TWO’S COMPLEMENT, LLC T HE V I E W S E N D E R P A TH A N D P R O M I S E BUSINESS PLAN-APPENDIX VERSION 1.10 - JUNE 2009 Contact Information: Owner: Website: Contact: Address: Telephone: E-mail: Two’s Complement, LLC www.TwosComplementLLC.com Scott Deaver 2777 Woodland Park Drive #814 Houston, Texas 77082-6648 832.889.5089 scottdeaver@hotmail.com June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] Cover page NOTICE AND DISCLAIMER This document contains confidential and proprietary information belonging exclusively to Scott Deaver and Two’s Complement, LLC. Note: This is a business plan only. It does not imply or propose a sale or offering of Securities. Copy Number ___ 2 Notice and disclaimer | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 DISCLOSURE STATEMENT The information presented in this document has been prepared to provide information to potential investors or other interested parties in order to familiarize them with the business concept, organizational details, and future prospects as defined herein. Information contained herein is sensitive and confidential and is solely intended for the purpose of evaluating the company for future possible investment consideration. The information contained herein shall be treated as Confidential and Proprietary in nature. By accepting receipt of this document the recipient agrees not to disclose, reproduce, or distribute this information, in whole or in part, to any other person or entity without the prior written permission of Two’s Complement, LLC management. __________________________________________________________________________ Name (typed or printed) ________________________ Date __________________________________________________________________________ Signature ©2006-2009 Two's Complement, LLC. | Disclosure Statement 3 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] TABLE OF CONTENTS Notice and disclaimer .......................................................................................................................................... 2 Disclosure Statement ........................................................................................................................................... 3 A-1: Additional Confidential Information Disclosure Notice and Statement ................................... 6 A-1.1:ONE-WAY CONFIDENTIALITY AND NON-DISCLOSURE AGREEMENT ............................................ 7 A-1.1.1: PARTIES ............................................................................................................................................................ 7 A-1.1.2: BACKGROUND AND PURPOSE OF DISCLOSURE .............................................................................. 7 A-1.1.3: DESCRIPTION OF CONFIDENTIAL INFORMATION ........................................................................ 7 A-1.1.4: AGREEMENT TO MAINTAIN CONFIDENTIALITY............................................................................ 7 A-1.1.5: EFFECTIVE DATE AND LENGTH OF OBLIGATION.......................................................................... 7 A-1.1.6: EXCEPTIONS TO CONFIDENTIAL INFORMATION .......................................................................... 8 A-1.1.7: RETURN OF CONFIDENTIAL INFORMATION ................................................................................... 8 A-1.1.8: DISCLAIMER OF OTHER RELATIONSHIPS ......................................................................................... 8 A-1.1.9: GOVERNING LAW ......................................................................................................................................... 8 A-1.1.10: AMENDMENTS ............................................................................................................................................ 8 A-1.1.11: BREACH .......................................................................................................................................................... 8 A-2: Background Summaries of Principals................................................................................................ 10 A-2.1: Scott Deaver ........................................................................................................................................................... 10 A-2.2: Geethanjali Manjuladevi Ramachandrappa .............................................................................................. 12 A-2.3: Chandra Thornton-Fontenot .......................................................................................................................... 12 A-2.4: Susanne Pack ......................................................................................................................................................... 13 A-2.5: James A. Cardle ..................................................................................................................................................... 13 A-3: Company Management Considerations ............................................................................................. 14 A-3.1: The reluctant entrepreneur ............................................................................................................................ 14 A-3.2: Fallback plan.......................................................................................................................................................... 14 A-4: Detailed Discussion of Products and Services ................................................................................ 15 A-5: Product Version Notes and Release Schedule ................................................................................. 18 A-5.1: Product version marketing notes ................................................................................................................. 19 A-6: Detailed Marketing Comments ............................................................................................................. 20 A-6.1: Promotional ideas ............................................................................................................................................... 21 A-6.1: Opportunities ........................................................................................................................................................ 25 A-6.2: Challenges............................................................................................................................................................... 27 A-6.2.1: Establishing recognition for a new product class.......................................................................... 27 4 Table of Contents | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 A-6.2.2: Avoiding associations with the wrong product class ................................................................... 28 A-6.2.3: Competitive products for sale................................................................................................................ 28 A-6.2.4: Products customers currently use ....................................................................................................... 31 A-6.2.5: Unique risks .................................................................................................................................................. 32 A-6.3: Our conclusions .................................................................................................................................................... 33 A-7: Business Plan Section 5 supplemental Information ..................................................................... 34 A-7.1: Comments ............................................................................................................................................................... 34 A-7.2: Transition in customer relationship............................................................................................................ 35 A-7.3: Transition in physical infrastructure .......................................................................................................... 36 A-7.4: Transition in product lineup........................................................................................................................... 36 A-7.5: Ancillary products ............................................................................................................................................... 37 A-7.5.1: Derived from text extraction .................................................................................................................. 37 A-7.5.2: Derived from image collection .............................................................................................................. 38 A-7.5.3: Derived from keystrokes and user information ............................................................................. 38 A-7.5.4: Other product opportunities .................................................................................................................. 38 A-7.6: Addition of services to the mix ...................................................................................................................... 39 A-7.6.1: Custom software ......................................................................................................................................... 40 A-7.6.2: Turnkey setup and monitoring ............................................................................................................. 40 A-7.6.3: Analysis and archiving .............................................................................................................................. 40 A-7.6.4: Custom deployments ................................................................................................................................. 41 A-7.6.5: Service and support contracts ............................................................................................................... 41 A-7.6.4: Solutions for special circumstances .................................................................................................... 41 A-7.7: Unique and boutique opportunities ............................................................................................................ 43 A-8: For investors ............................................................................................................................................... 44 A-8.1: Detailed Development Milestones................................................................................................................ 44 A-8.1.3: Assumptions.................................................................................................................................................. 45 A-8.1.4: Milestones ...................................................................................................................................................... 46 A-9: Errata ............................................................................................................................................................. 49 A-9.1:Security Considerations Regarding the ViewSender Agent ................................................................ 49 A-9.1.1: Issues................................................................................................................................................................ 49 A-9.1.2: Resolution ...................................................................................................................................................... 51 ©2006-2009 Two's Complement, LLC. | Table of Contents 5 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] A-1: ADDITIONAL CONFIDENTIAL INFORMATION DISCLOSURE NOTICE AND STATEMENT If you are considering investing or participating in the ViewSender project, you may have an interest or need to review certain highly-sensitive proprietary information not included in the business plan, such as samples of our source code or copies of internal communications. To request information of a confidential nature that is not included in the business plan, please write a letter stating the specific information you are requesting, a detailed reason for your request, and a description of yourself and the entity you are representing (if appropriate). If you are submitting the request on the behalf of others, please list descriptive and identifying information for all individuals and organizations who will view or possess the confidential information. Please complete the non-disclosure agreement in the pages following this notice, and submit the completed signed agreement along with the letter by mail to: F. Scott Deaver 2777 Woodland Park Drive #814 Houston, Texas 77082-6648 or by email to: mailto:mscottdeaver@hotmail.com. Please note that not all requests can be honored, and each request will be independently evaluated based on its merits and circumstances. No requests will be honored without a signed non-disclosure. 6 | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 A-1.1:ONE-WAY CONFIDENTIALITY AND NON-DISCLOSURE AGREEMENT A-1.1.1: PARTIES This Agreement is between Disclosing Party (as described below), the Disclosing Party of certain confidential information, and Receiving Party (as described below), the Receiving Party of certain confidential information. A-1.1.2: BACKGROUND AND PURPOSE OF DISCLOSURE Disclosing Party and Receiving Party are evaluating or are engaged in a business relationship (the "Projects"), during which Disclosing Party may disclose certain valuable confidential and proprietary information. A-1.1.3: DESCRIPTION OF CONFIDENTIAL INFORMATION Confidential Information, whether disclosed in written, oral, visual, or tangible form, disclosed by Disclosing Party to Receiving Party shall be subject to the provisions of the Agreement when: (a) the information is disclosed in written form which is marked confidential; or (b) the information is disclosed orally or visually (such as through visits to facilities of the Disclosing Party) and is identified at the time of disclosure as being confidential, and within thirty (30) days thereafter, a written summary of such oral or written disclosures is provided to the Receiving Party; or (c) when disclosed in tangible form (such as product samples), it is identified at the time of disclosure as being confidential. Moreover, Confidential Information shall also include (whether marked confidential or not) data regarding the quantity, price, delivery, or other commitments or proposals between the parties. A-1.1.4: AGREEMENT TO MAINTAIN CONFIDENTIALITY The Receiving Party agrees to hold any Confidential Information disclosed to it in confidence, to cause its employees, agents or other third parties to hold such Confidential Information in confidence, and to use the same standard of care used to protect its own proprietary and confidential information in protecting the Confidential Information. Receiving Party shall not disclose Confidential Information to others or use it for purposes other than the Project(s). A-1.1.5: EFFECTIVE DATE AND LENGTH OF OBLIGATION This Agreement is effective as of the last date of execution by both parties and may be terminated by either party at any time upon written notice. Parties’ obligation of confidentiality and non-use of Confidential Information hereunder shall last for seven (7) years from the date of such written notice. ©2006-2009 Two's Complement, LLC. | A-1: Additional Confidential Information Disclosure Notice and Statement 7 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] A-1.1.6: EXCEPTIONS TO CONFIDENTIAL INFORMATION Confidential Information shall not include any information which (a) was publicly available at the time of disclosure; (b) became publicly available after disclosure without breach of this Agreement by either party; (c) was in parties’ possession prior to disclosure, as evidenced by parties’ written records, and was not the subject of an earlier confidential relationship with the other party; (d) was rightfully acquired by party after disclosure by the other party from a third party who was lawfully in possession of the information and was under no obligation to the other party to maintain its confidentiality; (e) is independently developed by the parties’ employees or agents who have not had access to the Confidential Information; or (f) is required to be disclosed by the party pursuant to judicial order or other compulsion of law, provided that the party shall provide to the other party prompt notice of such order and comply with any protective order imposed on such disclosure. A-1.1.7: RETURN OF CONFIDENTIAL INFORMATION At any time requested by one of the parties, the other party shall return or destroy all documents, samples or