978-3-319-30070-2
9783319300702
Publisher Number:
10.1007/978-3-319-30070-2 doi
Access Restriction:
Restricted for use by site license.