Category Archives: Uncategorized

2018 Q1 Milwaukee and Madison Technology Startup Funding

In 2018 Q1, two Milwaukee-area Technology Startups raised a total of $3,253,734. Congratulations to basic-code and GenoPalate, both of Brookfield, WI.

Also in 2018 Q1, three Madison-area Technology Startups raised a total of $1,425,007. Congratulations to VIP Crowd, GymDandy, and EnsoData.

Together, Milwaukee-area and Madison-area Technology Startups raised a total of $4,678,741!

As always, the following caveats apply to the above graph and findings:

  1. All information is from FormDs.Com.
  2. To be included as a Madison-area or Milwaukee-Area Technology Startup Funding event on this report, the business must be located in the Madison-area or Milwaukee-area as defined by FormDs.Com; the business must be in the Technology Industry Group (which includes Computers, Telecommunications, and Other Technology); and the business must not be publicly traded.
  3. I’m not a startup funding professional or an accountant. If there’s something wrong with this report, be nice, tell me directly or LEAVE A COMMENT, and I’ll do my best to correct it.

Ally Recommends a Site!

One of my younger readers, Ally, is a Girl Scout working toward her Financial Literacy badges. She and her mother wrote to to thank me for one of the articles on this blog. In addition, Ally recommended that I add the following site to my list of resources:

https://graduate.norwich.edu/mba/entrepreneurship-lessons-for-students/

i checked it out and it is indeed a useful page for those interested in being an entrepreneur! Great suggestion, Ally!

Password Recovery Services Best Practices

Recently, I helped a client recover the password to a Microsoft Excel spreadsheet. In doing so, I came up with a few best practices for password recovery services:

  1. Prior to starting any work on a password recovery project, the service provider should require the client to sign an agreement where by the client:
    1. Attests to ownership of the system or file and their right to engage the service provider to recover the password;
    2. Gives permission to the service provider to recover the password to the system or file; and
    3. Gives permission to the service provider to access the system or file for the purpose of confirming that the password recovery was successful.
  2. Best practices for the communication and storage of passwords should be applied to recovered passwords. For example:
    1. Don’t communicate passwords in clear text;
    2. Don’t store passwords in clear text; and
    3. Change passwords if there’s any chance they’ve been compromised.
  3. The provider and the client should have a reciprocal non-disclosure agreements in place.

Do you have any additional ideas for best practices for how password recovery service providers and clients should work together? If so, leave a comment!