SlideShare una empresa de Scribd logo
1 de 16
Technical
Writing for
Consultants
Dilum Bandara
Dilum.Bandara@uom.lk
What We Do as Consultants?
• Conduct a need analysis
 Meetings, presentations, document analysis, phone calls
• Prepare a proposal
 Describe motivation & test/assessment procedure to be used
 Terms of Reference (ToR)
 Payment terms
• Conduct a solid test, assessment, investigation, or design
 Based on industry best practices & our own expertise
• Prepare a comprehensive report
 Test/assessment procedure used
 List findings
 List recommendations based on expert judgement
• Follow up meeting or presentation
 Call for action
 Help during action 2
Exercise
• Think about a test or assessment you did for a client
 Penetration test, security assessment, digital forensic
investigation, evaluate quotations, etc.
• Write a summary of the test or assessment including
 Test/assessment procedure
 Key findings
 Key recommendations
• Just write
 Don’t worry about spelling, grammar, or punctuation
 Don’t edit, just write
• 10 min max
3
Technical Writing
• Writing that
 “transfers information about a situation, product, service,
or concept… to audiences of varying levels of technical
knowledge, so that each member of the audience clearly
understands the message.”
• Word “technical” means skilled, specialized, &
strict
• Technical writing follows rules & protocols
4
- The Institute of Technical Communication (workshop) June, 1998
Source: www.zaetric.com/technical-writing/
Business Writing
• Writing style appropriate for a business setting
• Generally “persuasive” writing
• Purposes
 To convey information
 To explain/justify actions
 To influence reader to take some action
 To direct action
 To deliver good or bad news
• Includes
 Business Letters, E-mail Transmissions, Memo, Reports,
Contracts, MoUs, & Manuals
5
6
Source: http://collegeunbound.org/2012/09/05/the-writing-process/
Rhetorical Triangle
7
Source:
https://rhetoricaljournalist.wordpress.com/2011/05/09/p
odcast-1-the-rhetorical-triangle-and-burkes-pentad/
Consultants
Experts
CIO
COO
IT Manager
Sys. Admin
Developers
State of system
Dos & Don’ts
Call for action
How To Do It?
• Write for at least 2 levels
 CIO, COO, IT Manager
 Sys. Admin, Developer
• Include all key points
 Findings & recommendations
 Clear scope
 What they need to provide to start project?
• Aim for precision
 Get straight to the point
 Don’t use unnecessary words or waffle
 Make every word count
• Unless you are a confident writer, best to avoid over-long
sentences
 Aim for a mixture of long & short sentences for variation & rhythm
8
Executive Summary
Bullets & Numbering
Tables
Diagrams
Details
Domain specific words
Annex with detailed
results
Tips & References
How To Do It? (Cont.)
• Avoid overly elaborate language
 Use technical language & words specific to your discipline,
where appropriate
 When using words that aren’t technical or domain specific,
use simple words in place of obscure words that have the
same meaning
 Using overly elaborate language can make your writing seem
pretentious
 “Write to express not impress”
• If there is any uncertainty about a particular point,
use cautious language
 e.g., ‘may’, ‘might’, ‘could’, ‘potentially’
• Avoid repeating the same words
9
How To Do It? (Cont.)
• Avoid vague terms
 Very high vulnerability, very high overhead, extremely important
• Use words efficiently
 Firstly, Secondly  First, Second
 Utilization  Use
 On the other hand  Alternatively
 Already existing, completely eliminate, basic fundamentals
• Write with verbs and nouns
 Active voice
 First person
• Appropriate format to improve readability
• Review
 Spellings, grammar, & style
 Peer review
10
Use Your Word Knife
• Readers are overloaded
• Use your limited word budget to get most
attention
• Types of readers
 Skimmers
 Read quickly
 Look for key words, bulleted information, graphs
 Summarize key points at beginning & end
 Skeptics
 Read every word
 Looking for logic flaws or reasons to disbelieve or say no
 Provide plenty of examples, details, & supporting statements
11
Examples
• Per our conversation, I am enclosing herewith a
remittance of $125 for the balance due on my
account.
• As we discussed, here is the $125 remaining on my
account.
• Here is the $125 remaining on my account.
• The relationship between the access to free contents and
loss of privacy in social networks is extremely important to
everyone including employees, businesses, government,
and general public.
• The conflict between free access and privacy in social
network concerns many employees, businesses,
government, and general public.
12
Examples (Cont.)
• Despite winning the game, the Sri Lankan team made
several errors in the field.
• Sri Lankan won the game, despite making several errors
on the field.
• Same observations are made from the Head Office
network also.
• Similar set of observations are to be made from the Head
Office Network.
• Slow response times are observed during different times
of a day while much higher delays are noted during peak
hours.
• Higher response times are observed not only during peak
hours but also throughout the day.
13
Examples (Cont.)
• We will utilize an efficient, top down root cause isolation process to
resolve the performance lag in the system.
• We (will) use a top-down process to diagnose performance issues in
the system.
• Proposal submitted for the Hosted Firewall by XXX PLC does not
satisfy the technical requirements, and does not satisfy the pricing
structure.
• The proposal submitted for the Hosted Firewall by XXXX PLC does not
satisfy the technical requirements.
• The Application allows XXXX employees to use the mobile work load
management system application on their day to day work activities
without coming to the brach it self.
• The Mobile App enables XXXX employees to access the workload
management system for their day-to-day work activities while on the
filed.
14
Exercise
• Read write up you wrote earlier (slide 2)
• Think about how to apply what we learned
• Edit/rewrite a summary of the test or assessment
including
 Test/assessment procedure
 Key findings
 Key recommendations
• 10 min max
• Let’s review write ups from 2-3 volunteers
15
To Be a Good
Writer You Must
Read

