Friday, August 2, 2013

Technopreneurship Ecosystem (PreMid Topic)

        


Technopreneurship Ecosystem
As what our instructor discusses during the class, she said that According to her research about technopreneurship Ecosystem. Many of the tasks, if not all, have pre-requisites (i.e. money, materials, personnel, etc.). it is similarly for technopreneurial venture to start, grow and succeed, it must also have the required resources, environment and support. Its learning objectives are at the end of this session/lecture, the students should be able to: enumerate the different actors/players for the technology ventures to prosper and define the roles of the different actors/players in techno ventures.

Succesful technopreneurship = H-E-L-P. Techno Ventures has HUMAN RESOURCES, ENVIRONMENT LAWS & POLICIES and FINANCIAL RESOURCES.Human resources components are: Research who is the thinker, idea generator and innovator. Developer who is the implementor, technical people. Scanner and marketing people and Financer.  Environment component are: Science parks and incubation centers, Academic Institutions and R & D centers, Internet access and Communication, Communication and other Support Services, Geographic accessibility and Venture Mentoring Services/Support. Incubation is the programmes provide incubation services to assist technology start-ups in their vulnerable stages, enabling them to grow and flourish. It supports office space and facilities, technical and management assistance, promotion and development assistance, business support and financial aid package.  Laws and Policies, it is the Intellectual Property Rights Office, Technology Licensing Office – facilities commercialization of Inventions and Legal Services. Financial Component is the investor, Business Sector, Funding Agencies and Financial Services (i.e. Accounting).

             To start the ball rolling there should have Innovationwho person gets an idea, active search, by chance, present employment or experience. Triggering Event - career prospects and deliberate choice. Implementation and last Growth. There are also three (3) vital common components for business: 1. excellent market opportunity – customer Need and timing, 2.  superb entrepreneur (and management team) – with the right opportunity, the business will be successful if led by a person with strong entrepreneurial and management skills, and 3.  resources needed to start the company and make it grow.

               Seed money is sometimes known as seed funding. It is a form of securities offering in which an investor purchases part of a business. The term seed suggests that this is an early investment, meant to support the business until it can generate cash of its own or until it is ready for further investments. Seed money options include friends and family funding, angel funding and – recently – crowd funding.

            Tapping Family and Friends is tapping personal ties to raise cash for a company that’s either too new or too small to get financing elsewhere is an age-old formula that still makes sense. Blood money is hitting up family and friends are the most common way to finance a start-up. It’s also the riskiest. Borrowing it is avoiding problems with family and friends, wen entrepreneurs borrow start-up capital from family member or friends, it’s best to prepare for the worst – before it happens. Borrowing money for your business whether you borrow money from a bank or someone you know, you should sign a promissory note – a legally binding contract in which you promise to repay the money. Steps to borrowing from family or friends are keeping the relationship professional is the key to successful borrowing from close acquaintances. Try bank borrowing bank financing isn’t impossible.Look into government programs – some entrepreneurs say government programs are easy to secure financing form; others say steer clear of them. Regardless of the opinions, if you’re serious about your capital search, you shouldn’t overlook government programs. Find an angel – angel investor will not only share their money; they’re also great sources of knowledge for fledgling businesses. Get creative ­– banks and investors aren’t the only ways to fund a business. Check out these unconventional resources that some business owners have used. Use credit cards – plastic can jump-start any business, but use it wisely.

             The nine (9) F’s are: 1.) Founders- first class entrepreneurs. 2.) Focused- focus on niche markets, specialize. 3.) Fast - decision making and implementation. 4.) Flexible - open minded and can respond to change. 5.) Forever innovating. 6.) flat – organizations. 7.) Frugal – low overhead, productivity high. 8.) Friendly – to their customers, suppliers and workers. 9.) Fun – to be associated with an entrepreneur company.

