You are on page 1of 3

TECHNOPRENEURSHIP

Technopreneurship it is a simple entrepreneurship in a technology intensive context. It is a process of merging


technology prowess and entrepreneurial talent and skills.

Technopreneur is the person who destroys the existing economic order by introducing, new products and services,
by creating new forms of organizations and by exploiting new raw materials. It is someone who perceives
an opportunity and creates an organization to pursue it. A person who undertakes risks that has the chance of profit.
Technopreneurs distinguishes themselves through their ability to accumulate and manage knowledge, as well as
their ability to mobilized resources to achieve a specified business or social goal.

Entrepreneurship is a way of thinking and acting that is opportunity obsessed, holistic approach and leadership
balanced for the purpose of wealth creation. Searches for change , responds to it, and exploits it as an opportunity.
Innovation is the specific tool of entrepreneurs, the means by which they exploits change as an opportunity for a
different business or a different service. Entrepreneurship pursuit of opportunity without regard to the resources
currently under one’s control.

ADOBE ANIMATE

Adobe Animate (formerly Adobe Flash Professional, Macromedia Flash, and FutureSplash Animator) is a
multimedia authoring and computer animation program developed by Adobe Systems.[1]
Animate can be used to design vector graphics and animation, and publish the same for television programs, online
video, websites, web applications, rich internet applications, and video games. The program also offers support
for raster graphics, rich text, audio and video embedding, and ActionScript scripting. Animations may be published
for HTML5, WebGL, Scalable Vector Graphics (SVG) animation and spritesheets, and legacy Flash Player (SWF)
and Adobe AIR formats.[2]
It was first released in 1996 as FutureSplash Animator, and then renamed Macromedia Flash upon its acquisition
by Macromedia. It was created to serve as the main authoring environment for the Adobe Flash platform, vector-
based software for creating animated and interactive content. It was renamed Adobe Animate in 2016 to better reflect
its market position then, since over a third of all content created in Animate uses HTML5.[2][3][4]
The first version of Adobe Flash/Adobe Animate was FutureSplash Animator, a vector graphics and vector
animations program released in May 1996. FutureSplash Animator was developed by FutureWave Software, a small
software company whose first product, SmartSketch, was a vector-based drawing program for pen-based computers.
With the implosion of the pen-oriented operated systems, it was ported to Microsoft Windows as well as Apple
Inc.'s Classic Mac OS. In 1995, the company decided to add animation abilities to their product and to create a
vector-based animation platform for World Wide Web; hence FutureSplash Animator was created. (At that time, the
only way to deploy such animations on the web was through the use of Java.) The FutureSplash animation
technology was used on several notable websites such as MSN, The Simpsons website and Disney Daily
Blast of The Walt Disney Company.[5][6]
In December 1996, Macromedia bought FutureWave and rebranded the product as Macromedia Flash, a brand name
that continued for 8 major versions. Adobe Systems acquired Macromedia in 2005, and re-branded the product
Adobe Flash Professional to distinguish from the player, Adobe Flash Player. It was included as part of the Creative
Suite of products from CS3 to CS6, until Adobe phased out the Creative Suite lineup in favor of Creative
Cloud (CC).
On December 1, 2015, Adobe announced that the program would be renamed Adobe Animate on its next major
update. The move comes as part of an effort to disassociate the program from Adobe Flash Player, acknowledging
its increased use for authoring HTML5 and video content, and an effort to begin discouraging the use of Flash
Player in favor of web standards-based solutions.[7] The first version under the new name was released February 8,
2016.[1]
MACHINE LEARNING

