Our mission is to build excellent software through principled, sustainable development practices that treat the security and well being of the software’s users as a primary concern.
Lori Hamilton, CSM, ICA-CP – Program Manager and Scrum Master
Lori Hamilton is the master of business analysis and project management at Rietta. Her job is to make sure that we stay on time, on budget, and deliver a satisfactory result for you!
Alex Piechowski – Developer
Alex is a full-time developer on the Rietta team. As a development team leader, his job includes helping other developers do the best job possible with an emphasis on coaching, pair programming, and code reviews. He helps makes sure that your project has good software architecture, is implemented to the best standards, and is built to be fit for your purpose.
His public key is available at pachonk on keybase.
Christopher Choi – Developer
Chris’ role is to both development and plan out projects so tasks can be triaged so work is delivered in a timely manner to clients.
Christopher is a full-time developer on the Rietta team. Being one of the newer members of the team, he has assisted in creating systems for project management and client communications.
His public key is available at chrisgopher on keybase.
Matt Bettinson – Developer
Matt is a software developer from Canada. When he’s not programming, he enjoys taking pictures of things and riding his bike.
In addition to his development duties, Matt manages our social media.
His public key is available at mattbettinson on keybase.
Frank Rietta, M.S.I.S. – Chief Application Security Architect
Frank’s role is to ensure that your project is designed for security and speed.
With over 16 years of career experience, he is specialized designing and implementing commercially reasonable security controls necessary to reduce the risk that an application is data breached.
He is a computer scientist with a Masters in Information Security from the College of Computing at the Georgia Institute of Technology.
Frank is a public speaker, who talks about data breaches and information security topics. You can also follow him on Twitter or LinkedIn:
What we do!
We deliver software in short, one week, iterations for startups, enterprises releasing new products, and even government agencies that need extra security.
Next, learn more about how our process helps companies launch new web applications.