<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: adhistac</title>
    <description>The latest articles on DEV Community by adhistac (@adhistac).</description>
    <link>https://dev.to/adhistac</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F370753%2F3a2d3e51-9e13-4ce1-bafe-c93606f6d21b.jpeg</url>
      <title>DEV Community: adhistac</title>
      <link>https://dev.to/adhistac</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/adhistac"/>
    <language>en</language>
    <item>
      <title>Continuous Integration for Documentation</title>
      <dc:creator>adhistac</dc:creator>
      <pubDate>Thu, 11 Feb 2021 05:08:56 +0000</pubDate>
      <link>https://dev.to/adhistac/continuous-integration-for-documentation-2ho1</link>
      <guid>https://dev.to/adhistac/continuous-integration-for-documentation-2ho1</guid>
      <description>&lt;p&gt;In the software industry, documentation is started usually after a developer writes code and the bugs are fixed. This approach's prevailing problem is that documentation is an afterthought and long release cycles more likely result in inaccurate docs. &lt;/p&gt;

&lt;p&gt;What we need to understand is that documentation is not overlooked; however, the workflow is. To document, you need to switch tools. Hence, this switch of context pushes the whole process of documentation to the very end. As of now, the integration of documentation in a continuous workflow is of utmost importance.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Continuous integration (CI)&lt;/em&gt; means code is continuously tested, integrated, and merged. While &lt;em&gt;Continuous Deployment (CD)&lt;/em&gt; means code is continually deployed with each patch. For documents, CI and CD include the building, testing the content, reviewing, versioning, and publishing the full artifact for each patch.&lt;/p&gt;

&lt;p&gt;When we treat documents like code, the integration of them becomes faster. Nowadays, source code based documentation generator like &lt;em&gt;markup languages&lt;/em&gt;, &lt;em&gt;latex&lt;/em&gt;, &lt;em&gt;pydoc&lt;/em&gt;, and &lt;em&gt;javadoc&lt;/em&gt; is gaining popularity. Documents like code are always versioned and stored in the version control system. Also, the artifacts for the documents are automatically generated. Furthermore, document files are meticulously reviewed and tested for their accuracy and functionality in the continuous workflow. Overall, there is less human intervention.&lt;/p&gt;

&lt;p&gt;To sum up, this practice results in the creation of uniform documents. It also promotes collaboration with the developers by tracking each documentation mistake as a bug. So, applying the software engineering practice to documentation empowers developers to start documenting, which makes the collaboration convenient.  &lt;/p&gt;

</description>
      <category>technicalwriting</category>
      <category>ci</category>
      <category>continuousdeployment</category>
    </item>
    <item>
      <title>Understanding HIPAA Compliance</title>
      <dc:creator>adhistac</dc:creator>
      <pubDate>Fri, 05 Feb 2021 11:35:11 +0000</pubDate>
      <link>https://dev.to/adhistac/understanding-hippa-compliance-1h95</link>
      <guid>https://dev.to/adhistac/understanding-hippa-compliance-1h95</guid>
      <description>&lt;p&gt;&lt;em&gt;Last week, I completed a short course on &lt;a href="https://www.udemy.com/course/understanding-hipaa-compliance/" rel="noopener noreferrer"&gt;Understanding HIPAA Compliance&lt;/a&gt;. This blog summarizes my learnings from the course&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;The US Health Insurance Portability and Accountability  Act or HIPAA was signed into law on August 21, 1996, by then President Bill Clinton. Overall, it outlines a set of national standards to be abided by the healthcare organizations to maintain the security and confidentiality of sensitive patient information. It covers any type of health-related data, be it physical or electronic. HIPAA gives control to patients over their health-related information and penalties have also been defined in the case of violation. &lt;/p&gt;

&lt;p&gt;Initially, HIPAA was introduced to reduce the cost, maintain the privacy of the patient's health-related information, and simplify the administrative processes. Over time, the objectives of HIPAA has changed. Now, HIPAA assures &lt;em&gt;portability&lt;/em&gt; ensuring that individuals can maintain health insurance during the job, at the time of job change, or while unemployed. Furthermore, HIPAA assures &lt;em&gt;accountability&lt;/em&gt; while maintaining or transmitting health-related information.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who has to be HIPAA compliant?
&lt;/h2&gt;

&lt;p&gt;Anyone dealing with handling, processing, and transmitting health-related data including, health care providers (doctors or nurses), clearinghouses (public or private), and health plans.&lt;/p&gt;

&lt;h2&gt;
  
  
  PHI
&lt;/h2&gt;

&lt;p&gt;HIPAA deals with maintaining the security and integrity of PHI, also known as &lt;em&gt;Protected Health Information&lt;/em&gt; or &lt;em&gt;Personal Health Information&lt;/em&gt;. Simply put, any information that can lead to identifying an individual is called PHI. This information is used, stored, transferred, processed, maintained by health care providers, insurers, and their business partners. It includes information such as the patient's name, date of birth, demographics, medical history, health conditions, insurance information, email address, invoices, treatment details, medical test results, biometric identifiers, etc. These data can be either written, verbal, audio, video, image, or stored in an electronic device. &lt;/p&gt;

&lt;p&gt;Unauthorized access, use, distortion, destruction, and sharing of PHI without the consent of the patient is &lt;em&gt;PHI misuse&lt;/em&gt;. There is a high risk of PHI misuse. Hence, protected PHI fuels the willingness of the patient to share their information. &lt;/p&gt;