Machine learning is an application of artificial intelligence that automates analytical model building by
using algorithmsthat iteratively learn from data without being explicitly programmed where to look. [1] It constitutes
subfield of computer science that, according to Arthur Samuel, gives "computers the ability to learn without being
explicitly programmed."[2][3][verify] Samuel, an American pioneer in the field of computer gaming and artificial
intelligence, coined the term "machine learning" in 1959 while at IBM[4]. Evolved from the study of pattern
recognition and computational learning theory in artificial intelligence,[5] machine learning explores the study and
construction of algorithms that can learn from and make predictions on data[6] – such algorithms overcome
following strictly static program instructions by making data-driven predictions or decisions,[7]:2 through building
a model from sample inputs. Machine learning is employed in a range of computing tasks where designing and
programming explicit algorithms with good performance is difficult or infeasible; example applications
include email filtering, detection of network intruders or malicious insiders working towards a data breach,[8] optical
character recognition (OCR),[9] learning to rank, and computer vision.
Machine learning is closely related to (and often overlaps with) computational statistics, which also focuses on
prediction-making through the use of computers. It has strong ties to mathematical optimization, which delivers
methods, theory and application domains to the field. Machine learning is sometimes conflated with data
mining,[10] where the latter subfield focuses more on exploratory data analysis and is known as unsupervised
learning.[7]:vii[11] Machine learning can also be unsupervised[12] and be used to learn and establish baseline behavioral
profiles for various entities[13] and then used to find meaningful anomalies.
Within the field of data analytics, machine learning is a method used to devise complex models and algorithms that
lend themselves to prediction; in commercial use, this is known as predictive analytics. These analytical models
allow researchers, data scientists, engineers, and analysts to "produce reliable, repeatable decisions and results" and
uncover "hidden insights" through learning from historical relationships and trends in the data. [14]
As of 2016, machine learning is a buzzword, and according to the Gartner hype cycle of 2016, at its peak of inflated
expectations.[15] Effective machine learning is difficult because finding patterns is hard and often not enough training
data is available; as a result, machine-learning programs often fail to deliver.[16][17]
Tom M. Mitchell provided a widely quoted, more formal definition of the algorithms studied in the machine
learning field: "A computer program is said to learn from experience E with respect to some class of tasks T and
performance measure P if its performance at tasks in T, as measured by P, improves with experience E."[18]This
definition of the tasks in which machine learning is concerned offers a fundamentally operational definition rather
than defining the field in cognitive terms. This follows Alan Turing's proposal in his paper "Computing Machinery
and Intelligence", in which the question "Can machines think?" is replaced with the question "Can machines do what
we (as thinking entities) can do?".[19] In Turing's proposal the various characteristics that could be possessed by
a thinking machine and the various implications in constructing one are exposed.

NETWORK SECURITY

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and network-accessible resources. Network security involves the
authorization of access to data in a network, which is controlled by the network administrator. Users choose or are
assigned an ID and password or other authenticating information that allows them access to information and
programs within their authority. Network security covers a variety of computer networks, both public and private,
that are used in everyday jobs; conducting transactions and communications among businesses, government
agencies and individuals. Networks can be private, such as within a company, and others which might be open to
public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its
title explains: It secures the network, as well as protecting and overseeing operations being done. The most common
and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.
Network security starts with Authentication, commonly with a username and a password. Since this requires just one
detail authenticating the user name—i.e., the password—this is sometimes termed one-factor authentication.
With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card,
or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g.,
a fingerprint or retinal scan).
Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the
network users.[1] Though effective to prevent unauthorized access, this component may fail to check potentially
harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or
an intrusion prevention system (IPS)[2] help detect and inhibit the action of such malware. An anomaly-based
intrusion detection system may also monitor the network like wireshark traffic and may be logged for audit purposes
and for later high-level analysis. Newer systems combining unsupervised machine learning with full network traffic
analysis can detect active network attackers from malicious insiders or targeted external attackers that have
compromised a user machine or account.[3]
Communication between two hosts using a network may be encrypted to maintain privacy.
Honeypots, essentially decoy network-accessible resources, may be deployed in a network as surveillance and early-
warning tools, as the honeypots are not normally accessed for legitimate purposes. Techniques used by the attackers
that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on
new exploitation techniques. Such analysis may be used to further tighten security of the actual network being
protected by the honeypot. A honeypot can also direct an attacker's attention away from legitimate servers. A
honeypot encourages attackers to spend their time and energy on the decoy server while distracting their attention
from the data on the real server. Similar to a honeypot, a honeynet is a network set up with intentional
vulnerabilities. Its purpose is also to invite attacks so that the attacker's methods can be studied and that information
can be used to increase network security. A honeynet typically contains one or more honeypots.[4]

You might also like