other materials embodying Confidential Information, shall retain no copies thereof, and shall certify in writing that such destruction or return has been accomplished. A-1.1.8: DISCLAIMER OF OTHER RELATIONSHIPS This Agreement does not create a relationship of agency, partnership, joint venture or license between the parties. This Agreement does not obligate either party to purchase anything from or sell anything to the other party, and each party acknowledges the other party may enter into (a) other similar activities and/or (b) business relationships with third parties, provided no Confidential Information is disclosed or used by either party. A-1.1.9: GOVERNING LAW This Agreement shall be governed by and construed in accordance with the laws of the State of Texas, without reference to conflicts of law principles. The parties hereby submit and consent to the jurisdiction of the federal and state courts of the state referenced in the preceding clause for purposes of any legal action arising out of this Agreement. A-1.1.10: AMENDMENTS This Agreement supersedes all previous agreements between the parties regarding the Confidential Information and cannot be canceled, assigned or modified without the prior written consent of the Parties. A-1.1.11: BREACH 8 A-1: Additional Confidential Information Disclosure Notice and Statement | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 If either party breaches the term(s) of this Agreement, the other party shall have the right to (a) terminate this Agreement and/or demand the immediate return of all Confidential Information; (b) recover its actual damages incurred by reason of such breach, including, without limitation, its attorneys fees and costs of suit as well as profits obtained by the breaching party as a result of misusing the Confidential Information; (c) obtain injunctive relief to prevent such breach or to otherwise enforce the terms of this Agreement; and (d) pursue any other remedy available at law or in equity. Failure to properly demand compliance or performance of any term of this Agreement shall not constitute a waiver of the parties’ rights hereunder. Receiving Party Disclosing Party Signature _________________________________ Name _____________________________________ Title _______________________________________ Company _________________________________ Date _______________________________________ Signature __________________________________________ Name ______________________________________________ Title _______________________________________________ Company _Two's Complement LLC____________ Date _______________________________________________ By signing above or entering electronically below, both parties agree to be bound by the terms of this document. ©2006-2009 Two's Complement, LLC. | A-1: Additional Confidential Information Disclosure Notice and Statement 9 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] A-2: BACKGROUND SUMMARIES OF PRINCIPALS A-2.1: SCOTT DEAVER Scott Deaver has been a successful software engineer and consultant on leading-edge, innovative, or highly-specialized software for twenty years. He has been successful developing state-of-the-art software in environments as diverse as global Fortune 500 corporations through the smallest of family-owned software-based startups. A brief list of the companies for whom he was worked and the nature of the projects he worked on would include the following: Weatherford International Production optimization for gas and liquid wells ICS, Inc. (CommandSystems.com) Video, entrance control, and status/detection device monitoring SysInformation, Inc. Forensic extraction of data from hard drives for the legal profession Smith International, Inc. Drill string torque and drag calculation during drilling operations Emerson Process Management, Inc. Gas chromatograph communications and control Continental Airlines, Inc. (two projects) Customer care application and migrating data to Windows from a mainframe ProSys, Inc. Application to monitor and manage controls in a petrochemical plant Hewlett-Packard (two projects) Application to manage exchange of bad memory modules in computers ChevronTexaco What-you-see-is-what-you-get report generator for oil/natural gas drilling sites Hilton Hotels Migration of business applications to Windows from other environments American Buildings Company Virtual building engineering application for modular structures ExxonMobil Upstream Research Center Software docking station for oilfield drilling and reservoir applications Schlumberger GeoQuest TDAS application for drilling – torque/drag, stuck pipe, drill string modeling JFL Communications (SOLA) Rain-fade attenuation and saturation adjustment for satellite uplink communications Sulzer Intermedics External re-programming of embedded heart pacemakers Tuboscope Software tracking of pipeline cleaning and inspection equipment 10 A-2: Background Summaries of Principals | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 Metro IS/Enron Energy Services Using pager communications protocols to send residential meter readings for Enron Lockheed Martin/NASA (two projects) Air-to-Ground Voice System for communications between the shuttle/space station and ground BMC Software Windows adaptation of software to monitor enterprise applications and resource consumption American Express Windows-based reservation and ticketing system FutureSoft Consumer software for dialup and terminal communications over phone lines BancTec/Recognition Status and control of automated high-speed check processing and document OCR for banks VCON Video-conferencing hardware device driver and configuration software AT&T GIS/JCPenny Customer Focus Team Design and programming of Windows applications to support point-of-sale and other programs General Signal/Edwards System Technologies Monitoring and control of fire and smoke detection and suppression equipment MCI GPS/GIS software to investigate suitability of PCS antenna locations in Mexico Tandy Information Services Creation of libraries to provide data migration services from UNIX to Windows databases American Airlines Decision Technologies Windows NT communications interfaces to the SABRE online reservations system Fisher Controls Calculation engine for determining valve sizing in pipelines and plants Merit Technology Created the first consumer retail drill-down mapping application from a shareware prototype Coopers and Lybrand Built a windows management and tracking groupware interface around Lotus Notes Practitioner's Publishing Rescued a Windows auditing package in development, re-built the project in place DacEasy Adapted code produced overseas into the DacEasy Lite product for US consumers Wal-Mart General Offices Engineered communications and GUI components for editing data stored on UNIX servers CE Software Ported Apple Macintosh applications to the Windows environment ©2006-2009 Two's Complement, LLC. | A-2: Background Summaries of Principals 11 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] Legal Services Incorporated Wrote prototype applications to electronically submit legal documents to courthouses Micro Software Solutions/Computer Supply Store Programmed an inventory and sales tracking package for an office supply store Scott Deaver’s complete resume can be seen at http://www.ViewSender.com/documents/resume.doc. A-2.2: GEETHANJALI MANJULADEVI RAMACHANDRAPPA Geethanjali is one of four prospective equity partners in Two's Complement LLC with whom we will negotiate for shares in the company after the general business attorney has finalized the business structure. Geethanjali has spent the past month learning the software, and has recently been producing new code for the ViewSender Agent component. Geethanjali has over 5 years of experience in the software industry. Geethanjali is proficient in C, C++, Visual C++ and the MFC. She is also familiar with PHP, MySQL, SybaseSQL, XML, SOAP, C#, .NET 3.5 and HTML. She worked previously with Siemens in India as a Senior Systems Engineer. She was involved in developing Microsoft Windows applications for the medical field, which involved DICOM image processing. She also has experience in developing web applications. Geethanjali received her Bachelor's Degree in Engineering (Computer Sciences) from V.T.U., India and Master's Degree in Software Systems from B.I.T.S. Pilani, India. Geethanjali's full resume is available upon request. A-2.3: CHANDRA THORNTON-FONTENOT Chandra is another potential partner who is already contributing to the project - she is redesigning our current web page. Chandra has extensive experience (since early 2000) as a Web professional, with a strong understanding of modern web technologies, strategic on line marketing, copywriting and site design and development. Her background is in writing and content creation, but she has also lead the development of brand building Web sites through design, production and launch. She has advanced knowledge of CSS, JavaScript and XHTML as well as Photoshop, Fireworks and Illustrator. Her experience and expertise includes SEO, SEM, copywriting, strategic content development, Web analytics, site design, HTML, CSS, and Flash. She has received several honors, teaches web page design and development, and has also attained her MBA. Chandra's full resume is available upon request. 12 A-2: Background Summaries of Principals | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 A-2.4: SUSANNE PACK Susanne is also a candidate for equity partnership, and comes to us as a marketing and sales professional from Cologne, Germany. Susanne spent two years in the United States, and speaks and writes fluent English as well as her native German. She has spent her professional life self-employed in marketing and entrepreneurship, and has an extensive family history of self-employed business consultants and direct selling specialists. Her education is in accounting (she was an assistant to a tax consultant), graphic design and web design, architecture and marketing (specifically Internet marketing, search engine optimization, copywriting, and related content management disciplines). Susanne's full resume is available upon request. A-2.5: JAMES A. CARDLE James is a patent attorney practicing in Brainerd, Minnesota. James has offered and we intend to accept an agreement in principle where he will provide the patent and other intellectual property protection we need. He will perform his services for the intellectual property holding company the general business attorney is setting up (rather than for Two's Complement LLC). As a means to extend our resources during the interim and as an expression of his confidence in the ViewSender project, James has agreed to defer receipt of the majority of the payment for his services until we receive venture capital or other funding. James has been a consulting engineer (he received his PHD in civil engineering from the University of Minnesota in 1984) and maintains his engineering registration in the State of California. He is also a retired professor from the University of Nevada, Las Vegas where he taught fluid mechanics and related topics to civil engineering and mechanical engineering students. He also contributed significantly to the development of an entirely new engineering program at the University. His research at the University of Nevada, Las Vegas was sponsored by the Lawrence Livermore National Laboratory for a number of years. The University granted him an extended leave of absence to attend law school, as he wished to utilize his engineering background to work with intellectual property issues. After completing law school at the University of Notre Dame in 2005, he returned to the University of Nevada, Las Vegas where he served as Intellectual Property Counsel. In that position, he developed policies and procedures to identify and protect the patentable inventions developed within the university. As a patent attorney in private practice in California and Minnesota, he has experience in the mechanical arts, medical devices, physical and chemical processes, software, circuits, semiconductors, nanotechnology, cooling of electrical devices, and alternative energy production. ©2006-2009 Two's Complement, LLC. | A-2: Background Summaries of Principals 13 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] James' full resume is available upon request. A-3: COMPANY MANAGEMENT CONSIDERATIONS A-3.1: THE RELUCTANT ENTREPRENEUR This business plan is unusual in that its proponent and author does not intend to own or control the business that ultimate derives from it. Scott Deaver may well be a pioneering software architect of unusual vision and considerable talent; however, he is not by nature or experience a businessman. Scott's experience in the industry and corporate world at large have prepared him well to know what to do, but he lacks the training and foundation in how to do it (that he knows what to do has positively affected the quality of the software - the hooks necessary to support all of the possibilities discussed here are already built into the ViewSender software design). Therefore the goal of the current business plan is to attract skilled business professionals as major or controlling partners to mold a successful business around the technologies and vision advanced. We would then ascribe all of our resources and assets to the business that results. The legal structure as defined in the main body of the business plan will allow the exchange of a majority of Two's Complement shares, management, and control to a venture capitalist’s chosen team if necessary, while allowing distribution of remaining equity to the currently-anticipated sweat-equity partners. Control of the intellectual property licenses would remain with the second corporation described in the main body of the business plan (tentatively identified as SourceCrafters LLC) until and unless a licensing agreement was reached between SourceCrafters LLC and the management team of Two's Complement LLC. A-3.2: FALLBACK PLAN Should the events contemplated in the previous section not happen, we will continue as we have, funding the project from Scott Deaver's income as a software engineer, improving it as we go forward and as we learn. We will leverage the expertise available through SCORE and low-cost memberships in organizations specializing in small business and softwarebased startups (PartnerUp, Startup Nation, etc.). As part of the current plan, we expect to bring on board talented artisans and experts in the areas of business and asset management, accounting, finance, and marketing. As these individuals become available and provide insight and expertise, we will amend this plan so that over time it will produce an ever-more-refined depiction of where we want to go and how we want to get there. To attract talented and skilled professionals in the beginning when we most need their help is going to be challenging, especially in light of limited resources. Obviously, to attempt the ambitious goals of this business plan on just those resources would simply not be feasible our point here is simply to illustrate that even in the worst-case scenario the product could continue to be developed and eventually brought to market as shareware, if nothing else. 14 A-3: Company Management Considerations | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 During the course of that effort, hopefully general economic conditions will improve and we will continue to look for venture capital and partner opportunities. And, there is another outlet by which we can gain access to resources and expertise - since ViewSender's intellectual property is entirely ours, we can leverage a small portion of that interest and/or equity shares in the ViewSender business entity to attract participation from other professionals. Of course, we will reserve the lion's share of the I/P to ourselves to retain control over the product, and we will keep the greatest share of the business interest to barter for venture capital and/or a stake in an existing business that wants to manage or take over the ViewSender business. We can exchange small percentages of what is left to get services from the technical and professional community to help speed ViewSender's development. We have already demonstrated success with this method - we have individuals now performing work to advance the ViewSender product as a direct or indirect result of ads for sweat-equity partners placed on CraigsList.com and Kijiji.com in several communities as well as on tech-oriented employment and gateway websites. As of this moment, our palette overflows with possibilities, and the challenge is to identify the best and least of these. A-4: DETAILED DISCUSSION OF PRODUCTS AND SERVICES Any evaluation of the business, its potential, or