&lt;h2&gt;
  
  
  Importances of HIPAA
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;It streamlines the administrative functions.&lt;/li&gt;
&lt;li&gt;It ensures PHI confidentiality, availability, and integrity.&lt;/li&gt;
&lt;li&gt;It ensures the common data format is followed.&lt;/li&gt;
&lt;li&gt;It keeps a check on violations and refrains organizations and individuals from sharing sensitive information intentionally or unintentionally.&lt;/li&gt;
&lt;li&gt;It gives patients the right to monitor their health information.&lt;/li&gt;
&lt;li&gt;It ensures that the patients get a copy of their health information in case they want to approach a new health care provider.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Some HIPAA Terminologies
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Use:&lt;/strong&gt; PHI should be used within an organization and only for the reason it has been collected.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Disclosure:&lt;/strong&gt; PHI can only be disclosed after an individual authorizes or in exceptional situations when required by law or for treatment.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Incidental disclosure:&lt;/strong&gt; Some amount of information about the patient may be disclosed to the people nearby when the patient is being attended to.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Minimum necessary:&lt;/strong&gt; Only the information required to satisfy the intended purpose should be disclosed.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Role-based access:&lt;/strong&gt; The access to PHI is given based on the role. For example, a doctor has a different level of access than the front-desk officer.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Covered entity:&lt;/strong&gt; Covered entity can be anyone providing the health care treatment, managing health care services, or carrying out operational activities, and have access to the PHI. The covered entity should strictly abide by the HIPAA rules.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Business associates:&lt;/strong&gt; Business associates access or provide service to the covered entities. The business associate must have a contract with the covered entities to fully access and use PHI, ensuring confidentiality, privacy, and protection. For example, a data storage company that maintains PHI on behalf of a covered entity.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  HIPAA Rules
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Electronic data interchange rule&lt;/strong&gt;: This rule came into existence in 2002. In the earlier days, all the transactions were documented physically. After the advent of technology, the billing, coding of health-related data, and administrative processes were handled digitally. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Hence, a set of rules were standardized to handle the digital exchange of a patient's health information. The transaction and code set standards aided in maintaining the same software and data structure across the industry maintaining PHI, ultimately increasing the efficiency. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Privacy Rules&lt;/strong&gt;: This rule came into effect in 2003. It was introduced to safeguard and maintain the privacy of PHI. It defines that a patient has the right to know about their health and how the health information is being used. It is applicable to covered entities and their business associates or anyone who stores, processes, or transmits the information in any form. Patients rights under HIPAA's privacy rules are as follows:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Control or restrict the use and communication of information&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Request for disclosure history&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Access and review the information and can request corrections&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Request a copy of a medical record&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Request the notice of privacy practices&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;File complaints &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Furthermore, health care providers must follow the following business practices to ensure the disclosure of minimum information:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Only minimum information can be shared.&lt;/li&gt;
&lt;li&gt;The internal protection of PHI must be ensured.&lt;/li&gt;
&lt;li&gt;The employees must be trained to protect PHI.&lt;/li&gt;
&lt;li&gt;The client should be informed about the business procedure.&lt;/li&gt;
&lt;li&gt;Written consent should be obtained from the client to use and disclose the PHI.&lt;/li&gt;
&lt;li&gt;Maintain the confidentiality and security of PHI.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To safeguard the PHI, the patient must make sure not to disclose any information unless needed through verbal, written, or electronic means of communication. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Verbal&lt;/strong&gt;: The patient must not discuss the PHI in public and make sure the information is not overheard.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Written&lt;/strong&gt;: The patient must securely shred all the documents and must not leave any documents for public access.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Electronic means of communication&lt;/strong&gt;: The patient must securely dispose of the electronic means of communication and log off the computers when not in use.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;PHI can only be disclosed when required by law or government, when it is shared with the patient, for the payment or reimbursement of services, in the case of organ donation, etc.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Security Rule&lt;/strong&gt;: This rule came into effect in 2005. It focuses on confidentiality, access, and storage of PHI or ePHI. &lt;em&gt;Confidentiality&lt;/em&gt; ensures that information is secured from unauthorized disclosure, and in the case of need, only required information is shared. It also includes validation of communication address when the information is to be shared. &lt;em&gt;Integrity&lt;/em&gt; ensures that the mode of transmission is secured when the information is communicated. A firewall is a mandate to secure your network in the case you are communicating the information. It will keep a check on suspicious events securing your system and data. &lt;em&gt;Availability&lt;/em&gt; ensures that information is made available to the authorized personnel.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The security rules enforce the following to securely transfer and store information:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Administrative procedure&lt;/strong&gt;: It ensures implementation and maintenance of workforce security on security training and procedures, documenting privacy procedures, identifying employees with access to ePHI, and reporting and addressing security incidents.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Physical safeguards&lt;/strong&gt;: It ensures all the physical devices are in place to protect the data from unauthorized access and hazards including, CCTV monitoring, biometric, proper door locking system, etc.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Technical safeguards&lt;/strong&gt;: It ensures the PHI being transferred electronically is accessible and securely transmitted. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Other&lt;/strong&gt;: Some other procedures include: availability of a complaint filing and handling mechanism, chosen security officer to address any violations, enforcing penalties, training workforce on securing of sensitive information, etc.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;American Recovery or Reinvestment Act (ARRA)&lt;/strong&gt;: ARRA was introduced in 2009 to strengthen PHI's privacy and security. As a part of the ARRA, &lt;em&gt;Health Information Technology for Economic and Clinical Act (HITECH)&lt;/em&gt; was introduced in 2009. This act encourages the use of electronic health-related information, provides funds to maintain a digital form of records, and strengthens the PHI privacy and security rules. Business associates must agree with HITECH to safeguard PHI and unnecessary disclosure. In 2013, the &lt;em&gt;HIPAA Omnibus Final Rule&lt;/em&gt; created a final modification of the HIPAA privacy and security rule. The central purpose was to facilitate the implementation of HITECH mandates. Interestingly, &lt;em&gt;Genetic Information Non-discriminatory Act&lt;/em&gt; was introduced, which is a law that protects a patient from being discriminated by health insurers or employers based on their genetic information.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  HIPAA Breach and Reporting
&lt;/h2&gt;

