Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy

Anti-fragile ICT Systems

by Kjell Jørgen Hole

Anti-fragile ICT Systems

Subscribe to new books via dBooks.org telegram channel

Join
DescriptionDetailsHashtagsReport an issue

Book Description

This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments.

The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix's media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta's anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.

This open book is licensed under a Creative Commons License (CC BY-NC). You can download Anti-fragile ICT Systems ebook for free in PDF format (4.4 MB).

Book Details

Title
Anti-fragile ICT Systems
Subject
Computer Science
Publisher
Springer
Published
2016
Pages
159
Edition
1
Language
English
ISBN13
9783319300689
ISBN10
3319300687
ISBN13 Digital
9783319300702
ISBN10 Digital
3319300709
PDF Size
4.4 MB
License
CC BY-NC

Related Books

Anti-Microbial Resistance in Global Perspective
This open book provides an accessible introduction to the mechanics of international development and global health text for policy-makers and students across a wide range of disciplines. Antimicrobial resistance is a major threat to the well-being of patients and health systems the world over. In fragile health systems so challenged, on a day-today...
Re-engineering the Uptake of ICT in Schools
This book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically sound ways of introducing ICT, new technical artifacts supporting the approach, the evaluation in a large-scale validator, and future work. While many innovations in Technology Enhanced Learning (TEL) have emerged over...
Complications and Quandaries in the ICT Sector
With technology standards becoming increasingly common, particularly in the information and communications technology (ICT) sector, the complexities and contradictions at the interface of intellectual property law and competition law have emerged strongly. This book talks about how the regulatory agencies and courts in the United States, European U...
The Evolutionary Dynamics of Discursive Knowledge
This open book have three themes have been central to Leydesdorff's research: (1) the dynamics of science, technology, and innovation; (2) the scientometric operationalization of these concept; and (3) the elaboration in terms of a Triple Helix of university-industry-government relations. In this study, I discuss the relations among these them...
Machine Learning for Cyber Physical Systems
This book proceedings presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. It contains some selected papers from the international Conference ML4CPS - Machine Learning for Cyber Physical Systems, which was held in Karlsruhe, October 23-24, 2018. Cyber Physical Systems are characterized by their ability to...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...