What is Intellectual Property (IP)?
Intellectual Property


            This refers to creations of the mind: inventions, literacy and artistic works, and symbols, names, images, and designs used in commerce. IP is divided into categories: industrial property, which includes inventions (patents), trademarks, industrial designs, and geographic indications of source and last is copyright, which includes literary and artistic works such as drawings, paintings, photographs and sculptures, and architectural designs. Intellectual Property Rights (IPR)– intellectual property rights are the rights given to persons over the creations of their minds. They usually give the creator an exclusive right over the use of his/her creation for a certain period of time. Intellectual property code of the Philippines, Republic act No. 8293 on June 6, 1997, this is an act prescribing the intellectual property code and establishing the intellectual property office, providing for its powers and functions, and for other purposes.

            A patent grants an inventor exclusive rights to make, use, sell, and import an invention for a limited period of time, in exchange for the public disclosure of the invention. An invention is a solution to a specific technological problem, which may be a product or a process. It is issued by the government through the intellectual property office of the Philippines (IP Philippines). Exclusive right granted for a product, process or an improvement of a product or process which is new, inventive and useful. This exclusive right gives the inventor the right to exclude others from making, using, or selling the product of his invention during the life of the patent. A patent has a term of protection of twenty (20) years providing an inventor significant commercial gain. In return, the patent owner must share the full description of the invention. This information is made available to the public in the form of the intellectual property official gazette and can be utilized as basis for future research and will in turn promote innovation and development. The official Gazette is the public journal and main publication of the government of the Philippines. http://www.gov.ph/ . A patentable invention has a technical solution to a problem, in any field of human activity, it must be NEW, it must involve an INVENTIVE STEP, and it must be INDUSTRIALLY APPLICABLE. A useful machine for statutory classes of invention is the following: a product or composition, a method or process, an improvement of any of the previous invention, microorganism, and non-biological microbiological process. Discovery of non-patentable inventions are scientific theory, mathematical methods, scheme, rule and method of performing mental act, playing games, doing business, program for computer, method of treatment for human or animal body by surgery or therapy & diagnostic method, plant variety or animal breed or essentially biological processes for the production of plants and animals, artistic creation and contrary to public order or morality. Requirements for patentability are novelty – originality, inventive step – creativity and industrial applicability – manufacturing and developed. An inventive involves an inventive step, if having regard to prior art, it is not obvious to a person skilled in the art of obviousness which not beyond normal progress of technology and skilled person which ordinary practitioner who is aware of common general knowledge in specific art. Natural person and juridical person or body of persons, a corporation, a partnership or other legal entity recognized by law may apply for a patent. Contents of the specification are the following: 1. Title of the invention. 2. Abstract of the disclosure. 3. Background of the invention. 4. Summary of the invention. 5. Brief description of the drawings. 6. Detailed description and 7. Claims. Applicant or inventor can prepare the patent application.

What is a trademark? Why is it important?

Trademarks
            
     Trademark is a tool used that differentiates goods and services from each other. A trademark can be one word, a group of words, sign, symbol, logo, or a combination of any of these. Generally, a trademark is a very effective tool that makes the public remember the quality of goods and services. Once a trademark becomes known, the public will keep on patronizing the products and services. Utilized properly, a trademark can become the most valuable business asset of an enterprise. In addition to making goods and services distinctive, the owner of a mark may earn revenues from the use of the mark by licensing its use by another or through franchising agreements. Service mark is same as trademark, but for a service. Trademark can be protected through registration. Registration gives the trademark owner the exclusive right to use the mark and to prevent others from using the same or similar marks on identical or related goods and services. The right to a trademark is granted to the one who first files a trademark application with the IP Philippines. Before applying for trademark registration, it would help if you conduct a search in the trademark database to determine if there are identical or similar marks that would prevent the registration of your mark. This is to prevent future conflicts with marks that are already registered or with earlier filing dates. The trademark protection granted by IP Philippines protects your mark only in the Philippines. If you want you mark protected outside the country, you will need to file applications in the countries where you want your market registered. Your mark should be able to distinguish your goods and services from those of others. Your mark should also meet the requirements for registrability of marks under Sec. 123.1 of the intellectual property codes. You mark will not be registered if it is descriptive, misleading, generic and customary to trade, consists of names, portraits or persons, maps, flags and other political symbols, shape and color, marks that may cause confusion and identical with, or confusingly similar to Well – known marks. The requirements to apply for registration are 1. A duly filled out trademark application form [you can access link from site]. 2. Drawing of the mark. 3. Payment of fees. Trademark Infringement is a mark that is likely to cause confusion with a trademark already existing in the marketplace. Trademark Counterfeiting is the deliberate copying of a mark. Trademark Dilution is the value of the mark is substantially reduced through competition or through the likelihood of confusion from another mark.

