brainstorming
Brainstorming
Principles
- Quantity over quality: Generate many ideas first
- No judgment: Defer criticism until later
- Build on ideas: Combine and extend
- Wild ideas welcome: Encourage creativity
Techniques
Mind Mapping
Start with central concept, branch out associations.
┌── Mobile App
│
┌── UI ────┼── Web App
│ │
│ └── CLI
│
Product ─┼── Features ── [list features]
│
│ ┌── PostgreSQL
└── Data ──┤
└── Redis
SCAMPER
- Substitute: What can be replaced?
- Combine: What can be merged?
- Adapt: What can be borrowed from elsewhere?
- Modify: What can be changed?
- Put to other uses: Different applications?
- Eliminate: What can be removed?
- Reverse: What if we flip it?
How Might We (HMW)
Reframe problems as opportunities.
Problem: Users abandon signup
HMW: How might we make signup feel rewarding?
HMW: How might we reduce signup friction?
HMW: How might we show value before signup?
Crazy 8s
- Fold paper into 8 sections
- 8 ideas in 8 minutes
- One idea per section
- Sketch or write
Idea Evaluation
After brainstorming, evaluate ideas:
| Idea | Impact | Effort | Risk | Priority |
|---|---|---|---|---|
| Idea 1 | High | Low | Low | Do First |
| Idea 2 | High | High | Med | Plan |
| Idea 3 | Low | Low | Low | Maybe |
Diverge → Converge
- Diverge: Generate many ideas (no filter)
- Organize: Group similar ideas
- Converge: Select best ideas to pursue
More from nguyenhuuca/assessment
compliance
Ensure regulatory compliance. Use when implementing GDPR, HIPAA, PCI-DSS, or SOC2 requirements. Covers compliance frameworks and controls.
18requirements-analysis
Analyze and refine product requirements. Use when clarifying scope, identifying gaps, or validating requirements. Covers requirement types and analysis techniques.
16security-review
Conduct security code reviews. Use when reviewing code for vulnerabilities, assessing security posture, or auditing applications. Covers security review checklist.
13identity-access
Implement identity and access management. Use when designing authentication, authorization, or user management. Covers OAuth2, OIDC, and RBAC.
12execution-roadmaps
Create execution roadmaps for projects. Use when planning multi-phase projects or feature rollouts. Covers phased delivery and milestone planning.
12cloud-native-patterns
Apply cloud-native architecture patterns. Use when designing for scalability, resilience, or cloud deployment. Covers microservices, containers, and distributed systems.
12