&lt;p&gt;A breach is an unauthorized ingress, use, or disclosure of PHI compromising security and privacy. A breach can happen in any form, like accessing data more than the minimum necessary, leaving sensitive documents in a workplace, sharing confidential information, discussing a patient's health in public, sharing PHI with the wrong person unintentionally, or sharing PHI for personal gain. When a breach is encountered, it should be notified without any delay no later than 60 days from the discovery of the breach. Reporting a HIPAA breach aids in its investigation, documentation, and management. It ensures to reduce the damage caused and prevent the occurrence of the same incidents.&lt;/p&gt;

&lt;h2&gt;
  
  
  HIPAA Enforcement and Compliance
&lt;/h2&gt;

&lt;p&gt;To ensure &lt;em&gt;HIPAA Implementation&lt;/em&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Conduct HIPAA awareness training for security officials and employers of an organization.&lt;/li&gt;
&lt;li&gt;Draft and maintain a HIPAA Compliance manual.&lt;/li&gt;
&lt;li&gt;Implement the safeguard measures to protect data.&lt;/li&gt;
&lt;li&gt;Perform regular audits and records the gaps and their remediation methods.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Finally, to maintain &lt;em&gt;HIPAA Compliance:&lt;/em&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Shred all the unrequired documents safely.&lt;/li&gt;
&lt;li&gt;Don't disclose sensitive information.&lt;/li&gt;
&lt;li&gt;Lock the system when not in use.&lt;/li&gt;
&lt;li&gt;Ensure minimum necessary information is shared.&lt;/li&gt;
&lt;li&gt;Beware with whom you are sharing the information.&lt;/li&gt;
&lt;li&gt;Report the breach immediately.&lt;/li&gt;
&lt;li&gt;Don't leave an important document unattended.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>hippa</category>
      <category>healthcare</category>
      <category>mylearning</category>
      <category>technicalwriting</category>
    </item>
    <item>
      <title>Usability Testing - UX Part 4</title>
      <dc:creator>adhistac</dc:creator>
      <pubDate>Fri, 18 Sep 2020 12:42:12 +0000</pubDate>
      <link>https://dev.to/adhistac/usability-testing-ux-part-4-5gc4</link>
      <guid>https://dev.to/adhistac/usability-testing-ux-part-4-5gc4</guid>
      <description>&lt;p&gt;In the previous blog of the UX series, we had discussed&lt;a href="https://dev.to/adhistac/heuristic-evaluation-and-10-heuristics-for-the-ux-part-3-29di"&gt;The Heuristic Evaluation and 10 Heuristics for the UX&lt;/a&gt;. Today we will dive deeper into usability testing.&lt;/p&gt;

&lt;p&gt;Let's get started:&lt;/p&gt;

&lt;h3&gt;
  
  
  Introduction
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;Usability Testing&lt;/em&gt; is a process of testing a product designed with representative users. The goal here is to identify usability-related problems, collect data, and rate the satisfaction of a user after using the product. Generally, while running a usability test, a test plan is drafted, representative users are chosen, and the findings are analyzed. Usability testing does not require a formal lab and can be conducted remotely.&lt;/p&gt;

&lt;h3&gt;
  
  
  Advantages of usability testing
&lt;/h3&gt;

&lt;p&gt;One of the main advantages of conducting usability testing is the identification of problems by the design team prior to coding. The early identification of problems, the less expensive the fixes will be. During usability testing, we will know whether participants are able to complete the task, the time taken to complete the task, level of satisfaction, changes required to improve user performance, and analyze whether user objectives are met.&lt;/p&gt;

&lt;p&gt;Furthermore, the cost of usability testing depends on the number of days required to complete the testing, the number of participants, and the types of tests that will be performed.&lt;/p&gt;

&lt;h3&gt;
  
  
  Aspects to be considered while performing usability testing
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;Time&lt;/em&gt; is the major aspect while performing usability testing. Generally, a usability specialist plans time for running the test, analyzing the findings, drafting a report, and presenting the findings to the development teams.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The cost of recruiting&lt;/em&gt; is decided based on the requirement. Either participant is hired from the same company within their office hours or by recruiting agencies.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Rental Cost&lt;/em&gt; is planned when you secure a room for testing such as; Meeting room or Conference room. Furthermore, if you do not have any equipment to record the evaluation or monitor such as; camera, sound recorder, and projector then it will be added under rental cost.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Compensation for participants&lt;/em&gt; are planned for travel or time factor only. &lt;/p&gt;