What is copyright?

            It is the protection for authors of original works whether published or unpublished. It covers original works of authors, composers, screenwriters, and computer programmer. Owner has the sole right to print, reprint, sell & distribute, revise, record and perform the work. “Original work” refers to every production in the literary, scientific and artistic domain. Among the literary and artistic works enumerated in the IP code includes books and other writings, musical works, films, paintings and other works and computer programs. Works are protected by the sole fact of their creation, irrespective of their mode of form of expression, as well as their content, quality and purpose. Thus, it does not matter if, in the eyes of some critics, a certain work has a little artistic value. So long as it has been independently created and has a minimum of creativity, the same enjoys copyright protection.

           




Thursday, July 18, 2013

Technopreneurship

Technopreneurship
We are now living in world full of technology and by the time its advancement is continuous. Since there is technology, there is also person who is selling a technology; since it is selling it is also called entrepreneurship. When we bond the technology and the entrepreneurship, that person is called technopreneurs. My blog discussion is all about technopreneurship.Let us first know what is entrepreneur and what is an entrepreneurship is.
According to what our instructor lecture to us, in earlier Viewpoints during 1700-1950’s, the word entrepreneur comes from French word ‘entrepredre’. “Entreprende “- is the individuals who undertake (the risk of new ventures). Entrepreneurspeople who enter into new and pioneering ventures. It is also the whole-brained, meaning he/she uses both the left brain (logical) and right brain (creative). Entrepreneurs invests, transforms and makes (profit or loss), it is according to Richard Cantillon, French economist. Entrepreneurship involves having the guts to do what you believe is right, thinking out of the box and making business out of it.
Now let us know what technopreneurship is. Technopreneurship is high tech ventures in ICT, electronics, internet, ife sciences biotech. Service firms where technology is critical to their mission, such as: e-Bay, FEDEX, SMART money transfer, e-learning. Technology + Entrepreneurship is technoprenuership. Technopreneurship is entrepreneurship in the field of technology. Technopreneurship is being an entrepreneur by: 1.) using existing technologies & suiting it to a new application. 2.) Inventing or developing a new product. Technopreneurship innovations are not confied to tangible products but also include services and processes. According to anonymous, it is “someone who uses technology to do something new or invents new devices & then makes a business from selling these new things”. According to Mankani,D., describing an entrepreneur who uses cutting-edge technology to develop new business models.
The following are the importance of technopreneurship:
1.    Employment creation – entrepreneurs create employment for themselves and other people. They are employers, and hence assists in solving the unemployment problem in the country.
2.    Local resources – when entrepreneurs utilize local resources, the value of these resources increases.
3.    Decentralization and diversification of business – entrepreneurs are able to identify business opportunities and locate business in suitable areas, including rural areas.
4.    Promotion of technology – by being creative, entrepreneurs are able to contribute to the utilization and development of technology.
5.    Capital formation – entrepreneurship increases capital formation and investment.
6.    Promotion of an entrepreneurial culture – by projecting successful images, entrepreneurs become models than can be copied by young people.

How can one be pioneering in the field of technology?
  • The mindset of a person should always be looking out for innovation.
  • A technopreneur needs to think “out of the box”. The box is the logic of an industry, business or product.
  • Logic answers why people are buying that product, why is the entrepreneur using that kind of raw material, etc. Thus, an entrepreneur has to look at the box and find something that is different. He/she doesn’t just copy what is currently available in the industry/business.
  •  Logic is the foundation to start thinking out of the box. LOGIC topped with CREATIVITY results to INNOVATION.
  •  Logic answers “why?”. Creativity answers “why not?”.