especially its risk, requires a discussion and examination of the software that the business promotes. The ViewSender family of applications provides services that enhance trust, provide security, support audit trails, and mitigate litigation in both corporate and non-corporate environments where business and social activities involve personal computers. For the purposes of this document, we have adopted the convention that “ViewSender” is the name we use to identify the system or architecture as a whole, or a component that is shared among many products. You will also see references to “iEavesdrop”, which identifies specifically the consumer version of the software or one of its components. The employee work-from-home products are identified by the "pcTelecommute" brand, and references to “pcOversight” identify the commercial product directed at corporations and institutions. You may see the ViewSender name used interchangeably with either iEavesdrop, pcTelecommute, or pcOversight. As the name implies, ViewSender applications achieve their goals by delivering information about the contents of computer screens to interested administrators, parents, security personnel, educators, employers, or partners. To be more accurate, ViewSender delivers expressly that information the requestor wants – as much or as little as desired. Unlike other applications limited to screenshots or captured keystrokes (though ViewSender applications have patentable ultra-efficient means to deliver those as well), ViewSender's output is based instead on text extracted from the screen, either at the computer itself or by a remote server acting on small binary files shipped to it. The derived text includes everything readable on the computer monitor, regardless whether the source is the user’s ©2006-2009 Two's Complement, LLC. | A-4: Detailed Discussion of Products and Services 15 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] keyboard, graphic images, window captions, file content, or Web pages… or technologies as yet not invented. What the user sees, ViewSender reads, unlike other applications which must have a priori knowledge about windows, browsers, or applications running in the monitored computer’s workspace. And, ViewSender applications offer something you can’t get anywhere else: complete unattended automation of the entire process, from extraction of the requested information all that way through analysis and comparison to word/phrase watch lists (no more blearyeyed parents or sleepy security personnel poring over screenshot after screenshot looking for bad behaviors). On foundations this solid great applications can be built. ViewSender can be used to enhance trust on both sides of a work-from-home opportunity, providing the employer a means of verifying work is being done, especially when other metrics are unavailable or too coarse to accurately measure progress. The employee benefits from the assurance that his/her contributions are well-documented and provide a platform for advancement and other opportunities. The employer, the employee, the natural environment, and society at large all benefit from successful work-from-home relationships, and these benefits enjoy heightened awareness given recent economic and energy news. The work-from-home implementation is a cooperative and transparent one, where both parties are aware of, and gain from, ViewSender’s deployment. There are other situations in corporate and social environments where ViewSender is employed more discreetly. In the corporate world, monitoring on-site employees for their computer usage has become a requirement, not just to check on productivity but as a defensive measure. When sexual harassment, discrimination, abuse, or misuse of resources occur in the workplace, it is rarely the offending employee alone who suffers. The employer is at risk for lawsuits (the perceived “deep pockets” problem), morale problems, and retaliation from disgruntled employees. To deal with misbehavior occurring on personal computers in an after-the-fact fashion is extremely expensive and distracting to an organization. Most companies now control, and may even monitor, computer usage by employees is some fashion to stop or catch inappropriate behaviors before they cause serious problems, to prevent issues (the knowledge that employees are being monitored has been shown to in and of itself reduce incidents), or as an early-warning mechanism for getting a head start on resolving problems that have already occurred. The tools currently employed to achieve these tasks are relatively primitive – they often require creating and managing “white” (expressly allowed) and “black” (expressly disallowed) lists of website and e-mail addresses, maintaining staff to monitor output and/or manage security applications, and require significant training in a number of disparate applications and systems. Few (perhaps none) are sufficiently consistent, reliable, tamper-proof, or compliant with rules of evidence to be above reproach in a lawsuit. ViewSender addresses all of these issues. Because ViewSender can be implemented as a fully-automated system (including the automatic and selective distribution of ViewSender upgrades and modifications to monitored computers), ViewSender deployment 16 A-4: Detailed Discussion of Products and Services | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 significantly reduces human resources requirements for monitoring and maintaining the system or its outputs. ViewSender’s tools for deployment and maintenance are richlyfeatured, highly efficient, and easily learned. ViewSender’s performance, output, and modifications all provide verifiable audit trails – when a potential problem has been identified that may involve litigation, a ViewSender Agent can be remotely tweaked to increase its scrutiny or even to provide timed captured information in the absence of an event (where the concern is non-performance or maintaining a consistently-spaced record over time). ViewSender also provides value in mitigating or preventing lawsuits where an individual’s performance has led to discipline or termination – ViewSender provides uniform, non-biased monitoring across all of the computers it supervises, and therefore can be used as an irreproachable source of documentation for the disciplinary process. It will in effect record the control group for comparing what constitutes “normal” behavior at the same time it is recording the behaviors causing concern. ViewSender’s value is not limited to the business world. The greatest share of early ViewSender downloads (as reported by the client at the time of the download) are from parents wanting to monitor a child’s activities on-line. The next largest group identified themselves as being concerned about the behaviors of a spouse or partner. ViewSender offers a discreet e-mail-based version which serves those purposes well (and doesn’t require a server). ViewSender can also be used for a number of less-popular, but important functions. It can be used to validate and archive the on-screen environment during on-line tests in both academic and non-academic environments (such on-line driving courses and technical skills assessments). It can be used to oversee a closeted system which can report activity to a video card (even when no computer monitor is attached). It can be used to watch the watcher – plant control operators spend their day observing large screens which report alarms, maintenance activity, outages (planned and unplanned), and other information. ViewSender can be set up to monitor those screens and look for the occurrence of various keywords or phrases, as a backup in the case of human error. It can be used in disaster recovery to re-create documents or work product by following the progress of the work as captured on-screen or in text by the ViewSender Agent. The proprietary binary character recognition engine in the base product can resolve characters in 39 languages – we can even add support for Asian languages (but currently at an additional charge to the purchaser). Because we can send images in very small file sizes, we can visually support any language. We will add GUI support for languages other than English as the product matures. Finally, ViewSender can run without a wire – that is, when offline (temporarily or permanently) it can save captured information in extremely compact forms to local storage, sending out the information captured once back online (if desired). This makes ViewSender an ideal solution for mobile computers and notebooks. ©2006-2009 Two's Complement, LLC. | A-4: Detailed Discussion of Products and Services 17 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] For a more complete and current description of the ViewSender software, please see the ViewSender website at http://www.ViewSender.com. A-5: PRODUCT VERSION NOTES AND RELEASE SCHEDULE Product release schedule Product Dependent upon these components iEavesdrop2 Agent, Agent Configuration Utility, Viewer Agent, Agent Configuration Utility, Viewer, Server, Server Manager Agent, Agent Configuration Utility, Viewer, Server, Server Manager pcTelecommute Pro pcOversight Pro pcTelecommute/pcOversight Server Viewer3 iEavesdrop Amplified pcTelecommute Basic pcOversight Basic Release day1 156 315 329 351 Agent, Agent Configuration Utility, Viewer, Server Lite, Server Lite Manager Agent, Agent Configuration Utility, Viewer, Server Lite, Server Lite Manager Agent, Agent Configuration Utility, Viewer, Server Lite, Server Lite Manager IEavesdrop Amplified Server Viewer3 1Expressed as days from receipt of funding, relies on manpower available as described in the section 410 431 451 455 Development timeline. 2iEavesdrop basic product without Server Lite and Server Lite Manager 3The Server Viewer is an optional component for products that use Server and Server Lite components, for viewing large numbers of files containing captured Agent data in the native ViewSender data formats. The major ViewSender versions are as follows: 1. iEavesdrop on-line protection and trust validation – this version is intended for use by parents and caregivers to monitor the on-line activities of their loved ones and charges, and to monitor general computer usage for abuse, misuse or violations of trust; 2. pcTelecommute bundle – this version supports working from home by validating the trust relationship between the employee and employer and verifying work output during working hours. This version differs from the pcOversight Site Monitor application in that the employee and employer are both aware of its implementation and derive benefit from it, whereas the Site Monitor application is more discreet and serves the express needs of the facility manager or owner; and 3. pcOversight bundle – this version monitors activity on computers, networks, and occasionally-connected computers controlled by the corporation or institution. It is intended to collect, process, store, and report discreetly and at the behest of the facility manager or owner. 18 A-5: Product Version Notes and Release Schedule | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 The marketing of the pcTelecommute application will span both consumer and commercial segments – the intent is to heavily promote pcTelecommute to consumers so that they will take the information to their employers (since it is in the employee’s interest to do so). We will at the same time aggressively promote pcTelecommute directly to employers. A-5.1: PRODUCT VERSION MARKETING NOTES This section includes information not presented in the main body of the business plan: 1. The ViewSender Agent (which is the silent, invisible part of all our product that does the work of capturing images, extracting text, collecting keystrokes, and reporting user information) is identical for all ViewSender products (both iEavesdrop and pcOversight brands) with the exception that, unlike all other versions, the free version of the basic iEavesdrop product does not provide the Agent as a USB selfinstalling/self-collecting flash memory device, and does not offer a utility to create the USB image on the customer's own flash memory device. A free version can be upgraded to the paid registered version, and the USB device and the utility will then be provided to the customer at no additional charge as an incentive (see A note about included Agents); 2. The ViewSender Viewer (the part of all our products that can view captured images, extracted text, keystrokes and user information in their native ViewSender data types) may be slightly different in appearance between the different ViewSender product versions, though any ViewSender Viewer variant can read the data output by any ViewSender application; 3. The iEavesdrop-branded version of the ViewSender Viewer will display advertising for the pcTelecommute application during initial Viewer setup, in the background images of normal runtime windows and dialog boxes and in the About box (no other ViewSender applications will be advertised in iEavesdrop components); 4. An iEavesdrop-branded consumer version will come bundled with one ViewSender Agent, one iEavesdrop-branded ViewSender Viewer, and one iEavesdrop-branded Agent Configuration Utility; 5. iEavesdrop-branded consumer products will initially be available only as virtual applications (no physical packaging) downloadable from shareware sites and from our website; 6. An additional specialized Eavesdrop Amplified, pcTelecommute, or pcOversight branded commercial Viewer may be provided for viewing and selecting large volumes of ViewSender data stored by ViewSender Servers; 7. Each version of the ViewSender software that includes a ViewSender Agent will also include an appropriately-branded ViewSender Agent Configuration Utility unique to that version; ©2006-2009 Two's Complement, LLC. | A-5: Product Version Notes and Release Schedule 19 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] 8. The iEavesdrop-branded ViewSender Agent Configuration Utility will display advertising for the pcTelecommute application during initial Agent Configuration Utility setup, in the background images of normal runtime windows and dialog boxes and in the About box (no other pcOversight applications will be advertised in iEavesdrop components); 9. iEavesdrop-branded consumer versions will not initially be shipped with ViewSender Servers, although an optional lightweight iEavesdrop Amplified branded Server will be offered later, bundled with multiple iEavesdrop Agents, an iEavesdrop Agent Configuration Utility, and an iEavesdrop Viewer; and 10. pcOversight-branded ViewSender Servers will be offered as both stand-alone licenses and as bundles of various combinations of pcOversight-branded Agents, Viewers, Agent Configuration Utilities, and Server Managers. A-6: DETAILED MARKETING COMMENTS We wanted to use this section to present information we haven’t touched on elsewhere related to our perceptions of opportunities and risks inherent to the project, with respect to both marketing and the business as a whole. We have repeated, probably too often, that we lack business experience and specifically marketing knowledge. Blame our Midwestern roots – we do not want to misrepresent our skill set, nor do we want anyone to think we are dismissive of the marketing effort that will be required. To demonstrate that the opposite is true, and that we’ve put a great deal of effort and thought into how we can address the subject of marketing, we’ve retained in this version of the business plan some of our earlier concerns in the sections below. Since the paragraphs below were written, we’ve identified the plan of attack described in the sections above. In summary, we know that our inexpensive or free, easily distributed iEavesdrop consumer product has an emotional appeal (family on-line safety) we can link to public concerns and external events. We can achieve wide distribution on-line very quickly and cheaply as shareware (this is something we have experience doing with our “CodeClip” product). We can embed advertising in those products to promote our pcOversight Telecommute bundle, with the intent of persuading employees to introduce employers to the concept and to our tools. We can coordinate this approach with more traditional on-line, media and directmail based campaigns for pcOversight targeting employers. Employers who deploy the pcOversight Telecommute bundle will then receive advertising through the Telecommute agent setup, server management, and captured data viewer tools for the pcOversight Site Monitor bundle (our flagship product). The pcOversight Site Monitor bundle will also be independently advertised on-line and with traditional media. Both the pcOversight Telecommute and pcOversight Site Monitor bundles can generate significant revenues though Agent and Server licensing, ancillary products, and services (including deployment assistance and leased servers and custom programming). 