&lt;p&gt;Finally, usability testing is an iterative process. Usability specialists should have a clear idea of why testing is conducted in the first place and implement the changes.&lt;/p&gt;

&lt;p&gt;In the upcoming blog, we will dive deeper into &lt;em&gt;How usability testing is planned&lt;/em&gt;.&lt;/p&gt;

</description>
      <category>ux</category>
      <category>technicalwriting</category>
      <category>technicalwriter</category>
    </item>
    <item>
      <title>Heuristic Evaluation and 10 Heuristics for the UX - Part 3</title>
      <dc:creator>adhistac</dc:creator>
      <pubDate>Sun, 06 Sep 2020 12:40:23 +0000</pubDate>
      <link>https://dev.to/adhistac/heuristic-evaluation-and-10-heuristics-for-the-ux-part-3-29di</link>
      <guid>https://dev.to/adhistac/heuristic-evaluation-and-10-heuristics-for-the-ux-part-3-29di</guid>
      <description>&lt;p&gt;In the previous blog, we had discussed &lt;a href="https://dev.to/adhistac/user-experience-ux-part-2-processes-in-ux-19mo"&gt;Processes in the UX&lt;/a&gt;. In this blog, we will dive deeper into &lt;em&gt;Heuristic Evaluation&lt;/em&gt; and &lt;em&gt;Neilson's Heuristic&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Let's get started:&lt;/p&gt;

&lt;h2&gt;
  
  
  Heuristic Evaluation
&lt;/h2&gt;

&lt;p&gt;In &lt;em&gt;Heuristic Evaluation&lt;/em&gt;, the usability experts compare your website's interface against the widely approved usability principles. Heuristic Evaluation assists in obtaining inexpensive feedbacks early in the design process. This feedback can be incorporated with other usability testing methods. However, it is arduous to find a trained usability expert and can be expensive. &lt;/p&gt;

&lt;h2&gt;
  
  
  Neilsen's Heuristics
&lt;/h2&gt;

&lt;p&gt;The following lists the ten heuristics refined by Nielsen and defined by himself with Rolf Molich in 1990. They are:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Visibility of the system status&lt;/strong&gt;&lt;br&gt;
The status of the system must be visible to all the users. For example, &lt;em&gt;Copying 10 items to Drive G:&lt;/em&gt; in the progress bar or &lt;em&gt;Windows is shutting down&lt;/em&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Match between system and the real world&lt;/strong&gt;&lt;br&gt;
The system should speak the user's language and follow real-world conventions. The information should be kept natural and logical. For example, &lt;em&gt;Error 123&lt;/em&gt; can be rewritten as &lt;em&gt;Error while fetching the data&lt;/em&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;User Control and Freedom&lt;/strong&gt;&lt;br&gt;
Your system should support &lt;em&gt;undo&lt;/em&gt;, &lt;em&gt;redo&lt;/em&gt;, and most importantly &lt;em&gt;emergency exit&lt;/em&gt; without allowing a user to go through an extended dialogue.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Consistency and Standard&lt;/strong&gt;&lt;br&gt;
Consistency in the word, icon, functions while you transit from one to page to another within a website. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Error Prevention&lt;/strong&gt;&lt;br&gt;
Prevention of an error before it occurs is the key. Otherwise, discard an error-prone situation or present users with a confirmation action, whether they want to proceed or not?&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Recognition rather than recall&lt;/strong&gt; &lt;br&gt;
The user should not have to recall the information from one dialogue to another. Also, make the instructions easily retrievable and visible wherever appropriate.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Flexibility and efficiency of use&lt;/strong&gt;&lt;br&gt;
It focuses on giving users ways to speed up their work. For example, MAC OS gives privilege to its users to create a custom keyboard and shortcut commands. Another way to increase the efficiency of a user can be to give easy access to its functionalities. For instance, to make an online payment the recent transaction can be made available.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Aesthetic and minimalist design&lt;/strong&gt;&lt;br&gt;
Dialogue should not contain irrelevant information. &lt;em&gt;Development Community&lt;/em&gt; is a great example of this heuristic. It is essentially like a blank page with &lt;em&gt;Write a new post&lt;/em&gt;, &lt;em&gt;Edit&lt;/em&gt;, and &lt;em&gt;Preview&lt;/em&gt; options on the top when you start writing.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Help users recognize, diagnose, and recover from errors&lt;/strong&gt;&lt;br&gt;
An error message should be expressed in plain language with a necessary solution. If you have entered an incorrect username, then a dialogue with &lt;em&gt;Please enter your correct username&lt;/em&gt; should pop up, or the font color for the &lt;em&gt;username&lt;/em&gt; should turn red with the message &lt;em&gt;Incorrect username&lt;/em&gt;. Also, the &lt;em&gt;username recovery&lt;/em&gt; options should be prominent.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Help and documentation&lt;/strong&gt;&lt;br&gt;
Finally, required or supportive documents and FAQ (Frequently Asked Question) section should be updated.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In the upcoming blog, we will dive deeper into &lt;em&gt;Usability Testing&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Happy writing :)&lt;/p&gt;