Why become a Technopreneur?
  • Thousands of new ventures have been set up every year around the world and venture capitalists have invested billions of dollars into these business.
  • The internet is still in its infancy.
  •  Many technopreneurs are hoping that their product, service or solution will become the industry standard in their chosen field in the same manner as we have internet explorer for web browsing, Amazon for online book and eBay for internet auction.
  • High risk for technopreneur investment but their rewards are great such as founders of Microsoft, Amazon and eBay and their backers.

What does a Technopreneur do?
  1. Generate new business idea.
  2.  Able to identify the business or consumer need.
  3.   Not limited to a certain idea but expand the idea.
  4.   Identifying market needs and offering the solution.
  5.   He has to ensure the technology to make the idea work exists or can be developed at reasonable cost and within a reasonable time.
  6.   He thinks of workable idea, then bounces it to friends or associates. After receiving feedback, and deciding, he starts the business plan. Fnally. He tries to get financing.

COURSE MODEL –SEED
1.    Self – Mastery – self-mastery passions come from knowing yourself. Self-mastery brings passion. When you know yourself, you know what you want and do not want.

Ø  What is self mastered person?
·         Does not need high Intellectual Quotient (IQ) – if it is high, this will be beneficial to him or her.
·         Does not need high Emotional Quotient (EQ) – ability for an entrepreneur/technopreneur to connect to the people and be able to feel others emotional easily.
·         Does need high Adversity Quotient (AQ) – is the ability to rise up after a failure and to go against the norm.

Ø  Is naturally a/an: he can shift to different personality traits according to the need of the moment.
o   Performer- competitive and efficient.
o   Epicure (enthusiast) – sensual and cheery.
o   Boss – takes a change and loves a good fight.
Ø  Is whole-brained (he/she uses both the left brain (logical) and right brain (creative))
Ø  Has a personal vision and knows strengths and weaknesses.

2.    Environment Mastery  - is about generating business ideas and seeking opportunities out from his or her environment trough:
·   Serendipity walks: have you ever taken a walk and stumbled upon something completely unexpected?
·   Crisis: there is opportunity in crisis
·   Trends: opportunities and innovation ideas can be found in current trends and fashion.
·   Others: hobbies/interests, personal skills and experiences.

Ø  What is an environment-mastered person?
·   Understands the industry he/she is in
·   Sees the opportunities, not the problems
·   Is on top of the situation instead of being under the situation
·   Is the organization/industry innovator and strategist


3.    Enterprise Mastery – is how to run a business. This pertains to the knowledge of the different enterprise disciplines such as:
·   Creating the business
·   Marketing Management – when you start a venture, start with marketing. Marketing is creating a promise.
·   Operations Management – operation is keeping the promise and how to make the perception a reality.
·   Financial Management – the best way to protect your invention or technology is to put only a small margin on your product.
·   Risk Management – being a technopreneur involves some risks. Technopreneurs have the ability to take measured or calculated risks.
Ø  What is an enterprise-mastered person?
·   Understands and integrates the functions of management (marketing, human resource, operations, and finance)
·   Understands and integrates the process of management (planning, organizing, directing, and controlling)
·   Leads and inspires rather than manage.


Ø  Development of Business Plan covers:
·   Writing the business plan
·   Presenting and defending the business plan
·   Adding refinements to the presented business plan

FOUR TYPES OF ENTREPRENEURSHIP
1.    Incremental
·         Routine business, modest innovation
Ex. (new coffee shop, new BPO)

2.    Imitative
·         imitation of ventures, same business model and template
Ex. New regional branch, franchised operations\

3.    Rent – Seeking
·         Business that utilizes standards, regulations and laws to share in value of enterprise
Ex. Coca Cola Export
4.    Innovation
·         Business based on innovation
Ex. New memory chip

CHARACTERISTICS OF AN ENTREPRENEUR
1.    Hard Working
2.    Self-confident
3.    Builds for the Future
4.     Profit- Oriented
5.    Goal – Oriented
6.    Persistent
7.    Copes with Failure
8.    Responds to feedback
9.    Demonstrates initiative ­.
10.   Willing to listen
11.  Sets Own Standards
12.  Copes with uncertainty
13.  Committed
14.  Builds on Strength
15.  Reliable and has Integrity
16.  Risk – taker

Ø  What makes an entrepreneur a Technopreneur?
o   A technology idea owner who ventures to make his ides a commercial reality.
o   An entrepreneur, who gets a technology idea, finds an opportunity to make it a commercial reality.
o   Entrepreneur seem to be the starter and managers the followers
o   Managers do not start business, they only manage them.

o   In the world of corporate business, intrapreneurs emerge as that breed who is a cross between managers and entrepreneurs.

