Explore
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments.The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
This book is included in DOAB.
Why read this book? Have your say.
You must be logged in to comment.
Rights Information
Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.Downloads
This work has been downloaded 729 times via unglue.it ebook links.
- 121 - pdf (CC BY-NC) at OAPEN Library.
- 184 - mobi (CC BY-NC) at Unglue.it.
- 239 - pdf (CC BY-NC) at Unglue.it.
- 185 - epub (CC BY-NC) at Unglue.it.
Keywords
- anomaly detection
- Anti-fragility
- artificial intelligence
- Artificial Intelligence (incl. Robotics)
- Cloud computing
- Complex adaptive systems
- Computer Engineering and Networks
- Computer modelling & simulation
- Computer networking & communications
- Computer science
- Computer Systems Organization and Communication Networks
- Computing & information technology
- Database Management System
- DevOps (Development and Operation)
- Diversity
- Information Systems and Communication Service
- loose coupling
- Malware
- Malware detection
- Microservices
- Modules
- Monitoring
- Redundancy
- Risk Analysis
- Simulation and Modeling
- Software architecture
- Software design
- System dependencies
- Tight coupling
- Trust
- Weak links