20 A-6: Detailed Marketing Comments | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 Combined with a professional market research service utilizing modern survey and sampling approaches, we now believe we could address the issue of a marketing plan well enough to generate some business while we seek out skilled marketing professionals to join our team if we had no other choice but to go forward before a marketing professional was on board (something we will avoid if at all possible). Therefore, some of the opinions and concerns expressed below may be less relevant that they once were, but still bear acknowledgement. A-6.1: PROMOTIONAL IDEAS The next few pages represent seed ideas for promoting the three product lines: ©2006-2009 Two's Complement, LLC. | A-6: Detailed Marketing Comments 21 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] slut An ugly word… a word you don’t ever want to see on your teenager’s computer screen. But if it’s there, wouldn’t you want to know about it? iEavesdrop tells you when words like this are viewed by your children on a computer – whether they are off-line, on-line, or just looking at a picture on a CD. I love my kid… iEavesdrop. Learn more about iEavesdrop and how it works at www.iEavesdrop.com. 22 A-6: Detailed Marketing Comments | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 I’m late to work These are some of the few words pcTelecommute can’t find on your computer screen, along with “I’ve got to get gas on the way to the office”. Oh, there’s nothing wrong with the copy of pcTelecommute running on your computer- they can’t be found because they don’t exist. You aren’t late and you’ll walk a few feet to work, because you are already there. You work from the comfort of your own home. When you and your boss agree to use pcTelecommute for one or more days a week, you can be more productive, happier, and easier on your car and the environment. Your boss can have confidence in the work you are doing, and your paycheck goes further. Put your drive into your work instead. pcTelecommute. Learn more about pcTelecommute and how it works at www.pcTelecommute.com. ©2006-2009 Two's Complement, LLC. | A-6: Detailed Marketing Comments 23 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] sexual harassment suit Three little words you wouldn’t want to appear on your employee’s computer screen. If the words were there and you didn’t see them, get ready for a long ride: litigation, morale issues, counter-claims, and disciplinary problems. The only people happy about the situation will be any attorneys you happen to have on hourly retainer. pcOversight tells you when words like this are viewed by your employees on a company computer – whether they are off-line, on-line, or just viewing a fax from a paralegal. pcOversight gives you advance warning so you can tackle this or any other issue early on: Investigate. Counsel, reassign, or discipline staff. Provide sensitivity training for your employees and pro-active support for the aggrieved. Get ahead of the problem. Or learn to love smiles on lawyers. Know your business. pcOversight. Learn more about pcOversight and how it works at www.pcOversight.com. 24 A-6: Detailed Marketing Comments | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 A-6.1: OPPORTUNITIES Were it not for the current economic conditions, ViewSender has come into being at a fortuitous time. The many needs it addresses seem to be constantly in the news: 1. On-line security in the workplace, schools, churches, and home; 2. Transportation costs and environmental issues tied to the daily commute to and from the office; 3. Accusations of discrimination, bigotry, and abuse (real and imagined) in our institutions, organizations, and governmental bodies; 4. Rage and mental illness expressing itself violently in the workplace (as in the slang term “going Postal”); and 5. Independent of item 1, sexual predators using the computer to exploit children. These are the issues we hear and read about constantly which relate directly or indirectly to ViewSender’s capabilities. There are other less prominent concerns many of us keep in the back of our minds – the faithfulness of a partner, the kinds of friends my child has, or the things my children are curious about that I might want to proactively address with them as a parent. Therefore, the needs that ViewSender is intended to address seem readily identifiable and numerous. The question then becomes: How well does ViewSender address those needs? A significant portion of that question more properly belongs in the ‘Risk’ section below, but at the same time ViewSender enjoys overwhelming advantages, certainly over any existing competitors, and especially as a general matter of applied technology. To fully grasp ViewSender’s advantages, an understanding of currently available applications and approaches is necessary. At the time of this writing, a Google search using “capture computer screen keyboard spyware security” pulls up a plethora of screen capture utilities (Virtual Screen Spy, PCScreen Spy Monitor, SpyRecon), e-mail monitoring tools, website tracking applications, and keystroke loggers (KeyLogger, Keyboard Monitor). Interestingly, there are more entries related to defeating these programs than in selling them. We are and remain concerned many of these programs, in addition to being poorly written, hint at being used for sinister purposes (capturing passwords, e-mail addresses, and logon names for identity theft). There are comments in the ‘Risks’ section about the need to distance the ViewSender products from these kinds of programs. That aside, each and every program that we’ve downloaded or purchased from store shelves had the same illogical assumptions: 1. That someone is actually going to have the time and patience (or the money to pay someone else) to look at all those screenshots and keystrokes files; 2. That e-mail servers, networks, and file systems have infinite storage capacity and bandwidth to store or send huge graphics files. To put things in perspective: A 1284 ©2006-2009 Two's Complement, LLC. | A-6: Detailed Marketing Comments 25 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] x 1024 screenshot of this Word screen as I’m typing this, captured and saved into the standard Paint application as a JPEG file, required 144 kilobytes (147,456 bytes) on disk. Suppose you captured the screen every five minutes throughout an 8-hour work day – in one day, you’ve consumed 14 megabytes (14,155,776 bytes) on disk and used the same amount of bandwidth over your network. Assuming you were monitoring ten machines in your office, you’ve invested 140 megabytes in storage and network traffic. Incidentally, referencing item 1, you’ve got 960 full-screen images to look through!; 3. That keystrokes entered by a user absent any information what the user was typing into (or in response to) is meaningful or even understandable. This issue is especially problematic, even dangerous. There are any number of words or phrases a person can enter into a computer that seem completely innocent taken out of context, or which cast things in the wrong light – see the www.ViewSender.com website real-world examples; and 4. That website captions and addresses alone provide useful information – like the alcoholic who keeps his liquor in a cologne bottle, most illicit websites are aware of web address trackers and have taken steps to make their purpose and wares less obvious to such tools. Depending on the specific program, there are some other presumptions or assumptions that make no sense in the adult world – some are downright silly. Should there be a need to emulate any of these behaviors, ViewSender could be set up to do any or all of them (in one application, at one time – that in itself would be a major advantage). However, ViewSender’s image files would be smaller by a factor of ten to twenty. Yes, you read that correctly – as I am typing this, ViewSender is producing fullscreen screenshots averaging 12.2KB (12,493 bytes). Compare that value to the 147,456 bytes required for a JPEG screenshot. Along with the compact screenshot, you would receive the complete text extracted from that screenshot, and a list of words in that text which matched words or phrases from a ‘bad’ words dictionary. You would also receive a keystrokes report accurately reporting the keys entered since the most previous screenshot. All told, the information would consume less than 18 KB of disk space and bandwidth. Two of the items listed in the last paragraph are simply not available from any product other than ViewSender – the extraction of all of the text from the screen, and the list of ‘bad’ word/phrase matches. From those two items comes a third feature that no other product can offer - full automation. All other products, including “professional” applications like PC Pandora and TrendMicro, require human intervention to ascertain whether a problem has occurred. ViewSender can do the analysis itself (by extracting text from the screen and comparing words and phrases in that text to an administrator-defined ‘bad’ word/phrase list), and report a problem only after it is already known to be worth having human inspection. While the convenience to the user and the significant improvements over existing technology are in and of themselves advantages in the marketplace, the 26 A-6: Detailed Marketing Comments | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 automation ViewSender provides is a watershed event in the new world of environmental security. Because it removes the need for human oversight, and provides efficient digital packages of information, ViewSender can now be fully integrated into comprehensive security systems that monitor physical access (badge swiping and door control), video, fire safety and other systems. Systems like Integrated Command Software (ICS)’s EnterpriseSMS can include ViewSender monitoring of both on- and off-site personal computers and notebooks just as they would internal and external video or still cameras. Similarly, enterprise resource planning (ERP) software from vendors like SAP could incorporate ViewSender reports into their asset management modules. Even less elaborate management tools that incorporate very basic communicates protocols such as SNMP can receive events tied to ViewSender-generated reports. Finally, ViewSender can work cooperatively with third-party systems – it can generate superb-quality images at 200-300 dpi resolutions to be fed into high-production OCR software at a server, or to video analytics software capable of detecting inappropriate non-textual content. If the opportunities presented by the business venture are in directly proportional to the advantages ViewSender software has over existing technologies, and the software’s abilities to extend itself, then the venture is on firm footing. We can make a sound argument that ViewSender products serve a need, and that they serve that need well. If you accept those statements, then the opportunities presented are limited only by the traditional issues facing startup business, which are fundamentally marketing, management, and resources. Marketing and business administration are not among the core competencies of the principals currently in the project. The business plan envisions bringing the necessary partners and staff on board in a timely manner to expertly address all three, and we will extend this document to encompass their findings and opinions as they become available. A-6.2: CHALLENGES A-6.2.1: ESTABLISHING RECOGNITION FOR A NEW PRODUCT CLASS We will need to effectively name and describe a new class of product behaviors and capabilities. Before ViewSender was created: 1. The ability to accurately extract all the text from multiple computer screens at regularly intervals without disturbing the computer operator, and discreetly ship the text on the network did not exist; 2. The ability to capture images from multiple computer screens at regularly intervals without disturbing the computer operator, compress those images into tiny file sizes, and discreetly ship them on the network without severely impacting the network did not exist; ©2006-2009 Two's Complement, LLC. | A-6: Detailed Marketing Comments 27 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] 3. The concept of using a monitoring tool with the capabilities listed above (along with keystrokes and user info) to promote and ensure quality employee work from their own homes did not exist; and 4. The idea of post-processing screen text collected from all over the enterprise and analyzing it for employee morale, rumor control, investigations, performance evaluations, loss prevention, and detecting impending anger management, discrimination, or harassment issues before they escalate to a formal complaint didn’t exist (because the collected text didn’t exist). A-6.2.2: AVOIDING ASSOCIATIONS WITH THE WRONG PRODUCT CLASS We will also need to separate the new product class described above from other product groups that exist. With respect to item 2 in the previous list, it should be noted that not only did ViewSender’s compression algorithms not exist in other products, but the earth has been salted somewhat because of past attempts made by other vendors with crude tools which clogged up networks and filled up hard drives with alarming rapidity. Finally, our major concern in this category is about the more general issue of avoiding associations and groupings with other products that would link us with "big brother". We need to stress the appropriate proper usage of our products and their positive benefits, while recognizing the potential for our products to be abused and used for the wrong reasons. We have done some subtle things to help this effort - we've branded the consumer and commercial products differently so that any damage done to one doesn't automatically transfer to the other. We've deliberately used the same branding for the employee workfrom-home product and the site monitor product so that our commercial customers can point to the positive attributes of the EWCH version if their usage of the pcOversight product becomes known in a negative light. We simply need to be sure we are always sensitive to this issue and respond to the question proactively should it come up, and we also need to avoid any association with other products that are not sensitive to the issue. A-6.2.3: COMPETITIVE PRODUCTS FOR SALE With respect to encouraging employees working from home by mutual agreement to computer content monitoring, we found no other product that supports such a relationship (the only references to the topic currently visible on the Internet at the time of this writing all trace back to our own website). Therefore, the only relevant “competition” is with respect to ViewSender’s more generic role as computer and network content monitor. The immediate issue for us in identifying competitive products was to define how far to extend the definition of “competitor”, since there is nothing out there having ViewSender's capabilities. The ViewSender Agent, the data capturing component, has at least five major features not found together in any other product, in part because the first two are our proprietary intellectual property: 28 A-6: Detailed Marketing Comments | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 The Agent can capture large screen images into tiny high-quality files averaging 12K to 30K in size (ten times smaller than comparative JPEG files); The Agent can accurately extract the screen text wherever it occurs on the screen; The Agent can compare extracted screen text to lists of words and phrases to see if they are relevant before sending or storing the image; The Agent can silently ship captured or analyzed information out using whatever means are available, without modifying the environment (i.e., forcing ports open through firewalls); and If network connectivity is not available, the Agent can continue capturing and processing information until a connection is available, whereupon it can send out pending data. The Agent has other lesser capabilities as well (collecting keystrokes since the last report, gathering currently logged on user information), but despite extensive Internet searches we weren't able to locate any package that came close to the capabilities listed. I may have forgotten to mention this, but the ViewSender agent can do all of this for free (there is a version specifically intended for protecting children from on-line predators that is offered to parents and care-givers at no charge). This is an important distinction, because it is possible (at tremendous cost of CPU load and disk