My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
7.0. EDSR 09-13-2004
ElkRiver
>
City Government
>
Boards and Commissions
>
Economic Development Authority
>
EDA Packets
>
2003-2013
>
2004
>
09-13-2004
>
7.0. EDSR 09-13-2004
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
2/4/2016 3:36:50 PM
Creation date
2/4/2016 3:36:21 PM
Metadata
Fields
Template:
City Government
type
EDSR
date
9/13/2004
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
12
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
• <br /> Ia <br /> LapTwo Technologies, LLC <br /> 16820 Highway 10, Suite 130 <br /> Elk River, Minnesota 55330-6105 <br /> 763-633-9434 <br /> www.laptwo.corn <br /> Executive Brief: LapTwo Technologies, LLC, August 27, 2004 <br /> Company Formation <br /> LapTwo began full-time operations in July, 2003 with investors Robert <br /> Henningsgard (founder of sixteen year old Elk River software company <br /> FASTechnologies) , and Harlan Jacobs of Genesis Business Centers. In <br /> August 2004, the Elk River Economic Development Authority made an <br /> investment in the company, by accepting LapTwo into its Business <br /> Incubator program. <br /> The principal business activity of the company in the period from July <br /> 2003 to March 2004 was research, primarily in the emerging areas of <br /> mobile computing of all kinds. This led to several proposed business <br /> plans which sounded promising, but which were discarded as nonviable <br /> for various reasons upon in-depth market research. <br /> Product Area <br /> • In March 2004, the decision was taken to pursue the development of a <br /> guest access control system for internet hospitality providers. <br /> Several such systems were available at that time but, in the collective <br /> opinion of many industry observers, they were all primitive at best. <br /> Also encouraging was the observation that the systems available from <br /> even notable, top-tier suppliers such as Toshiba, T-Mobile, and Cisco <br /> were very primitive, as well as being demonstrably vulnerable to <br /> various hacking, spoofing, and session-hijacking attacks. <br /> Some in-depth research of the potential problems with (and <br /> opportunities for improving upon) existing hospitality systems revealed <br /> that with existing systems: <br /> • It was either relatively easy (or completely automatic) for <br /> clients to gain access and use the connection without <br /> authorization. <br /> • Multiple client systems connected at the same time were <br /> completely unprotected from each other, allowing viruses and <br /> worms to propagate from one client to another. <br /> • There were no restrictions on outgoing email, making it possible <br /> for users (authorized or not) to run "spamming" programs, thereby <br /> violating the internet connection terms of service of the <br /> hospitality provider. <br /> one of four <br />
The URL can be used to link to this page
Your browser does not support the video tag.