Monday, February 4, 2013

Computer Security

Computer Security


I.INTRODUCTION

Nowadays, we people rely on computer in doing our assignments, research something or create something and we do also store useful information. It is very important for the information to be stored and kept well so that if want to use it, it is easy for you to find it. It’s totally important that we have our security or protector in our computer to prevent waste of information, data loss and etc. example of this is business information, it should be keep properly to secure and protected from hackers. . A computer security risk is any action that could cause loss of information to software, data, processing incompatibilities or damage to computer hardware.

According to Microsoft ® Encarta ® 2009. © 1993-2008 Microsoft Corporation. Computer Security, techniques developed to safeguard information and information systems stored on computers. Potential threats include the destruction of computer hardware and software and the loss, modification, theft, unauthorized use, observation, or disclosure of computer data.
Computers and the information they contain are often considered confidential systems because their use is typically restricted to a limited number of users. This confidentiality can be compromised in a variety of ways. For example, computers and computer data can be harmed by people who spread computer viruses and worms. A computer virus is a set of computer program instructions that attaches itself to programs in other computers. The viruses are often parts of documents that are transmitted as attachments to e-mail messages. A worm is similar to a virus but is a self-contained program that transports itself from one computer to another through networks. Thousands of viruses and worms exist and can quickly contaminate millions of computers.

People who intentionally create viruses are computer experts often known as hackers. Hackers also violate confidentiality by observing computer monitor screens and by impersonating authorized users of computers in order to gain access to the users’ computers. They invade computer databases to steal the identities of other people by obtaining private, identifying information about them. Hackers also engage in software piracy and deface Web sites on the Internet. For example, they may insert malicious or unwanted messages on a Web site, or alter graphics on the site. They gain access to Web sites by impersonating Web site managers.
Malicious hackers are increasingly developing powerful software crime tools such as automatic computer virus generators, Internet eavesdropping sniffers, password guessers, vulnerability testers, and computer service saturators. For example, an Internet eavesdropping sniffer intercepts Internet messages sent to other computers. A password guesser tries millions of combinations of characters in an effort to guess a computer’s password. Vulnerability testers look for software weaknesses. These crime tools are also valuable security tools used for testing the security of computers and networks.
An increasingly common hacker tool that has gained widespread public attention is the computer service saturator, used in denial-of-service attacks, which can shut down a selected or targeted computer on the Internet by bombarding the computer with more requests than it can handle. This tool first searches for vulnerable computers on the Internet where it can install its own software program. Once installed, the compromised computers act like “zombies” sending usage requests to the target computer. If thousands of computers become infected with the software, then all would be sending usage requests to the target computer, overwhelming its ability to handle the requests for service.
A variety of simple techniques can help prevent computer crimes, such as protecting computer screens from observation, keeping printed information and computers in locked facilities, backing up copies of data files and software, and clearing desktops of sensitive information and materials. Increasingly, however, more sophisticated methods are needed to prevent computer crimes. These include using encryption techniques, establishing software usage permissions, mandating passwords, and installing firewalls and intrusion detection systems. In addition, controls within application systems and disaster recovery plans are also necessary.


Use to backup any files.
II.BACKUP

Storing backup copies of software and data and having backup computer and communication capabilities are important basic safeguards because the data can then be restored if it was altered or destroyed by a computer crime or accident. Computer data should be backed up frequently and should be stored nearby in secure locations in case of damage at the primary site. Transporting sensitive data to storage locations should also be done securely.


