- Jan 2025
-
faculty.washington.edu faculty.washington.edu
-
By now, you should be recognizing that problems are in no way simple. Because everyone’s problems are personal and have different causes and consequences, there is no such thing as the “average user”
I completely agree with this point because it captures the fundamental challenge of designing for real-world problems: users are diverse, and their experiences are shaped by unique contexts. This idea resonates with me because I’ve often seen solutions that fail due to oversimplifying user needs or assuming a one-size-fits-all approach. For instance, I’ve encountered apps that try to target a "general audience" but end up being confusing or ineffective for specific groups.
This reading has made me think more deeply about the importance of user research and the need to avoid stereotypes in design. It also reminds me that I need to ask questions like, "Whose problems am I solving, and am I considering the full range of their needs?" Overall, this perspective is useful because it encourages empathy and thoughtful exploration when tackling complex design challenges.
-
- Apr 2024
-
social-media-ethics-automation.github.io social-media-ethics-automation.github.io
-
For example, the proper security practice for storing user passwords is to use a special individual encryption process [i6] for each individual password. This way the database can only confirm that a password was the right one, but it can’t independently look up what the password is or even tell if two people used the same password. Therefore if someone had access to the database, the only way to figure out the right password is to use “brute force,” that is, keep guessing passwords until they guess the right one (and each guess takes a lot of time [i7]).
This method essentially treats each password like its own secret treasure, locked away in a unique encrypted vault. It's like having a separate lock for each door in a massive mansion - even if someone gets inside, they can't just wander around and open any door they please. Instead, they're left with the daunting task of trying every key in existence to find the right one. And let's face it, that's not only time-consuming but also incredibly frustrating. So, by giving each password its own special treatment, we're essentially making it a lot harder for anyone to break in and steal our precious data. It's like having a personalized bodyguard for each piece of sensitive information!
-