</description>
      <category>ux</category>
      <category>technicalwriting</category>
      <category>technicalwriter</category>
    </item>
    <item>
      <title>User Experience (UX) Part 2- Processes in the UX</title>
      <dc:creator>adhistac</dc:creator>
      <pubDate>Sat, 29 Aug 2020 13:14:32 +0000</pubDate>
      <link>https://dev.to/adhistac/user-experience-ux-part-2-processes-in-ux-19mo</link>
      <guid>https://dev.to/adhistac/user-experience-ux-part-2-processes-in-ux-19mo</guid>
      <description>&lt;p&gt;After discussing the basics of &lt;a href="https://dev.to/adhistac/user-experience-ux-19mg"&gt;User Experience&lt;/a&gt; now I will  put light on the processes in the UX. &lt;/p&gt;

&lt;p&gt;Let's get started;&lt;/p&gt;

&lt;p&gt;1.&lt;strong&gt;Company Research&lt;/strong&gt;: Initially, before designing UX for a company, the UX designer must be acknowledged with the company's brand, culture, industry-related news, and competitors.&lt;/p&gt;

&lt;p&gt;2.&lt;strong&gt;User Research&lt;/strong&gt;: After company research, the UX designer should focus on gathering user-related information. This step is critical for project success. There are several methods such as; creating a focus group, conducting surveys, card sorting methods,  prototyping, interviewing, and so on. Conducting user research will help remove assumptions from the design process. Furthermore, users, in turn, appreciate and be able to use the system benefitting the goodwill of an organization.&lt;/p&gt;

&lt;p&gt;3.&lt;strong&gt;Information Architecture&lt;/strong&gt;: After gathering useful information, all the content should be inventoried. Then, content auditing is performed where we analyze &lt;em&gt;What is good or working well?&lt;/em&gt; and &lt;em&gt;What is missing?&lt;/em&gt; Based on the findings, a new architecture is drafted and tested with users. Finally, the above steps are iterated. Information Architecture helps with findability and understandability from a user and system point of view.&lt;/p&gt;

&lt;p&gt;4.&lt;strong&gt;Wireframing and Visual Design&lt;/strong&gt;: Now is the time to get things down on a digital paper. There are two types of wireframing; &lt;em&gt;low-fidelity wireframe&lt;/em&gt; and &lt;em&gt;high-fidelity wireframe&lt;/em&gt;. &lt;em&gt;Low-fidelity wireframe&lt;/em&gt; is quick, easy, and cheap as it allows you to get idea out of your head, just like doodling. &lt;em&gt;High-fidelity wireframe&lt;/em&gt; is more detailed, realistic, and is almost near to an actual visual design. Several tools such as; Axure, Sketch, Figma, and so on are used for wireframing.&lt;/p&gt;

&lt;p&gt;On the other hand, &lt;em&gt;Visual Design&lt;/em&gt; is the aesthetics of a site. It includes elements such as; lines, shapes, color, texture, and typography. To achieve an effective visual design, alignment, contrast, proximity between elements, layout, whitespace, and consistency should be kept into consideration.&lt;/p&gt;

&lt;p&gt;5.&lt;strong&gt;Usability Testing&lt;/strong&gt;: Finally, usability testing is a task-based approach in an actual system. Satisfaction is measured based on whether a user can complete the task successfully. Rating Scale (1-10) or baseline is marked, and changes are identified to improve those numbers. While conducting usability testing, test plans are created, the environment is set up, users are identified, tests are conducted, and results are summarized. However, in some exceptional cases, &lt;em&gt;heuristic testing&lt;/em&gt; is performed, which is an educated guess. &lt;/p&gt;

&lt;p&gt;In the upcoming blog, we will be dive deeper into &lt;em&gt;Ten Usability Heuristics&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Happy writing :)&lt;/p&gt;

</description>
      <category>ux</category>
      <category>technicalwriting</category>
      <category>technicalwriter</category>
    </item>
    <item>
      <title>User Experience (UX) Part 1- Introduction</title>
      <dc:creator>adhistac</dc:creator>
      <pubDate>Thu, 27 Aug 2020 11:04:31 +0000</pubDate>
      <link>https://dev.to/adhistac/user-experience-ux-19mg</link>
      <guid>https://dev.to/adhistac/user-experience-ux-19mg</guid>
      <description>&lt;p&gt;&lt;strong&gt;User Experience (UX)&lt;/strong&gt; encompasses all the aspects of the user's interaction with a company and its product. So, the product has to work, it should be easy to use, and enjoyable at the same time. In the real-world, User Experience (UX) is often misunderstood to be similar to the User Interface (UI). UI includes what the user visualize, for example, text, videos, images, colors, and many more. UX is a user's interaction with those UI elements.&lt;/p&gt;

&lt;p&gt;So, what makes great UX? The answer is simple;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;It should offer some value, i.e usefulness or allow user to do things.&lt;/li&gt;
&lt;li&gt;It should offer usability, i.e easy to use.&lt;/li&gt;
&lt;li&gt;It should offer adaptability, i.e easy to get started.&lt;/li&gt;
&lt;li&gt;It should offer desirability, i.e fun and engaging graphic/visual design (image, color, fonts, and shapes) and effective content.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Do you think UX matters? Yes, it does. Many top companies in the world hire UX designers to create seamless interaction of their products with customers. Furthermore, UX decreases development inefficiencies making the development task well-ordered for the front-end engineers. After all, the development of quality products will help a company perform better financially.  &lt;/p&gt;

