Design principles of service-oriented architectures (SOA)
Motivated by problems in the healthcare system, many projects have already been working on a uniform telemedicine system. Telemedicine is seen as a source of hope and is already being used successfully in many projects and other countries. In Germany, however, there is no uniform, comprehensive solution, and expansion is stalling due to the large number of individual projects. The most promising approach is based on a TM-SOA design and the development of a telemedicine repository. However, this and other SOA projects all have in common that they provide design principles for the uniform design of technical functions, but not for person-oriented services. However, as the medical field is highly person-oriented, the next step will be to formulate uniform principles for person-oriented services in addition to uniform principles for technical functions. Within the scope of this paper, principles for the design of person-oriented services within a telemedicine SOA solution will be developed from the SOA design principles.
Information Technology and the Evolution of the Library
The de Gruyter Handbook on Law and Digital Technologies
The De Gruyter Handbook on Law and Digital Technologies provides a comprehensive, accessible and thought-provoking guide to the current and future regulation of digital technologies. It addresses key legal challenges such as reconceptualizing crucial, deep-rooted notions, including those of person, autonomy, democracy, the rule of law, sovereignty, constitutionalism and governance. The handbook proposes critical explorations of the potential impact of digital technologies on new and traditional forms of governance and regulation across different and competitive normative perspectives such as law, economy, social norms and legal design. In this framework, it addresses the societal transformations brought about by digital technologies, the legal means for regulating the field, and the impact of governance in areas such as fintech, sustainability, outer space, or healthcare.
Cloud Application Security Essentials with Azure
Modern application development is deeply intertwined with cloud computing, making robust application security an absolute imperative for every professional. As applications increasingly leverage cloud components and services like Azure, understanding the security implications for both your app architecture and its underlying platform is critical to prevent breaches and ensure system integrity. This book starts by defining modern app security, outlining crucial security assertions and security metrics for cloud environments. It then dives into different clouds, including private vs. public cloud models and their impact on app security requirements, highlighting Azure examples and confidential computing. You will explore fundamental blockchain concepts and their relevance, then master app identity, app keys, and delegation concepts. This book aims to define metrics to help evaluate the application security level and establish security as a feature of the application.Upon completing this book, you will possess a strong foundational and practical understanding of how to secure modern applications across diverse cloud landscapes. You will be well-prepared to design, implement, and maintain secure applications, effectively mitigating risks and contributing confidently to your organization's cloud security posture, and evaluate it in other cases.WHAT YOU WILL LEARN● Explore common concepts related to security - using private clouds, encryption, authorization, etc. ● Define modern app security assertions, architecture, and cloud metrics.● Implement cloud app identity, app keys, and delegation securely.● Integrate app architectures, cloud services, and blockchain for security● Apply robust data encryption, Azure support, and secure key access.● Understand app monetization, blockchain economics, and security implications.WHO THIS BOOK IS FORThis book is ideal for application developers, owners, consumers, store owners, and cloud architects who want to learn about application security in cloud environments. It aims to equip these professionals with the knowledge to estimate and enhance an application's security level.
Enhancing Aspect-Oriented Software Metrics
Software development is a complex process that requires precise measurement techniques to assess quality, maintainability, and efficiency. Traditional object-oriented programming (OOP) metrics, while useful, struggle to fully capture the crosscutting concerns in modern software systems. Aspect-Oriented Programming (AOP) addresses these limitations by modularizing crosscutting concerns (e.g., logging, security, transactions) into reusable aspects. However, measuring the complexity and maintainability of AOP systems remains challenging.This research focuses on empirically validating coupling metrics in AOP, introducing cognitive-weighted versions of existing metrics to better reflect human comprehension effort. The study also employs fuzzy logic to assess overall complexity, providing a more nuanced evaluation of aspect-oriented software.This research aims to: - Enhance existing AOP metrics by incorporating cognitive weights. - Empirically validate these metrics through controlled experiments. - Use fuzzy logic to compute an aggregated complexity score.
The Human Use of Human Beings
For the 75th anniversary, a new edition of The Human Use of Human Beings--the landmark book that delves into the relationship between humans and computers, and presciently anticipates many contemporary dilemmas surrounding AI technology. With a new introduction by Brian Christian, author of the bestselling Algorithms to Live By and The Alignment Problem.In 1950, mathematician-philosopher Norbert Wiener ended this classic book on the place of machines in society with a warning: "We shall never receive the right answers to our questions unless we ask the right questions.... The hour is very late, and the choice of good and evil knocks at our door."Wiener, the founder of the science of cybernetics--the study of the relationship between computers and the human nervous system--was widely mislabeled as an advocate for the automation of human life. As The Human Use for Human Beings reveals, his vision was much more complex and interesting, and is more relevant in today's world of AI than anyone could have anticipated.In his new introduction, Brian Christian aptly calls Wiener the "progenitor of contemporary AI-safety discourse." Wiener hoped that machines would release people from relentless and repetitive drudgery to achieve more creative pursuits, yet he anticipated the danger of dehumanizing and displacement. His pioneering views on the human-machine relationship as a "communicative process" are only more crucial now, as we carry in our pockets AI devices that we can literally speak to. His prescient warnings illuminate our contemporary relationships with language, art, and even social media.The Human Use of Human Beings examines the implications of cybernetics for education, law, language, science, technology, as Wiener anticipates the enormous impact--in effect, a third industrial revolution--that the computer has had on our lives.
Fundamentals of Server Administration
As companies are increasingly moving IT resources to the cloud with technologies such as Amazon AWS and Microsoft Azure, there is an emerging knowledge gap for network administrators who still must deploy and manage on-site servers. Fundamentals of Server Administration provides both students and professionals with the knowledge and skills needed to administer servers in both on-premise and cloud-based environments. It covers topics and concepts for Windows and Linux server environments and includes graphical, as well as console-based administration activities. Fundamentals of Server Administration aligns to the CompTIA Server+ (SKO-005) certification as well as the CompTIA Network Infrastructure Professional stackable certification for those students who also obtain the Network+ certification. It is an invaluable tool for both students and professionals seeking the essential skills needed to meet today's rising demand for a highly skilled IT workforce.A clear focus on best practices for both on-premise and cloud-based deploymentsProvides a vendor-agnostic approach that addresses core server administration concepts for both Windows and Linux server environmentsCovers graphical as well as console-based server administration (i.e., PowerShell and Bash) activitiesServes as the first step in preparing students for the CompTIA Server+ certification examAvailable with Cybersecurity Cloud Labs, providing immersive mock IT infrastructures where students can practice and learn foundational skills