space) to create text output from a computer screen using image manipulation and a commercial OCR engine like OmniPage... but the license for the OCR engine alone will cost you $100 regardless of the vendor (screen images are too coarse for cheaper alternatives like SimpleOCR to produce accurate output) and the image has to be extensively massaged beforehand to attain any accuracy. There are specialty applications which can capture the screen or windows as JPEG or TIFF images and automatically e-mail or send them via ASPUpload to a Web Server. Most are of poor quality and design. We found several which claimed they could "spy" on the computer screen discreetly - however, they tend to error often, and when they do, the Microsoft exception handler window loudly announces both their presence and their failings. We didn't find any that can span multiple monitors attached to the same computer (as ViewSender can), but even if they exist, the file sizes they produce would be astronomical. There are dozens of key-loggers, and any number of applications that are specifically targeted to grab text from the address bar of a browser or to scrape text from the edit window of MSN Messenger, or even to copy the display pane for Outlook Express e-mails. Of course, the application for one purpose can't do anything other than what it was intended to do, and if you want to know what someone typed into Notepad, or what the text encoded into a graphics image says, you are out of luck. If someone switch to another e-mail application or from MSN to Yahoo! Messenger, the text capture applications are rendered useless. We have to assume, as a purely logical matter, that more competitive applications exist and are simply not visible to us, certainly for Department of Defense computers, government contractors, and highly secure or secret projects in industry. Some may be owned or ©2006-2009 Two's Complement, LLC. | A-6: Detailed Marketing Comments 29 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] developed by government entities, others may be custom applications written in-house or by direction of the owning corporation or institution, still others available only to credentialed personnel or entities, or known only to a select subset of security professionals. There is an understandable general reluctance for corporations and institutions to reveal what tools or processes they may use for security purposes, and some refuse to answer whether they use such tools or processes at all (oddly enough, we have discovered a few companies who publish that they monitor employee computer usage, yet evidence strongly suggests that in fact they do not – taking advantage of the fear factor and self-censorship, we presume). And yet, we continually hear of breaches and problems in the news media, and with an application like ViewSender in place and working properly, that should not be possible. I suspect that the issue is dealt with symptomatically, that is only after the fact as a matter of locking the barn after the horse is gone, for each individual circumstance where there has been a problem. We are aware of anecdotal reports of companies bringing tremendous computer monitoring resources to bear after an incident, but we have no direct knowledge of any company having or utilizing the capability for preemptive engagement based on monitored information. We certainly know many of the issues making it difficult for any competitor to create and deploy an application like ViewSender in the absence of ViewSender's proprietary technologies. If you wanted some meaningful subset of ViewSender's capabilities without using ViewSender: 1. As described elsewhere, you could license a commercial OCR product and, with some investment in image enhancement code, produce text results close to what ViewSender produces, but at a licensing cost of $100 per workstation for the OCR engine alone and disruption of the user's work because of CPU processing load along with tremendous consumption of memory and disk space; 2. You could capture the image and send it to a central server for enhancement and processing through a high-volume OCR station, but without ViewSender's proprietary compression algorithms you will bring your network to its knees transporting the images from all your workstations, and the server and OCR horsepower necessary would be substantial (that is, expensive); 3. You could forgo text extraction and ship more highly compressed (lossy) images suitable for viewing only, but then your labor costs reviewing the images go through the roof (and the quality of the viewing effort declines rapidly over time). You would lose all of the benefits of pattern matching text, or later analysis of the text for trends and patterns, and certainly of any automated processing from the capture through the processing. Choices 2 and 3 mean that every image would have to be shipped out over the network, since the image's suitability for storage couldn't be determined until after processing or viewing. Each of these options is an order of magnitude more expensive than better, more relevant, more compact, and automated results via ViewSender. It is undoubtedly true that the government and certain specific applications in industry can justify these higher 30 A-6: Detailed Marketing Comments | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 expenses in light of the importance, security, or secrecy required - however, that hardly makes these deployments competition to ViewSender. Our conclusion is that there is no single product that can even remotely compete with ViewSender; there may be a combination of products you could link together to emulate some of the behaviors, but not with nearly the same efficiency, ease of use, features, completeness, low cost, or small footprint. Since there is seemingly no competitive product with which to compare ViewSender, and no customers seemed to be using it if there was, we wanted to be sure there was interest in a product having ViewSender's capabilities. We put the issue into the form of two questions to view it from the eyes of the customer: Once a prospective customer who was using some other partial solution became aware of ViewSender’s capabilities and comparative costs, would that customer switch? And, if a prospective customer who was not currently controlling or monitoring his network or computers for content became aware of ViewSender’s capabilities and comparative costs, would that customer try ViewSender? We believe the answer to the first question is an unequivocal yes; we believe the answer to the second is that some would, some would not, depending on how well their perceived needs matched ViewSender's feature set. We think we should have asked two other questions: 1.) Would you use ViewSender if you knew other companies, including your competition, were using it? and 2.) Would you use ViewSender if you suffered losses from a lawsuit, investigation, or criminal proceeding where improper behaviors on a computer were part of the issue? We suspect the answers to both questions would have been overwhelmingly yes. A-6.2.4: PRODUCTS CUSTOMERS CURRENTLY USE Separate and apart from the question of what products are for sale is the question of how customers currently are addressing their needs. The presumptive answer would be an arrangement of the available products ordered by percentage of use. However, in this case the answer actually seems to be "none of the above" (we suspect for some of the many reasons described in the preceding section). When we directly questioned nearly four dozen network administrators at companies all over the United States (many of whom Scott Deaver had worked for at one time or another) about what products they were using to track employee behavior and expression on their company networks, we discovered the following patterns: Most said they block ports using a firewall of one kind or another, and some monitor traffic volume between nodes, but they say they do not monitor content in network or computer activity (and we believe them); Some said they do not control or monitor network or computer activity (but we believe they do and choose not to admit it because of political sensitivities); Some said they monitor network or computer content, but we couldn't find any evidence that they do - there was no unaccounted-for software on the machines, and ©2006-2009 Two's Complement, LLC. | A-6: Detailed Marketing Comments 31 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] test traffic we generated at considerable risk to ourselves did not trip any alarms, though it should have; Some said they monitor network or computer content, and we believe they do, but primarily as traps of browser addresses and text traffic through a port (which explains why so much of your junk e-mail arrives as images rather than text). The first and fourth items are interesting to us because we know from previous experience that nearly all evidence in civil and criminal cases is discovered in e-mail (using ports that are never blocked), by a factor of nearly 100 to 1 over the next biggest offender (which is not porn or other offensive sites, which come in at number three, but MSN and Yahoo! Messenger – we suspect that a more recent survey would include Facebook and Twitter). Back to the point: Nearly every one we spoke to immediately assumed we were asking about controlling access to the Internet rather than monitoring content of any type to and from a computer. When we separated the issue of control from monitoring in our questions, we discovered every one of our participants was relying on control alone to police their networks, and in very nearly every case where we were able to engage in a candid conversation, the participants admitted that control was ineffective, and that they knew from random accidental discovery their computers were being used for undesirable activity (from running a personal eBay store on company time, to a programmer writing computer games on the clock, to harassing fellow employees, and one case where an employee was racking up overtime during evening hours while he was in fact in Messenger sessions all night with a girl he wanted to bring into the U.S. from the Philippines as his wife). We could not find one network administrator who could (or would) tell us what, if any, software product they use for viewing screen content (as text or as an image) on a computer on a regular basis to detect improper computer usage. At the same time, asking the question prompted a great deal of interest in ViewSender's capabilities, and from those conversations we have to conclude either that there is nothing like it available in the general marketplace, or if there is, it isn't broadly published. In any case, we found that ViewSender's description was well received by everyone we spoke with. A-6.2.5: UNIQUE RISKS Generally, we feel the ViewSender project is no more or less subject to risk than any other software-based startup in the current economic environment. That having been said, the unique opportunities presented for ViewSender’s success are somewhat the product of our place in time and current news topics: the need for workplace security, the desirability to work from home (as both an environmental and economic matter), the on-line dangers faced by our children, the ubiquitous presence of desktop and notebook computers in our homes and workplaces, and the public’s growing acceptance of the need to monitor our public (and with appropriate safeguards, private) environments. As time move on, one or more of those elements may dissipate or change. 32 A-6: Detailed Marketing Comments | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 And, at the time of this writing ViewSender dominates any competitive product technologically because of several proprietary innovations. Some of those innovations are not yet fully protected as intellectual property because funding has not yet become available. We expect to address IP protection as a first priority as the business moves forward, but it is an area of immediate concern for us. For the moment, we are substituting extreme caution in what we reveal to others, but that caution inserts its own risk as it frustrates our desire for openness and forthrightness in seeking out potential business partners and investors. One risk that we perceive as being unique to ViewSender has to do with other products in the marketplace. We need to distinguish our product and its purposes from other software that performs what to a layperson will seem to be similar functions. This will be a two-fold effort: managing public perception of our product, and actively discouraging use of our products for illegitimate purposes (while at the same time not turning away legitimate business). The software that we need to distinguish ourselves from includes (but may not be limited to) spyware, key-loggers (for attempting to capture passwords), and sneakerware (software intended to capture or exploit embarrassing or compromising information). We have built some safeguards into the system – for example, screen text and keystrokes we capture are always encrypted, and never visible as clear text except through the ViewSender Viewer (which can be password-protected) . However, we cannot prevent someone from downloading the demo version of ViewSender and installing it on a computer without the computer owner’s permission (nor for that matter, can we stop them from registering a version and installing it where they shouldn’t). It should be noted that this problem is not unique to ViewSender – the same is true for any product, although other products do not have ViewSender’s enhanced capture capabilities once installed on a machine. If this issue becomes a problem, we may want to attack it head-on and offer a free utility to the general public they can use to detect unauthorized installations of the demo version of our ViewSender product (we will not provide detection for the registered versions, but we will scan a machine via a tool on our website upon request - if a registered version of ViewSender is found on the complainant’s machine we will contact the registrant to relay and possibly investigate the complaint). There are capabilities in the software itself that may indirectly create additional costs and risks for the business. The nature of what ViewSender does may place it at somewhat greatest exposure to hackers or other malevolent attackers (they may rationalize ViewSender as an invasion of their privacy). Carefully monitored, this can be reduced from a risk to an ongoing cost component, meaning we’ll have to diligently employ software products in our development and distribution efforts to prevent viruses and worms. We will also need to watch for reports from our customers as well as the hacker sites about attempts to infiltrate, modify, or defeat our software and systems. A-6.3: OUR CONCLUSIONS ©2006-2009 Two's Complement, LLC. | A-6: Detailed Marketing Comments 33 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] Our analysis is hardly scientific or thorough, and we are not trying to persuade potential investors or partners of our conclusions. Again, as noted at the start of this section, a professional market research and plan is going to be required at some point to move forward, and we would strongly encourage anyone interested in joining us at this stage of our development to do their own research. But for our purposes - justification for the continued development of ViewSender - the evidence we've gathered clearly shows that at least some segment of the corporate market has interest in and need for a product like ViewSender and doesn't currently have access to such a product. Some of the potential uses for ViewSender, particularly those described in the section Solutions for special circumstances), didn't even exist until the technology in ViewSender was invented to address them, and we lack the command of the language to know even how to ask the right questions to assess that market. Other uses for ViewSender (encouraging employees working from home) are ideas of our own creation and didn’t occur to anyone until we published our website. Ultimately, we've determined that even in the worst-case scenario where a competitive product of some kind does exist, we're very likely to have at least one of our proprietary technologies and probably price to our advantage in a head-to-head matchup. Given that, frankly we might welcome another application having blazed a trail for us that we can follow in the early going. At least we could piggy-back on the terminologies, keywords, and descriptions of the products and market segments we want to address - if ViewSender is truly the only application out there with its capabilities, we will have to create the language in