&lt;p&gt;In the upcoming blog, we will dive deep into &lt;a href="https://dev.to/adhistac/user-experience-ux-part-2-processes-in-ux-19mo"&gt;&lt;em&gt;Processes in the UX.&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ux</category>
      <category>technicalwriting</category>
      <category>technicalwriter</category>
    </item>
    <item>
      <title>How do users remember a product?</title>
      <dc:creator>adhistac</dc:creator>
      <pubDate>Sat, 22 Aug 2020 12:25:13 +0000</pubDate>
      <link>https://dev.to/adhistac/how-do-users-remember-a-product-5bno</link>
      <guid>https://dev.to/adhistac/how-do-users-remember-a-product-5bno</guid>
      <description>&lt;p&gt;Here is a quick overview of how a user remembers a product. A product can be a random application, however, the points discussed below implies to all;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Identifying analogous&lt;/strong&gt; and &lt;strong&gt;Discrimination&lt;/strong&gt;: Products that are similar to the ones a user has used before and different from ones a user has used in the past.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Consistency&lt;/strong&gt;: &lt;em&gt;Consistency&lt;/em&gt; across the entire product ensures quick referencing. Easy navigation, interactive designs, flexibility, and the efficiency of use (Keyboard shortcuts) reinforce the idea of quick referencing. Furthermore, consistency is indispensable between style and UI elements. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;A user never remembers the mismatched UI elements, some elements in UI that create confusion, or weak association and navigation throughout.&lt;/p&gt;

</description>
      <category>ux</category>
      <category>technicalwriting</category>
      <category>learnedthroughexperience</category>
    </item>
    <item>
      <title>Gibbs Reflective Cycle: Launching Success in Product Releases</title>
      <dc:creator>adhistac</dc:creator>
      <pubDate>Sun, 05 Jul 2020 12:17:08 +0000</pubDate>
      <link>https://dev.to/adhistac/using-the-gibbs-model-to-self-reflect-on-the-experience-after-product-release-512n</link>
      <guid>https://dev.to/adhistac/using-the-gibbs-model-to-self-reflect-on-the-experience-after-product-release-512n</guid>
      <description>&lt;p&gt;There is a quote by John Dewey, &lt;em&gt;We do not learn from the experience, we learn from reflecting on the experience.&lt;/em&gt; In 1988, the American sociologist and psychologist Graham Gibbs published a well-known Reflective Cycle model in his book, Learning by Doing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Gibbs Reflective Cycle&lt;/strong&gt; encourages individuals to reflect on their experience systematically after encountering a particular situation, event, or activity. In this blog, you will use the &lt;em&gt;Gibbs Reflective Cycle&lt;/em&gt; to self-reflect on your experience after a product release.&lt;/p&gt;

&lt;p&gt;In the software industry, product release refers to launching a new application. A release manager or coordinator understands the demanding situations when applications are released. The &lt;em&gt;Gibbs Reflective Cycle&lt;/em&gt; aids in analyzing your experience and using those insights for a seamless product release.&lt;/p&gt;

&lt;p&gt;The first phase of the Gibbs Reflective Cycle is &lt;strong&gt;Description&lt;/strong&gt;. You initiate this phase with a question &lt;em&gt;What happened?&lt;/em&gt;. Take a moment to carefully consider the following questions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;When did the release take place?&lt;/li&gt;
&lt;li&gt;Did the release happen?&lt;/li&gt;
&lt;li&gt;Who was involved in the release?&lt;/li&gt;
&lt;li&gt;What did you do yourself?&lt;/li&gt;
&lt;li&gt;What did others do?&lt;/li&gt;
&lt;li&gt;What were the results of all these actions?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Moving onto the second phase, &lt;strong&gt;Feelings&lt;/strong&gt;. Start documenting what you were thinking. Take a moment to carefully consider the following questions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What did you feel after the event?&lt;/li&gt;
&lt;li&gt;Since we are sticking to the product launch, how did you 
feel about this?&lt;/li&gt;
&lt;li&gt;Is it going to be a success?&lt;/li&gt;
&lt;li&gt;If yes, why were the people involved? If not, why were the 
people involved?&lt;/li&gt;
&lt;li&gt;What are your contributions? What are your feelings about it?&lt;/li&gt;
&lt;li&gt;What did you think that others felt during the event?&lt;/li&gt;
&lt;li&gt;How do you look back on the situation?&lt;/li&gt;
&lt;li&gt;What have you learned from the situation?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Moving on to the third phase, &lt;strong&gt;Evaluation&lt;/strong&gt;. You have to decide whether an experience is good, bad, or satisfactory. Take a moment to carefully consider the following questions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If the experience was good, what was your approach?&lt;/li&gt;
&lt;li&gt;If the incident was not up to the mark, why didn't it work?&lt;/li&gt;
&lt;li&gt;What are the areas of improvement?&lt;/li&gt;
&lt;li&gt;What were your contributions?&lt;/li&gt;
&lt;li&gt;What contributions did other people make?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Moving on to the fourth phase, &lt;strong&gt;Analysis&lt;/strong&gt;. Focus on what sense can you make of the situation? Take a moment to carefully consider the following questions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What are the learnings you want to go ahead and adopt to understand a product better?&lt;/li&gt;
&lt;li&gt;What can you do better in the future, and what do you need to convey to your team?&lt;/li&gt;
&lt;li&gt;Moving on to the fifth phase, Conclusion. In this phase, you think what else could you have done? Analyze the following:&lt;/li&gt;
&lt;li&gt;While expecting a favorable situation, did the activity lead to any negative instances?&lt;/li&gt;
&lt;li&gt;So, what is the overall experience?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Finally, the last phase, &lt;strong&gt;Action plan&lt;/strong&gt;. How will you handle the situation in the future? Take a moment to carefully consider the following questions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What skills do you need to work on for similar events?&lt;/li&gt;
&lt;li&gt;What will you do differently next time, and how will you achieve this?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You have taken the time to reflect on the product release process and  have key takeaways from your experience. In the upcoming series, I will guide you through my product release experience.&lt;/p&gt;

