cavasquezFeb 3, 20202 min readFour Surprising Uses For Cryptography - Part 4: Non-repudiationNon-repudiation - ensuring proof that a specific actor took action We can use cryptography to to prove that some actor took an action.
cavasquezNov 13, 20192 min readFour Surprising Uses For Cryptography - Part 3: AuthenticationWe can use cryptography to "authenticate," or check if someone is who they claim to be.
cavasquezSep 19, 20192 min readFour Surprising Uses For Cryptography - Part 2: IntegrityI've been studying CISSP materials, and this series is an attempt to synthesize my studies and notes into something consumable. I hope...
cavasquezSep 12, 20191 min readFour Surprising Uses For Cryptography - Part 1: ConfidentialityThe most common understanding of cryptography's utility is to enable confidentiality, but it does much more than that.
cavasquezSep 10, 20192 min readBusiness Capabilities and Product ManagementCapabilities are the firm's abilities to do things that are considered valuable (in and by the market).
cavasquezApr 7, 20192 min readHow To Create A Diverging Stacked Bar Chart In ExcelLast week I wrote about The Best Way to Graph Likert Scale Data: Diverging Stacked Bar Charts. A few folks asked how to do this in Excel....
cavasquezApr 3, 20191 min readThe Best Way to Graph Likert Scale Data: Diverging Stacked Bar ChartsThe two most common ordered categorical scales that a product manager is likely to come across are the Net Promoter Scale and Likert...
cavasquezMar 29, 20192 min readTotal Addressable Market for Typical and Enterprise Product ManagersEnterprise product managers, or product managers focused on internal products and services for the enterprise organization, often have a...