order to have the conversation. A-7: BUSINESS PLAN SECTION 5 SUPPLEMENTAL INFORMATION A-7.1: COMMENTS The e-commerce phase of the business provides us an opportunity to get exposure for the product and raise some capital, and should provide a boost up if we are unable to attract interest from professional business people and/or investors. However, shareware distribution of our product has some limitations and some risks (though the risks are slight). First, while we can make inroads into the consumer market, corporations do not purchase or implement shareware, and ultimately the software's greatest profit and growth potential lies in servers and multi-seat licenses sold to corporations. In fact, we intend to use different branding and packaging for the consumer product than we do for the corporate customer. Secondly, we feel there is likely to be a practical limit to the profitability of our software sold as shareware. The software can be used for a period of time (typically thirty days) without registration, a necessity to give curious potential customers the opportunity to 34 A-7: Business Plan Section 5 supplemental Information | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 test-drive our products. Unfortunately, we suspect a substantial number of our customers will explore the software only as a tool for spying on a cheating spouse, or to resolve a caretaker's short-term loss of trust with a charge. In these situations, the tremendous technical advantages ViewSender has may not have sufficient value to the customer to justify the cost of registration, or they may be satisfied with the lesser capabilities of a free key-logger or simple snapshot application. We do feel there is a core constituency in the parents of adolescent, pre-teen, and teenaged children who will appreciate the features built into the consumer version of ViewSender, and that shareware is a viable vehicle to reach those customers. Thirdly, there are some risks in attempting to become well-known on the Internet in order to drive sales. We are more likely to attract hackers who may try to defeat the protection in our software or harass our websites -unfortunately these kinds of attacks are the normal cost of doing business on the Internet, for anyone. Our software may be a more attractive target than others because in the immature mindset ViewSender might be equated to spyware, or as "Big Brother", or as discrimination against teenagers. Finally, the e-commerce component will be targeting the general consumer marker. There is a well-known truth among software professionals - that general consumers are the biggest drain on a software venture's support staff and budget. We will attenuate some of that demand by incorporating robust help into our application, providing ample on-line help (including FAQ's and user forums) and rendering direct support by e-mail rather than in real time, but support is yet another incentive to move on to the next business component in the suite as soon as is feasible (subsequent business components are biased towards the small business and corporate consumer). Note: It is true that corporate client also have support requirements - however, the tradition of paid contract-based support for corporate software is well-established and accepted, and support in that environment can be both a profit center and a training mechanism for our developers. A-7.2: TRANSITION IN CUSTOMER RELATIONSHIP In the e-commerce shareware model, the relationship is between a consumer and a specific instance of a product, and our interest is in tracking that instance of the software. In the product and services licensing model, our interest is in a specific customer (presumably but not always a school, small business, corporation, or other organization) and the software is incidental to an agreement we have with that customer. In other words, in the e-commerce model an instance of software is valid if the registration is current and valid; in the licensing model, any instance of software is valid if our relationship with the customer is current and valid (assuming of course, the software is a part of that agreement). A license relationship is much harder to achieve - some part of attaining one usually requires an effort specifically targeted towards that customer - but has the advantage that the customer's needs (and the software's role in addressing those needs) are better understood. Instead of the thirty-day trials, word-of-mouth, and anonymous ©2006-2009 Two's Complement, LLC. | A-7: Business Plan Section 5 supplemental Information 35 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] approach used in e-commerce, this relationship will require personal visits, demos, prepared presentations, and building rapport with potentially multiple individuals. The opportunities for profit are greater, and here all of the advanced capabilities, intellectual property, and extensibility bound into the software find a home, and can be properly exploited. The potential for additional sales (upgrades, ancillary products and services, service/support contracts, and exposure to the customer’s vendors and competitors) is much greater - and the bulk of the upfront marketing investment to attain those sales is waived, since the relationship already exists. A-7.3: TRANSITION IN PHYSICAL INFRASTRUCTURE This business component will require investments in targeted advertising, a sales staff, and a marketing team capable of managing the environment (and coordination with the Web presence of the e-commerce component). This will be a significant change in approach from the e-commerce module, which has very little infrastructure or running costs. We expect that the implementation of this module will also start a transition to a brick-andmortar presence. While we can begin the effort with professionals working from their homes (or as contractors working from their own offices) using leased servers, a virtual Internet presence, and rented post office boxes, as the organization grows some centralization and consolidation of the management will be required or desirable. For security and safety reasons, we will want to control our own servers (not necessarily those used to distribute product, but certainly those which contain our source code, customer data, accounting data and software, personnel records, and business conversations). We will need to have an in-house Ethernet backbone (that is, not using the Internet) for the transportation of sensitive information to and from those servers and the consumers of that information. We will need a demonstration center, conference room, and training center to educate and persuade customers and their staff. For some tasks, daily interaction at a common location is required - others require an occasional meeting at a common location. For all of these reasons, there will be a tendency towards some kind of community office space as we grow and extend ourselves into the product and services licensing phase. However and at the same time, we would always want as large a work-from-home staff as is feasible, in part because our products specifically promote and support work-from-home but also because of the cost efficiencies. A-7.4: TRANSITION IN PRODUCT LINEUP With respect to the ViewSender software, going after the small business and corporate customer means servers and management software. The ViewSender product has several modes of operations, but its core premise has been that data captured by ViewSender Agents will be captured (and optionally processed) at the monitored computer and delivered by a number of means to ViewSender servers, which will do any additional processing (if required), perform analysis on aggregated images and/or text, post any 36 A-7: Business Plan Section 5 supplemental Information | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 resultant alarms and notifications, and archive the collected data. The servers themselves imply multiple installed ViewSender Agents, requiring management, mass deployment, and bulk configuration software for them, and configuration and management software for the server(s). From a software development perspective, this is not as challenging as it might sound since the expectation for servers is designed into (and in many cases already built into) the software. However, in every other context - support, marketing, implementation, and customer interaction - this is a major step forward, and an exciting fulfillment of the software's potential. A-7.5: ANCILLARY PRODUCTS Like this business plan, everything about ViewSender is specifically designed to support flexibility and extensibility. While there is a fundamental set of products and services that intuitively go with a licensed ViewSender Server and Agents bundle, there are a number of additional products that could be developed and sold (by us or by a third party with tools purchased from us) or simply added as a feature to enhance the bundle (and generate greater revenues). While there is incentive to develop add-on products ourselves, there is also an argument that says we should encourage development by third parties of products dependent upon our technologies, because these third-party dependencies build or reinforce the perception that our file and transfer formats are the industry standards. Of course, the sweet spot is to develop customized products for individual clients at their expense, and then to take desirable elements of those customizations (now free to us) and insert them into our standard offerings to improve their appeal and frustrate competition. The software that could be developed would fall into these general categories: 1. Software based on parsing information we collect from monitored ViewSender Agents, including extracted text, captured images, keystrokes, and logged-on user information; 2. Software that enhances OCR performance at the server (or re-routes images to a customer's licensed high-volume third-party OCR application); 3. Scripting and developer tools that enable third parties to build applications on top of our architecture and products; and 4. Software that we develop as a customization or specialization service for customers (and then propagate back into our general product) - this topic is discussed more expansively in the Custom software section, rather than in the section below. A-7.5.1: DERIVED FROM TEXT EXTRACTION As of this writing, we have the only commercial product capable of reliably delivering the entire content of a computer screen or window as text (among our many other capabilities) for a reasonable price, regardless of the source of that text (though there are many applications which can capture just keystrokes, or return the content of a browser address bar, or copy what the user enters into the textbox of an e-mail application as distinct ©2006-2009 Two's Complement, LLC. | A-7: Business Plan Section 5 supplemental Information 37 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] entities). Besides the technical superiority that gives us for collecting meaningful data from the user, this opens the door wide open to applications that can manipulate the data after collection at the monitored computer. These include intelligent analysis or pre-filtering before the data is sent to a server (in the standard version, ViewSender simply compares words and phrases it found on the screen to a list prepared beforehand, and if any match is found the entire contents are sent to the server) as well as a host of services that could be provided by the server after receipt of the data. These server-based add-on applications could perform services like sophisticated analysis of text data for trends and pre-conditions towards undesirable behaviors on the part of an individual or a group (i.e., assessing a group's morale or reaction to a layoff announcement), or for desirable traits (such as suitability for promotion). A-7.5.2: DERIVED FROM IMAGE COLLECTION We also have the only commercially-available product capable of delivering sharp accurate images in tiny file sizes, with the capability to further increase image resolution or change color options on the fly, for a single monitored work-station or for a group of workstations. This means that, for minimal cost, images can be sent to the server for processing. At the server, add-on applications could be developed for packaging those images into filmstrips for viewing, or gathering into workgroups or other groupings for archiving. It may be possible to develop an application based on intelligent pattern recognition to recognize pornographic images, or other undesirable image contents. An application could be developed for taking the text content of an image (delivered at the same time as the image by the monitored computer's ViewSender Agent) and extracting keywords from that text, and then storing those keywords with the image in a database for very fast searches when a need to retrieve specific images arises. A-7.5.3: DERIVED FROM KEYSTROKES AND USER INFORMATION Because the keystrokes typed by the user of a monitored computer can be shipped by the ViewSender Agent as well as information about that user, add-on applications could be developed to track a single user's activities across several computers, or to separate out what the user typed from other text that appears in the text extracted from the image. A-7.5.4: OTHER PRODUCT OPPORTUNITIES A-7.5.4.1: OPTICAL CHARACTER RECOGNITION (OCR) The ViewSender Agent and Server provide highly sophisticated, proprietary binary character recognition for extracting text from screen and window images. This capability is tailored to efficiently utilizing possibly limited resources on the monitored computer without disturbing the computer user, and is specifically written to process single images as they are captured. When the images are being sent to a server, it is possible to defer binary character recognition at the ViewSender Agent in favor of binary character 38 A-7: Business Plan Section 5 supplemental Information | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 recognition processing at the ViewSender Server (which doesn't have to worry about either limited resources or not interrupting a logged-on user). We have this option only because the ViewSender Agent's proprietary image compression technology compresses images so tightly and so accurately - the Server receives an image of the same quality seen by the Agent, without bogging down the network or chewing up disk space. We can take it one step further - the ViewSender Agent and Server can take an image, process it, and instead of producing extracted text, it can produce a modified image that can be run through thirdparty Optical Character Recognition software to produce high-quality text output from the image. There are several reasons a customer may want to do this. First, commercial OCR applications can handle extremely high volumes of input, and the customer may decide that is an appropriate place to offload some of the image processing. Secondly, the OCR applications are often part of a document management system, which integrates processed documents into the business' normal document retrieval, search, and storage processes. Applications can be written to integrate ViewSender Server with a client's in-house OCR system as a custom application; more generic applications can be created as add-ons to ViewSender Server that recognize and interact with known major OCR engines and applications. A-7.5.4.2: DEVELOPER TOOLKITS, API SETS, AND SCRIPTING SUPPORT As described above, we would like to encourage third-party developers to build their own applications and customizations on top of our technology. We would like ViewSender to become a de facto standard for computer monitoring software, and one means to encourage that is for third parties to build and distribute products of their own that are dependent upon our proprietary ways of doing things. To promote that, we could offer API sets (libraries, assemblies, and programming that developers can use to "hook into" our proprietary technologies without exposing our source code to them) and scripting tools. These will allow them to rapidly build and deploy applications that tap into our special capabilities (including screen capture, image compression, binary character recognition, sending information from a computer without user detection, conversion of screen images to OCR-able images) and piggyback on our architecture (conversations between the ViewSender Agent and Server, transportation of images, extracted text, keystroke and logged-on user information through the system, or Server post-processing). The API sets and libraries are in particular attractive because the code necessary to support them is already written into our products. Some effort