Explore our library of tools, guides, case studies, reports and more. Sort by topic, tag, type, and recency.

superbloom asterisk

What are stress cases?

What are stress cases? When an aspect of a person or a context is pushed to an extreme, that’s a stress case. Some people refer to a stress case as an “edge case.” We prefer the term “stress case” (which we learned about from Eric Meyer and Sara …
superbloom asterisk

Data Handling Best Practices

Doing data handling with privacy and security in mind means spending some time to identify different threats, culminating in a threat model, and coming up with strategies that fit the particular threat model. We’ve compiled some best practices for both risk assessment and security strategies.
superbloom asterisk

Quick Tool Feedback

Designing alongside your users will make your tools respond best to their needs. We'll show you how to get instant input from your users. From our video series, Design Spots.
superbloom asterisk

High-Risk User Research

These are additional considerations for conducting user research involving high-risk participants. From our video series, Design Spots.
superbloom asterisk

How to Name Your App

Naming software is hard because the name needs to convey a lot of meaning about what the program does to an unfamiliar audience, and do it all using only a word or short phrase. You want something memorable and easy to say – which becomes more …
superbloom asterisk

Lessons from Architecture School: Part 2

This continues Part 1 of a series of posts drawn from a talk I gave at O’Reilly’s online conference Experience Design for Internet of Things (IoT) on “Lessons from Architecture School for IoT Security.” You can find the slides for the original talk …