III.ENCRYPTION
To encrypt HTML

Another technique to protect confidential information is encryption. Computer users can scramble information to prevent unauthorized users from accessing it. Authorized users can unscramble the information when needed by using a secret code called a key. Without the key the scrambled information would be impossible or very difficult to unscramble. A more complex form of encryption uses two keys, called the public key and the private key, and a system of double encryption. Each participant possesses a secret, private key and a public key that is known to potential recipients. Both keys are used to encrypt, and matching keys are used to decrypt the message. However, the advantage over the single-key method lies with the private keys, which are never shared and so cannot be intercepted. The public key verifies that the sender is the one who transmitted it. The keys are modified periodically, further hampering unauthorized unscrambling and making the encrypted information more difficult to decipher.



IV.APPROVED USERS

Another technique to help prevent abuse and misuse of computer data is to limit the use of computers and data files to approved persons. Security software can verify the identity of computer users and limit their privileges to use, view, and alter files. The software also securely records their actions to establish accountability. Military organizations give access rights to classified, confidential, secret, or top-secret information according to the corresponding security clearance level of the user. Other types of organizations also classify information and specify different degrees of protection.

SmartCard is an example that has an a password.
V.PASSWORD

Passwords are confidential sequences of characters that allow approved persons to make use of specified computers, software, or information. To be effective, passwords must be difficult to guess and should not be found in dictionaries. Effective passwords contain a variety of characters and symbols that are not part of the alphabet. To thwart imposters, computer systems usually limit the number of attempts and restrict the time it takes to enter the correct password. The best example of this is SMART CARDS.
A more secure method is to require possession and use of tamper-resistant plastic cards with microprocessor chips, known as “smart cards,” which contain a stored password that automatically changes after each use. When a user logs on, the computer reads the card's password, as well as another password entered by the user, and matches these two respectively to an identical card password generated by the computer and the user's password stored in the computer in encrypted form. Use of passwords and 'smart cards' is beginning to be reinforced by biometrics, identification methods that use unique personal characteristics, such as fingerprints, retinal patterns, facial characteristics, or voice recordings.


Firewall.
VI.FIREWALLS


Computers connected to communication networks, such as the Internet, are particularly vulnerable to electronic attack because so many people have access to them. These computers can be protected by using firewall computers or software placed between the networked computers and the network. The firewall examines, filters, and reports on all information passing through the network to ensure its appropriateness. These functions help prevent saturation of input capabilities that otherwise might deny usage to legitimate users, and they ensure that information received from an outside source is expected and does not contain computer viruses.



Intrusion Detection
VII. INTRUSION DETECTION SYSTEMS

Security software called intrusion detection systems may be used in computers to detect unusual and suspicious activity and, in some cases, stop a variety of harmful actions by authorized or unauthorized persons. Abuse and misuse of sensitive system and application programs and data such as password, inventory, financial, engineering, and personnel files can be detected by these systems.




VIII.APPLICATION SAFEGUARDS
Application Security


The most serious threats to the integrity and authenticity of computer information come from those who have been entrusted with usage privileges and yet commit computer fraud. For example, authorized persons may secretly transfer money in financial networks, alter credit histories, sabotage information, or commit bill payment or payroll fraud. Modifying, removing, or misrepresenting existing data threatens the integrity and authenticity of computer information. For example, omitting sections of a bad credit history so that only the good credit history remains violates the integrity of the document. Entering false data to complete a fraudulent transfer or withdrawal of money violates the authenticity of banking information. These crimes can be prevented by using a variety of techniques. One such technique is checksumming. Checksumming sums the numerically coded word contents of a file before and after it is used. If the sums are different, then the file has been altered. Other techniques include authenticating the sources of messages, confirming transactions with those who initiate them, segregating and limiting job assignments to make it necessary for more than one person to be involved in committing a crime, and limiting the amount of money that can be transferred through a computer.


IX.DISASTER RECOVERY PLANS

Disaster recovery Plan
Organizations and businesses that rely on computers need to institute disaster recovery plans that are periodically tested and upgraded. This is because computers and storage components such as diskettes or hard disks are easy to damage. A computer's memory can be erased or flooding, fire, or other forms of destruction can damage the computer’s hardware. Computers, computer data, and components should be installed in safe and locked facilities.