Store besparelser
Hurtig levering
Gemte
Log ind
0
Kurv
Kurv

Analysis and Design of Next-Generation Software Architectures

- 5G, IoT, Blockchain, and Quantum Computing
Af: Arthur M. Langer Engelsk Paperback

Analysis and Design of Next-Generation Software Architectures

- 5G, IoT, Blockchain, and Quantum Computing
Af: Arthur M. Langer Engelsk Paperback
Tjek vores konkurrenters priser

This book provides a detailed "how-to" guide, addressing aspects ranging from analysis and design to the implementation of applications, which need to be integrated within legacy applications and databases.

The analysis and design of the next generation of software architectures must address the new requirements to accommodate the Internet of things (IoT), cybersecurity, blockchain networks, cloud, and quantum computer technologies. As 5G wireless increasingly establishes itself over the next few years, moving legacy applications into these new architectures will be critical for companies to compete in a consumer-driven and social media-based economy. Few organizations, however, understand the challenges and complexities of moving from a central database legacy architecture to a ledger and networked environment.

The challenge is not limited to just designing new software applications. Indeed, the next generation needs to function more independently on various devices, and on more diverse and wireless-centric networks. Furthermore, databases must be broken down into linked list-based blockchain architectures, which will involve analytic decisions regarding which portions of data and metadata will be processed within the chain, and which ones will be dependent on cloud systems. Finally, the collection of all data throughout these vast networks will need to be aggregated and used for predictive analysis across a variety of competitive business applications in a secured environment. Certainly not an easy task for any analyst/designer!

Many organizations will continue to use packaged products and open-source applications. These third-party products will need to be integrated into the new architecture paradigms and have seamless data aggregation capabilities, while maintaining the necessary cyber compliances.

The book also clearly defines the roles and responsibilities of the stakeholders involved, including the IT departments, users, executive sponsors, and third-party vendors. The book''s structure also provides a step-by-step method to help ensure a higher rate of success in the context of re-engineering existing applications and databases, as well as selecting third-party products, conversion methods and cybercontrols. It was written for use by a broad audience, including IT developers, software engineers, application vendors, business line managers, and executives.  

Tjek vores konkurrenters priser
Normalpris
kr 478
Fragt: 39 kr
6 - 8 hverdage
20 kr
Pakkegebyr
God 4 anmeldelser på
Tjek vores konkurrenters priser

This book provides a detailed "how-to" guide, addressing aspects ranging from analysis and design to the implementation of applications, which need to be integrated within legacy applications and databases.

The analysis and design of the next generation of software architectures must address the new requirements to accommodate the Internet of things (IoT), cybersecurity, blockchain networks, cloud, and quantum computer technologies. As 5G wireless increasingly establishes itself over the next few years, moving legacy applications into these new architectures will be critical for companies to compete in a consumer-driven and social media-based economy. Few organizations, however, understand the challenges and complexities of moving from a central database legacy architecture to a ledger and networked environment.

The challenge is not limited to just designing new software applications. Indeed, the next generation needs to function more independently on various devices, and on more diverse and wireless-centric networks. Furthermore, databases must be broken down into linked list-based blockchain architectures, which will involve analytic decisions regarding which portions of data and metadata will be processed within the chain, and which ones will be dependent on cloud systems. Finally, the collection of all data throughout these vast networks will need to be aggregated and used for predictive analysis across a variety of competitive business applications in a secured environment. Certainly not an easy task for any analyst/designer!

Many organizations will continue to use packaged products and open-source applications. These third-party products will need to be integrated into the new architecture paradigms and have seamless data aggregation capabilities, while maintaining the necessary cyber compliances.

The book also clearly defines the roles and responsibilities of the stakeholders involved, including the IT departments, users, executive sponsors, and third-party vendors. The book''s structure also provides a step-by-step method to help ensure a higher rate of success in the context of re-engineering existing applications and databases, as well as selecting third-party products, conversion methods and cybercontrols. It was written for use by a broad audience, including IT developers, software engineers, application vendors, business line managers, and executives.  

Produktdetaljer
Sprog: Engelsk
Sider: 308
ISBN-13: 9783030369019
Indbinding: Paperback
Udgave:
ISBN-10: 3030369013
Udg. Dato: 3 jan 2021
Længde: 0mm
Bredde: 155mm
Højde: 235mm
Forlag: Springer Nature Switzerland AG
Oplagsdato: 3 jan 2021
Forfatter(e): Arthur M. Langer
Forfatter(e) Arthur M. Langer


Kategori Kybernetik og systemteori


ISBN-13 9783030369019


Sprog Engelsk


Indbinding Paperback


Sider 308


Udgave


Længde 0mm


Bredde 155mm


Højde 235mm


Udg. Dato 3 jan 2021


Oplagsdato 3 jan 2021


Forlag Springer Nature Switzerland AG

Vi anbefaler også
Kategori sammenhænge