will be required to repackage that code, ensure it against tampering, reverse-engineering or re-distribution without license, and test it in its new footprint. The market for this product is small, but the value can be high to the end user. A-7.6: ADDITION OF SERVICES TO THE MIX The change in emphasis from individual ViewSender Agents to ViewSender Server and Agent systems opens the door to providing services to configure, manage, and modify those ©2006-2009 Two's Complement, LLC. | A-7: Business Plan Section 5 supplemental Information 39 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] systems or their subsystems. Once we are able to provide those services, a very desirable direct consequence is that those services can then be taken on the road - that is, rapidly deploying and tearing down ViewSender Server and Agent installations for special circumstances. A-7.6.1: CUSTOM SOFTWARE A customer may request that custom features be added to the software, and we will encode those features at a package price agreed to with the customer. The advantage to doing this is not necessarily any profit in the customization, or even the dependency it may create for the customer upon our products into the future (as opposed to those of competitors) - it is that we can fold desirable elements of the custom features back into the generallydistributed product, adding to its appeal to other customers. Unlike other features we might add to our products, these features have the added benefits that we know them to be desired by at least one customer, and of sufficient value the customer was willing to pay for them. A-7.6.2: TURNKEY SETUP AND MONITORING We can bundle services and software into a complete turnkey package for the customer's enterprise, using their equipment or leasing ours, custom-tailored to the customer's goals. Whether the desired end result were to support work-for-home employment for their staff, monitoring on-site staff, or providing an enhancement to their overall security, we would install and configure ViewSender Agents and Servers, arrange for post-server processing and storage (including leasing storage facilities), maintain and upgrade the system as necessary, provide regular performance and exception reports, provide on-demand access to real-time and historical data, and respond to special needs, all for a contractual price. In addition to providing a revenue stream for us, and a carefree one-stop-shop solution for our customers, these installations would provide excellent test-beds for validating improvements in our software as they are released. A-7.6.3: ANALYSIS AND ARCHIVING There are any number of services we can provide based on analysis of various combinations of collected data types (extracted text, captured images, collected keystrokes, and logged-on user information). We can find linkages between users and other users, or between users and data, or between computers and users, or between all three by tracking where similar text appears on individual computer screens. We can track trends - for example, where negative text appears in response to an external or internal event. We can even track the origin and spread of rumors based on keywords associated with those rumors. 40 A-7: Business Plan Section 5 supplemental Information | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 We can also provide services for archiving and compressing data captured by Agents, and for intelligent search and retrieval from that data. A-7.6.4: CUSTOM DEPLOYMENTS Separate from the issue of building custom software to order is the custom deployment of the software. We can modify the ViewSender deployment to fit any combination of using our servers versus using theirs, or of using our built-in binary character recognition at either the ViewSender Agent or the ViewSender Server versus sending optimized images to their OCR engine or application. For customers who are particularly sensitive to having their employees become aware of monitoring activity, we can even have the ViewSender Agents ship captured data to our networks - even if the Agent were discovered, the company would have plausible deniability as to any processing that was being done to that data. We can also offer deployment assistance for short-term situations, such as providing additional servers to handle temporary overflow or helping out with moves or expansions. A-7.6.5: SERVICE AND SUPPORT CONTRACTS In the licensing model, software support (working around through implementation issues, resolving defects and applying patches and upgrades, and user training) becomes a potential profit center, rather than a cost center, through the mechanism of service contracts. This change is a welcome one from the consumer model because the express level of support (and associated costs) is worked out with the full participation and understanding of the customer. Service contracts can specify, as a la carte menu items, a contact person for routing support requests (so that we do not have to deal with multiple users having varying degrees of technical skill and familiarity with our product), the type of support we will offer and the number or degree of incidents permitted within the contract, and a formal escalation procedure for more difficult issues (which helps frame the customer's expectations and to monitor our own performance). A-7.6.4: SOLUTIONS FOR SPECIAL CIRCUMSTANCES Once we have perfected our ability to deploy ViewSender Server and Agents as a service to our customers, we can offer shrink-wrapped deployments for special circumstances. These might include short-term deployments for trade shows, seminars, and job fairs where the event itself is of short duration; they may also include circumstances where a targeted situation does not require a permanent deployment. Scott Deaver had the opportunity to work on a project involving forensics examination of computer hard drives for lawyers in court cases - this is a special subcategory of computer software that has sprung up to support either side in litigation. The idea is to discover and document evidence that indicates behaviors and intentions of a computer user with respect to a particular issue ©2006-2009 Two's Complement, LLC. | A-7: Business Plan Section 5 supplemental Information 41 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] after-the-fact. Though they are becoming a significant part of modern court case, hard disk extractions have very little use until after damage has already been done. They have the additional limitation that they can only capture the state of a hard drive at a specific moment in time, and may therefore conceal evidence of mitigation or intent that occurs over time. Interestingly, for an organization that already has ViewSender deployed, the ViewSender captured data is probably much more useful. Let us suppose an organization that does not use ViewSender in the course of its normal operations is made aware of an internal allegation that has not yet reached the level of an official complaint or legal action, and further assume that the allegation has serious implications for the organization. It could be an insinuation that the coaching staff of a university is having ongoing improper contacts with recruits, or a complaint to a co-worker in a corporation that an individual in the market department is harassing her. Due diligence requires verifying whether the problem actually exists, but a formal investigation or even interviews carry their own risks (such as tending to validate or give importance to a false accusation, creating disruption in the workplace, or putting witnesses on the defensive). This is a situation for which ViewSender is the perfect solution. ViewSender Agents and Servers (if not using our offsite Servers) can be deployed during off-hours, left in place as long as needed, and then discreetly removed. This can be done voluntarily by the organization itself, or involuntarily by court order or by law enforcement. We see this exploitation of ViewSender as a highly-lucrative boutique business (see the later comments regarding franchising) answering the needs of the legal community, law enforcement, units of government, the insurance industry (fraud prevention and investigation) and investigative professionals. As an example of the latter, Scott Deaver recently performed work for ICS (commandsystems.com), which provides management software for entrance and video security (see Scott Deaver’s resume at http://www.ViewSender.com/documents/resume.doc). They have a primitive system that collects and reports badge swipes at secured entrances (as well as other SCADA devices that monitor sensors or detectors and alarming equipment), routes video to and between observation posts, and allows you to switch and monitor video streams using a map metaphor from a central command station. Although that description may sound impressive to a layperson, the underlying technology is quite crude – essentially the software talks to third party devices and controls that speak using protocols based on the ancient MODBUS register polling, and passes instructions and status between workstations using software queues. Underneath the smoke and mirrors, nothing that ICS has done contributes to the science – that is, there is nothing proprietary in their system (where ”proprietary” is defined as beyond the normal work product of someone skilled in the trade). Vendors of the individual video and security devices provide API sets to talk to their devices (or provide MODBUS register mappings for communicating 42 A-7: Business Plan Section 5 supplemental Information | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 with the devices) and there are much better ways to distribute that information than that embedded in the ICS system. This technology is relevant to ViewSender in that it addresses similar issues: monitoring and security of assets associated with a facility (or more accurately, the monitoring of human behavior in a facility by electronic devices). Where ViewSender monitors computer screens and contents, the ICS system instead monitors doorways and video camera; other than what is being monitored, the other elements of the systems are identical – that is: Configuring the collection of information from electronic devices; Collecting, filtering and storing captured information; and Searching and displaying user-selected portions of the collected data. We are not recommending that ViewSender should someday try to acquire ICS. ICS may well be the poster child for how not to run a company – it is millions of dollars in debt, its technology is dated, and it has no brand recognition or loyalty (it is highly likely ICS will be in receivership in the near future). The only assets that ICS would have that we might be interested in are the software drivers they’ve written to access vendor devices. We are recommending that when the time is appropriate ViewSender should look at extending its technologies to include electronic facilities security as a natural fit. The situation at ICS demonstrates that the state of the technology in that industry makes the industry vulnerable to outside competition, and there may be an opening there for ViewSender to expand its superior technologies into that space (a glaring reason for not doing so: the tremendous number of third-party device vendors whose products require writing software interfaces for communication, assuming we can’t obtain those by other means). This example is meant to illustrate an avenue of expansion for ViewSender through acquisition or new software development: becoming a one-stop shop for complete facility monitoring, from the parking lot cameras all the way to the shipping department’s PCs. A-7.7: UNIQUE AND BOUTIQUE OPPORTUNITIES There are a number creative niche products and services that could be based on ViewSender products. We like one idea for a specialty service in particular because of our long-term involvement in consulting and contracting. As the software development industry has matured, it has been increasingly difficult to sort out the programmers who write solid, modular, maintainable and cost-effective code from those who merely tell a good story. The landscape is littered with an overwhelming number of failed projects where costs and deliverables were skewed out of reality by having the wrong personnel for the job. At the same time (though fewer in number), there have been some very notable successes, again because of the quality of the individual contributors. Unfortunately, the differences between good and bad coder are subjective and not easily measured (how, and how well, a programmer interacts with co-workers or how well he or she documents the code) or identified in a round of interviews. ©2006-2009 Two's Complement, LLC. | A-7: Business Plan Section 5 supplemental Information 43 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] The idea advanced was to set up a registry service for the elite, best-of-the-best programmers to promote themselves (at high rates, of course). A coder's price of admission would be a self-collected ViewSender Agent database (subject to certain minimum criteria) containing snapshots of his/her work effort during their most recent assignments. The potential employer would pay a fee for access to the registry, and could access any member's Agent database to do searches to assess whether that individual's captured work style and habits was desirable to the employer. The ViewSender Agent already has all the capabilities necessary to support that kind of deployment, including database encryption to prevent alteration. A-8: FOR INVESTORS At the time of this writing, we do not have the management team in place to address the needs of the casual investor whose interest is limited to a hands-off calculation of how much return he/she can expect over what length of time with a specific investment amount. We are working towards attracting participants who can help steer us down a path where we can eventually provide reliable information to support that class of investor. This leaves us two options: assemble our own management, marketing, and development team piecemeal from the parties available as we find them, or find someone with an existing business or team who can wrap themselves around the ViewSender product and vision. For the hands-on investor who has access to his or her own management team with expertise in enterprise software startups, ViewSender in its current state may well represent the most potentially lucrative opportunity around in a very long time. Let me put it in the form of a question: How many debt-free startups with a demonstrable prototype are there out there with topical and proprietary software, no competition, a technology champion who has delivered reliably for twenty years, and sufficient bandwidth to define their own market sub-segment? As stated previously, Scott Deaver would prefer to stay in the technical arena and has neither the skills nor the interest to run a business, other than for a short duration until better-qualified individuals can take the reins. He would happily give up a very significant percentage of the business, so long as he retained the majority interest in the intellectual property, his interests were well-protected, and he were assured an appropriate return on his own sweat-equity investment and an influential ongoing role in the continued development of the technology. A-8.1: DETAILED DEVELOPMENT MILESTONES We have gone to great lengths to anticipate and prepare for any number of possibilities while writing this plan. The milestones laid out below are illustrative, rather than 44 A-8: For investors | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 definitive, and describe one very narrow middle of-the-road path from among any number of others that could be taken in response to changing conditions, partners, resources, or goals. Given the uncertainty of the current economic climate with respect to venture capital, we have referenced our time projections in terms of days from receipt of funding. While it is true that the project will continue to advance in the period of time before funding is acquired, that progress is likely to be slow since the amount of time we can devote to the project will be limited by the time we must spend earning income by other means. If we are able to advance the project meaningfully during that period, we will adjust the milestones accordingly. For any other assumptions, conditions, qualifications, or errata, please see the Notes section. A-8.1.3: ASSUMPTIONS The development milestones laid out in the project plan and described in the sections following make some basic assumptions: 1. These milestones assume that a business management individual or team is already in place, as