</description>
      <category>productivity</category>
      <category>techtalks</category>
      <category>productrelease</category>
      <category>gibbsreflectivecycle</category>
    </item>
    <item>
      <title>Network Security- Terminology</title>
      <dc:creator>adhistac</dc:creator>
      <pubDate>Thu, 02 Jul 2020 11:09:06 +0000</pubDate>
      <link>https://dev.to/adhistac/network-security-terminologies-4nm</link>
      <guid>https://dev.to/adhistac/network-security-terminologies-4nm</guid>
      <description>&lt;h3&gt;
  
  
  Topics covered
&lt;/h3&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;      Security Terminology&lt;br&gt;
      Types of hacker&lt;br&gt;
      Approaches to Network Security&lt;br&gt;
      Threat Classification&lt;br&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;h3&gt;
&lt;br&gt;
  &lt;br&gt;
  &lt;br&gt;
  Security Terminology&lt;br&gt;
&lt;/h3&gt;

&lt;p&gt;Below are some common network security terminology used by security professionals:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Firewall&lt;/strong&gt;: It is a barrier between a network and the outer world. Sometimes, it acts as a firewall, standalone server, or a router.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Proxy server&lt;/strong&gt;: Proxy server hides your internal network IP address and presents its own IP address to the outside world. Proxy server and firewall work in conjunction.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Access Control&lt;/strong&gt;: It refers to the measures taken to limit access to a resource. For example, logon procedure, encryption, or any method to prevent unauthorized access.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authentication&lt;/strong&gt;: It is a method of verifying a authentic user. For example, entering the credentials, or two-factor authentication.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Non-repudiation&lt;/strong&gt;: It is a method to track actions taken by a user. It ensures a person cannot deny an action performed on a computer. One of the methods is &lt;em&gt;auditing&lt;/em&gt;.&lt;em&gt;Auditing&lt;/em&gt; is the process of reviewing logs, records, and procedures. It is performed by an auditor.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Least privilege&lt;/strong&gt;: It means you are assigning enough privilege to any user or device, just to get the job done.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CIA Triad&lt;/strong&gt;: CIA Triad refers to Confidentiality, Integrity, and Availability. The security measures need to abide by these aspects. Such as, a strong password protects the confidentiality, digital signature ensures integrity, and a backup system increases availability.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Types of hacker
&lt;/h3&gt;

&lt;p&gt;Based on the level of the exploitation of a system, hacker groups are divided into three types:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;White hat hacker&lt;/strong&gt;: If a hacker upon finding the vulnerability, reports it to the vendor anonymously, explaining what the flaw is and how it was exploited, they are White hat hacker.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Black hat hacker&lt;/strong&gt;: If a hacker gains access to a system with a goal to harm it, they are categorized as the Balck hat hacker.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Grey hat hacker&lt;/strong&gt;: A grey hat hacker abides by the law but conducts illegal activities because they find it ethical.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Approaches to Network Security
&lt;/h3&gt;

&lt;p&gt;An organization can choose several approaches to secure their networks. Three approaches are:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Perimeter Security Approach&lt;/strong&gt;: Security efforts are focused on the perimeter of a network including; firewall, proxy server, technology, or procedures. Generally, small organizations that do not store sensitive data and with budget constrain adopt this measure.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Layered Security Approach&lt;/strong&gt;: Layerwise or segmentwise security efforts implemented on a network, as if it were a separate network. It is a preferred security approach wherever possible.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Hybrid Security Approach&lt;/strong&gt;: The combination of the perimeter to layered security defense with passive to active approaches implemented is a hybrid security approach. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Threat Classification
&lt;/h3&gt;

&lt;p&gt;Based on what a threat actually does to your system or network, here are three major classifications:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Malware&lt;/strong&gt;: Malware is a type of threat designed to spread on its own, without the creator having to be directly involved. &lt;em&gt;Computer Virus&lt;/em&gt; is a common example of malware. Analogous to a biological virus, a computer virus replicates and spreads by infecting other programs. Likewise, &lt;em&gt;Trojan horse&lt;/em&gt; is also a type of malware, that appears benign but secretly downloads other types of malware on your computer. Illegitimate software is prone to a Trojan horse. Furthermore, &lt;em&gt;Spyware&lt;/em&gt; is also a type of software that spies on your computer by recording all the keystrokes and periodic screenshots.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Intrusion attacks&lt;/strong&gt;: Intrusion attacks help to gain access to a system or intrude into a system usually with malicious intent. Hackers generally use the term &lt;em&gt;cracking&lt;/em&gt; if they are able to intrude in a system via some operating system or any other means. Some of the intrusion attacks are initiated via &lt;em&gt;social engineering&lt;/em&gt;. The intruder relies more on human nature rather than a technology to gain enough information required to access the targeted system.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Blocking attacks&lt;/strong&gt;: This category of attack deals with Denial of Service Attack (DoS).The attacker prevents a legitimate user to access the system by flooding false connection requests.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>siem</category>
      <category>security</category>
      <category>networks</category>
    </item>
    <item>
      <title>TYPES OF NETWORK</title>
      <dc:creator>adhistac</dc:creator>
      <pubDate>Mon, 22 Jun 2020 11:30:25 +0000</pubDate>
      <link>https://dev.to/adhistac/three-types-of-network-40ii</link>
      <guid>https://dev.to/adhistac/three-types-of-network-40ii</guid>
      <description>&lt;p&gt;Networking skills like communication, listening, and social skills are valuable in professional and personal environments. Networking is highly essential to develop relationships with a new contact and promote something valuable. Hence, here are three types of network you should maintain professionally and personally;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Operational Network&lt;/strong&gt;: The operational network includes people at the workplace, such as the product team (Developers, QA, Engineering Manager, Head Architect, Project Manager, and so on). They help you get your work done. It is internal and current focused.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Personal Network&lt;/strong&gt;: Personal network includes people who can help you grow personally and sometimes professionally. It is usually external and shares a common interest, such as; friend from workplace or college.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Strategic Network&lt;/strong&gt;: It includes people who can help you shape your future goals and directions. Such a type of network is either internal, external, or future-oriented such as; teachers, mentors, and so on.&lt;/p&gt;

