Planning
Rick Baker

Biases & Software Project Management

Most people involved in software projects recognize there are communication differences and disconnects. Many people conclude that those communication differences and disconnects exist because some people are “tech people” while other people are “business people”.

Read More »
Cyber Security
Rick Baker

Can your Smartphone be used to guess your mood?

User protection for accelerometer data is lacking, largely due to the lack of understanding of the issue. In current mobile operating systems, third-party applications can access accelerometer data without requiring any permission or conscious participation from the user.

Read More »
Cyber Security
Rick Baker

Understanding the Ransomware Threat Landscape

The proliferation of ransomware tools, the increased use and value of cryptocurrency, economic instability, and the overall increase in data (and value of data) are making ransomware attacks easier to commit and more profitable by the day.

Read More »
Software
Rick Baker

The Greater Your Ambition, The More You Will Encounter Sticky Problems

All businesses that want to grow, improve, or be sustainable face both day-to-day problems and Sticky Problems. Some progressive small-to-mid-sized businesses are working to solve their Sticky Problems and disrupt their industry sector. Some progressive small- to mid-sized businesses are working to solve Wicked Problems to change the world or make a dent in the universe.

Read More »
Leadership
Rick Baker

Book Review: 8 Things We Hate About IT

I strongly recommend that all business leaders read 8 Things We Hate About IT. Whether you are trying to disrupt your industry through innovation or trying to keep day-to-operations running smoothly, understanding how to work with your IT partners is vital to your success.

Read More »
Cyber Security
Rick Baker

What is end-to-end encryption?

Think of NeuTeria as sending a secret message in a physically indestructible box, with no keyhole to pick or hinges to pry open. The box arrives at your recipient’s address without a postal worker and can only be opened and decrypted by the recipient.

Read More »