a partner in ViewSender or as provided by our funding source; 2. The milestones do not consider the issue of a graphic artist and Web master. At some point in time, the organization will require one or more staff to manage graphics production for packaging and advertising materials, and we expect that in the beginning the same staff member(s) would maintain our websites. We believe that point in time is beyond the 456 days specifically covered in our development project plan, and that our needs up to that point will not justify full-time staff. Therefore, we are assuming these needs will be outsourced on an as-needed basis. We have made the same assumption about our clerical needs; 3. The development project plan assigns the tasks of on-line and context help documentation production to the developers. This will tend to produce documentation that is technically accurate, but not particularly attractive or easy to read. We believe this will be adequate to get us through day 456, and presume that the management team will elect to hire a professional documentation person afterwards as needs and sales warrant. That person can then use the documentation in place to trains themselves on the product and as a foundation for better documents; 4. Beginning with the release of the pcOversight EWFH Pro version 1.0 on day 316, we may need to provide deployment assistance to our corporate and institutional customers (for which we will charge a fee). We can use Support Developer 3 for this purpose for very brief time periods, but if demand is high (this would be a very good thing for all concern) we would need to quickly hire and train someone for that role (the person, once fully utilized, would pay for themselves as well as generate some profit through service fees); 5. The development project plan assumes that the development of the ViewSender software is at roughly the same place it was left at the time of this writing - if funding takes a very long time to acquire, it is probable some progress will have ©2006-2009 Two's Complement, LLC. | A-8: For investors 45 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] been made by Scott Deaver in the meantime, and from time to time the development project plan will be adjusted to reflect that progress; and 6. The development project plan assumes sufficient financing to support the resources described in the project plan (funding that as of this writing is not yet available). Until funding is available, the development project plan cannot move forward as written, though once funded it can be implemented immediately. Milestones are shown below as number of days from receipt of funds. A-8.1.4: MILESTONES Those milestones that come from the development project plan are marked with a "[DPP]" in the list below. A-8.1.4.1: DAY 1 The marketing research service is retained based on previous searches and interviews and consultation with funding partner. The intellectual property attorney or patent agent is retained based on previous searches and interviews and consultation with funding partner. The candidate selected from previous developer interviews is notified of his/her start date (this is the developer identified as "Developer 1" in the development project plan). [DPP] Scott Deaver resigns his position at Weatherford to work exclusively on ViewSender development, prepares for start of iEavesdrop (no Server) version 1.0 development. A-8.1.4.2: DAY 3 [DPP] iEavesdrop (no Server) version 1.0 development is officially launched, Developer 1 begins work. A-8.1.4.3: DAY 90 Intellectual property protection status reviewed with attorney/agent. Marketing research report completed. A-8.1.4.4: DAY 92 [DPP] Scott Deaver turns iEavesdrop (no Server) version 1.0 development over to Developer 1, and starts pcOversight EWFH Pro version 1.0 development. A-8.1.4.5: DAY 96 Interviewing begins for QA/Tester 1 position. A-8.1.4.6: DAY 108 46 A-8: For investors | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 Interviewing begins for Support/Developer 2 position. A-8.1.4.7: DAY 122 [DPP] Selected QA/Tester 1 candidate begins orientation. A-8.1.4.8: DAY 136 [DPP] iEavesdrop (no Server) version 1.0 is released to QA for final testing. [DPP] Selected Support/Developer 2 candidate begins training. A-8.1.4.9: DAY 157 [DPP] iEavesdrop (no Server) version 1.0 is completed, and distributed to shareware sites and our website - support cycle begins. A-8.1.4.10: DAY 249 Interviewing begins for Support/Developer 3 position. Interviewing begins for marketing professional. A-8.1.4.11: DAY 277 [DPP] Selected Support/Developer 3 candidate begins training. A-8.1.4.12: DAY 280 Selected sales/marketing professional is hired, begins development of marketing plan to coincide with pcOversight EWFH Pro version 1.0 and subsequent products. Interviewing begins for sales professional. A-8.1.4.13: DAY 288 [DPP] Scott Deaver turns over development of pcOversight EWFH Pro version 1.0 to Developer 1, and starts pcOversight Site Monitor Pro version 1.0 development. A-8.1.4.14: DAY 291 [DPP] Scott Deaver stops development on pcOversight Site Monitor Pro version 1.0 to be picked up later by Developer 1, and starts development of pcOversight Server Viewer version 1.0. A-8.1.4.15: DAY 301 Selected sales professional begins work. A-8.1.4.16: DAY 305 [DPP] pcOversight EWFH Pro version 1.0 is released to QA for final testing. ©2006-2009 Two's Complement, LLC. | A-8: For investors 47 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] A-8.1.4.17: DAY 316 [DPP] pcOversight EWFH Pro version 1.0 passes final testing, is released to our website and to the marketing department. A-8.1.4.18: DAY 317 [DPP] Scott Deaver stops development on pcOversight Server Viewer version 1.0 to be picked up later by Developer 1, and starts development of iEavesdrop Amplified version 1.0. A-8.1.4.19: DAY 323 [DPP] pcOversight Site Monitor Pro version 1.0 is released to QA for final testing. A-8.1.4.20: DAY 330 [DPP] pcOversight Site Monitor Pro version 1.0 passes final tests, is released to our website and to the marketing department. A-8.1.4.21: DAY 350 [DPP] pcOversight Server Viewer version 1.0 is released to QA for final testing. A-8.1.4.22: DAY 352 [DPP] pcOversight Server Viewer version 1.0 passes final testing, is released to our website and to the marketing department. A-8.1.4.23: DAY 364 [DPP] Scott Deaver stops development iEavesdrop Amplified version 1.0 to be picked up by Developer 1 later, and starts work on requirements and prototypes for the next versions of all products. A-8.1.4.24: DAY 406 [DPP] Developer 1 begins development on pcOversight EWFH Basic version 1.0 project. A-8.1.4.25: DAY 408 [DPP] iEavesdrop Amplified version 1.0 is released to QA for final testing. A-8.1.4.26: DAY 413 [DPP] iEavesdrop Amplified version 1.0 passes final testing, is released to our website and to the marketing department. A-8.1.4.27: DAY 427 48 A-8: For investors | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 [DPP] Developer 1 begins development on pcOversight Site Monitor Basic version 1.0 project. A-8.1.4.28: DAY 429 [DPP] pcOversight EWFH Basic version 1.0 is released to QA for final testing. A-8.1.4.29: DAY 434 [DPP] pcOversight EWFH Basic version 1.0 passes final testing, is released to our website and to the marketing department. A-8.1.4.30: DAY 448 [DPP] Developer 1 begins development on iEavesdrop Amplified Server Viewer version 1.0 project. A-8.1.4.31: DAY 450 [DPP] pcOversight Site Monitor Basic version 1.0 is released to QA for final testing. A-8.1.4.32: DAY 452 [DPP] pcOversight Site Monitor Basic version 1.0 passes final tests, is released to our website and to the marketing department. [DPP] iEavesdrop Amplified Server Viewer version 1.0 is released to QA for final testing. A-8.1.4.33: DAY 456 [DPP] ] iEavesdrop Amplified Server Viewer version 1.0 passes final testing, is released to our website and to the marketing department. At this point, all anticipated version 1.0 products have been completed and released for sale or distribution. A-9: ERRATA A-9.1:SECURITY CONSIDERATIONS REGARDING THE VIEWSENDER AGENT The sections below address opportunities we've identified to prevention potential consequential and malicious abuse using the ViewSender Agent. A-9.1.1: ISSUES One of the ViewSender guiding principles is that wherever possible we need to distinguish ourselves and our products from lesser companies and applications that cannot provide the level of service we do (though they may claim otherwise). Above all, we want to ©2006-2009 Two's Complement, LLC. | A-9: Errata 49 June 20, 2009 [THE VIEWSENDER PATH AND PROMISE - APPENDIX] discourage and avoid any situation where our products or people are put in a negative light. As the ViewSender Agent has developed, it is becoming apparent that it has become a very competent and complete component - so much so that we may now have an embarrassment of riches. The Agent’s ability to silently capture and transmit information from a monitored computer for honest intentions is good enough that it may attract the attentions of those who have more sinister purposes. There are four areas of concern: 1. Unauthorized monitoring of one or more computers for other than lawful or intended purposes; 2. Incapacitating or slowing one or more computers by filling hard-drives with collected information; 3. Mass collection of data by insinuating multiple copies of an agent onto many computers using virus, worm, or spyware techniques; and 4. Using the Agent for denial of service attacks against a server, or harassment of an email address (similar to 3.). The problems are compounded by the fact that we will be distributing, via shareware and through various product promotions, free versions that even when not yet registered have capabilities that could be abused to harass or otherwise cause harm to people or equipment. Further exacerbating these issues is the fact we are going to be distributing automatic self-installing Agents on USB devices, which could potentially make a target of any computer out in the open with a USB port. As regards security, the current Agent design considers only the corporate network environment and relies on the fact that the Agent will be in constant conversation with a ViewSender Server. With each message, the Agent will relay its unique instance ID, its location on the network, its currently logged-on user, and its host computer’s machine name. We can force registration of the ViewSender Agent Configuration Utility (ACU) tool that creates Agents, and enforce the relationship between a registered ACU and the unique instance IDs of any Agents it creates or edits. The Server can immediately detect and react to unauthorized use, registration issues, duplicated Agents (the same registration ID reporting from two different computers) – it can even shut down or pause individual, grouped, or all Agents with a single command from the Server Manager console. However, in the world of disconnected computers or those connected only to the Internet (“in the wild” is the term often applied to these machines), we don’t (usually) have the benefits of an always- connected two-way conversation with other machines. The information collected by the Agent in these environments is either stored to the hard drive or sent out one-way as e-mails. We cannot preempt a user from misusing the Agent by monitoring a computer without authorization or legal right, because we have no way to determine intent or 50 A-9: Errata | ©2006-2009 Two's Complement, LLC. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] June 20, 2009 appropriateness of purpose. If a user wants to register a version of the Agent or one of our other applications and then use it for illegal spying, they can go ahead and install the Agent. However, using the means described below, there is a way to trace back the offender once the illegal spying is detected by the victim or someone acting on their behalf – we can tie the Agent on the machine to a registered ACU, and we will be able to definitively identify the ACU registrant. The other problems generally involve misuse of bulk copies of Agents (although filling up a computer’s hard drive with information could apply to the situation described in the preceding paragraph, as well). With the Agent’s current design, when there is no two-way connectivity to a Server, there is no means to detect that duplicate Agents are running on two separate computers. Furthermore, if the free unregistered (shareware) version of the ACU is used to generate the original Agent, we have no means of identifying the person connected to that ACU. Therefore, an attacker could produce a single Agent by legitimate means with a free ACU download, and then force that Agent onto 10, 1000, or a million computers electronically using virus, worm or spyware tactics (or physically with a USB device). By setting the Agent capture configurations, and outgoing e-mail or server addresses, to certain values, the attacker can then through multiple copies of the Agent: Slow down and fill up hard drives (eventually shutting down the hosts) on thousands (millions?) of computers by setting the image collection to very high rates and large file sizes; Render an e-mail address useless with millions of e-mails; and/or Perform a classic denial-of-service attack by keeping a server too busy handling messages to do other work. A-9.1.2: RESOLUTION I’ve come up with what I believe to be an elegant solution that not only resolves the issues, but has the side benefits of separating us from our less worthy competition and providing an incentive for those who download free ViewSender versions to register their products. The corporate versions of the ViewSender Agent will remain exactly as they are. For “in the wild” free (unregistered) versions, we are going to change the behavior used to create and install the Agent, and we will change the registration process a little. Here are the changes: 1. Any attempt to create a new Agent with a free, unregistered version of the ViewSender ACU will now become a two-step process: a. The Agent creator will first have to access the machine to be monitored and run a ViewSender “discovery” applet. That applet will collect information about the target computer, including the CPU registration ID, the computer’s ©2006-2009 Two's Complement, LLC. | A-9: Errata 51 June 20, 2009 2. 3. 4. 5. 6. 7. 8. [THE VIEWSENDER PATH AND PROMISE - APPENDIX] tag (a unique ID embedded into the computer’s BIOS by manufacturers like Dell and HP), disk drive IDs, operating system type and registration ID, and other identifying information, along with the available hard drive letters and free space; b. The Agent creator will then reference the discovery applet’s data when creating the Agent in the ACU. The created Agent on each startup will validate that its host computer’s identifying information matches that collected by the discovery applet when the Agent was created – if not a match the Agent will not run; When editing an existing Agent after it was created, the free unregistered ACU will not be able to modify any of the discovery applet’s original data – if the monitored machine’s configuration has changed, the Agent creator will have to download a new free ViewSender ACU and start over; A free unregistered version of the ViewSender ACU can create one and only one unique Agent; To avoid all of the restrictions above, the user will be encouraged and motivated to register their downloaded ViewSender software (in some cases registration will not cost them anything); When registering, even if the registration is free (as for give-away versions), the registrant will be required to provide a credit card to firmly identify the user (in the case of a give-away registration, we will charge the card $1.00 to ensure it is legitimate, and then refund the $1.00 all in the same session). Even if the card is stolen, we can provide useful information to law enforcement (online IP address, for example) and give the theft victim deniability for any untoward activities the ViewSender registration is used for. We will also require other identifying information in the registration process; Once we have a registered ViewSender ACU tied to a user and a credit card, we can link any Agent created by that ACU to the registrant’s information. We do not need a two-step Agent installation process because any activity done with the created Agent that is discovered and deemed to be inappropriate can be traced back to the registrant; and This attention to security will discourage the casual user who wants to spy on classmates or stalk an ex-wife (and wouldn’t have registered anyway), and will set us apart from imitators as being legitimately committed to acceptable usage of our products. 52 A-9: Errata | ©2006-2009 Two's Complement, LLC.