</description>
      <category>career</category>
      <category>todayilearned</category>
      <category>technicalwriter</category>
      <category>randomtalks</category>
    </item>
    <item>
      <title>HOW TO WRITE A DEFINITION?</title>
      <dc:creator>adhistac</dc:creator>
      <pubDate>Tue, 02 Jun 2020 12:38:48 +0000</pubDate>
      <link>https://dev.to/adhistac/how-to-write-a-definition-am</link>
      <guid>https://dev.to/adhistac/how-to-write-a-definition-am</guid>
      <description>&lt;p&gt;While writing a technical document, you start with a definition. The definition needs to clearly outline the term you are defining.  Here are some ways you can use while defining a term;&lt;/p&gt;

&lt;p&gt;An easy step to get started with a definition is to place a term into a classification and differentiate it from other terms for the same class. For instance, &lt;br&gt;
The how-to article is a type of expository writing that delivers information on the structural way to perform a particular task to an audience.&lt;/p&gt;

&lt;p&gt;The how-to article is a &lt;em&gt;term&lt;/em&gt;, and expository writing is the &lt;em&gt;classification&lt;/em&gt;. &lt;/p&gt;

&lt;p&gt;Furthermore, you can add extensions to give precise meaning. For instance, &lt;br&gt;
The how-to article is a type of expository writing that delivers information on the structural way to perform a particular task to an audience. Expository writing is a type of writing where the author intends to either inform or explain the subject to the reader.&lt;/p&gt;

&lt;p&gt;"Expository writing is a type of writing where the author intends to either inform or explain the subject to the reader." is an &lt;em&gt;extension&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;In the case of defining a term with more than two meanings, you can use qualifiers. The qualifier is used when the general context needs to be established upfront. For instance,&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Bug (Computing): An error in code, program, or system.&lt;/li&gt;
&lt;li&gt;Bug (Biology): An insect.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In the aforementioned case, computing and biology are &lt;em&gt;qualifiers&lt;/em&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  As bonus information:
&lt;/h3&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Process description vs. Mechanism description&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;A &lt;em&gt;mechanism description&lt;/em&gt; delivers details about the physical attributes of a mechanism. A &lt;em&gt;process description&lt;/em&gt; lists out the steps in the operation of a mechanism or focuses on the working of conceptual parts. Both are different in the context of content delivered.&lt;br&gt;
Keep writing :)&lt;/p&gt;

</description>
      <category>technicalwriting</category>
      <category>technicalwriters</category>
      <category>definition</category>
    </item>
    <item>
      <title>Six points to consider while adding an image to a technical document</title>
      <dc:creator>adhistac</dc:creator>
      <pubDate>Thu, 28 May 2020 04:03:53 +0000</pubDate>
      <link>https://dev.to/adhistac/six-points-to-consider-while-adding-visuals-to-a-technical-document-2dac</link>
      <guid>https://dev.to/adhistac/six-points-to-consider-while-adding-visuals-to-a-technical-document-2dac</guid>
      <description>&lt;p&gt;Image is an essential element of a technical document. While preparing a manual or a release note, you need to include a screenshot for a process or step. Here are some points to consider while adding an image to a written text;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Ensure the image included correlates with the mechanisms, processes, or steps that you are trying to clarify.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Always reference an image in the description before its placement. Also, include numbers and titles. Some document generator tools like; Sphinx automatically generate numbers for images.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Use appropriate labels and captions. Besides, used labels and captions should match the text description. For instance, if you are describing the "Add icon" of a UX design, do not call it "Add icon" in the image and "icon to add" in the text.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Use an image when it contains copyrighted information. Also, anonymize critical information if you are using borrowed images.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Avoid using blurry and unclear images. While adding screenshots in a technical document (manual and release note), take a clear picture using screen capture tools such as; Snagit. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;An image need not be mandatorily added to the document. However, it can help your audience to self-evaluate a process. Some concepts are so complex. Instead of using an image, it is best to enhance the text.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;As a bonus tip, do not exaggerate or misinterpret the original scale of an image. It affects the readability of the text.&lt;/p&gt;

&lt;p&gt;Keep writing :)&lt;/p&gt;

</description>
      <category>writing</category>
      <category>visual</category>
      <category>technicalwriting</category>
    </item>
  </channel>
</rss>