Más contenido relacionado

La actualidad más candente

24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
Positive Hack Days
 
Intro to Security in SDLC
Intro to Security in SDLCIntro to Security in SDLC
Intro to Security in SDLC
Tjylen Veselyj
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security Frameworks
Marco Morana
 

La actualidad más candente (19)

Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'24may 1200 valday eric anklesaria 'secure sdlc – core banking'
24may 1200 valday eric anklesaria 'secure sdlc – core banking'
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Basic of SSDLC
Basic of SSDLCBasic of SSDLC
Basic of SSDLC
 
Intro to Security in SDLC
Intro to Security in SDLCIntro to Security in SDLC
Intro to Security in SDLC
 
The road towards better automotive cybersecurity
The road towards better automotive cybersecurityThe road towards better automotive cybersecurity
The road towards better automotive cybersecurity
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
Reduce Third Party Developer Risks
Reduce Third Party Developer RisksReduce Third Party Developer Risks
Reduce Third Party Developer Risks
 
The security sdlc
The security sdlcThe security sdlc
The security sdlc
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlc
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security Frameworks
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 

Similar a Technical Writing for Consultants

Ten Lessons of the DevOps Transition
Ten Lessons of the DevOps TransitionTen Lessons of the DevOps Transition
Ten Lessons of the DevOps Transition
Randy Shoup
 
Requirements Management
Requirements ManagementRequirements Management
Requirements Management
mujtabap
 
Twin Cities Salesforce.com Developer User Group Presentation April 2012
Twin Cities Salesforce.com Developer User Group Presentation April 2012Twin Cities Salesforce.com Developer User Group Presentation April 2012
Twin Cities Salesforce.com Developer User Group Presentation April 2012
Developer Force - Force.com Community
 
Bnak of England insight day
Bnak of England insight dayBnak of England insight day
Bnak of England insight day
Alexa-Jane Moore
 

Similar a Technical Writing for Consultants (20)

LSCTIG 2015 Session Materials - Shop Smart: How a Formal Procurement Process ...
LSCTIG 2015 Session Materials - Shop Smart: How a Formal Procurement Process ...LSCTIG 2015 Session Materials - Shop Smart: How a Formal Procurement Process ...
LSCTIG 2015 Session Materials - Shop Smart: How a Formal Procurement Process ...
 
A brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UXA brief introduction to Enterprise and Industrial UX
A brief introduction to Enterprise and Industrial UX
 
MANAGERIAL COMMUNICATION
MANAGERIAL COMMUNICATIONMANAGERIAL COMMUNICATION
MANAGERIAL COMMUNICATION
 
DOES15 - Randy Shoup - Ten (Hard-Won) Lessons of the DevOps Transition
DOES15 - Randy Shoup - Ten (Hard-Won) Lessons of the DevOps TransitionDOES15 - Randy Shoup - Ten (Hard-Won) Lessons of the DevOps Transition
DOES15 - Randy Shoup - Ten (Hard-Won) Lessons of the DevOps Transition
 
Ten Lessons of the DevOps Transition
Ten Lessons of the DevOps TransitionTen Lessons of the DevOps Transition
Ten Lessons of the DevOps Transition
 
How to Write an RFP
How to Write an RFPHow to Write an RFP
How to Write an RFP
 
Value Driven Development by Dave Thomas
Value Driven Development by Dave Thomas Value Driven Development by Dave Thomas
Value Driven Development by Dave Thomas
 
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle. Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
 
From Purchase Agreement to Recorded Deed - Document Assembly in Real Property...
From Purchase Agreement to Recorded Deed - Document Assembly in Real Property...From Purchase Agreement to Recorded Deed - Document Assembly in Real Property...
From Purchase Agreement to Recorded Deed - Document Assembly in Real Property...
 
Getting the most from Scrum and Agile.pdf
Getting the most from Scrum and Agile.pdfGetting the most from Scrum and Agile.pdf
Getting the most from Scrum and Agile.pdf
 
Technical Documentation Within SDLC
Technical Documentation Within SDLC Technical Documentation Within SDLC
Technical Documentation Within SDLC
 
Not Your Grandfather's Requirements-Based Testing Webinar – Robin Goldsmith, ...
Not Your Grandfather's Requirements-Based Testing Webinar – Robin Goldsmith, ...Not Your Grandfather's Requirements-Based Testing Webinar – Robin Goldsmith, ...
Not Your Grandfather's Requirements-Based Testing Webinar – Robin Goldsmith, ...
 
Cheryl Goldsborough Resume
Cheryl Goldsborough ResumeCheryl Goldsborough Resume
Cheryl Goldsborough Resume
 
eSavvy webinar: Top 5+1 Tips of How to Maximize the ROI of a CRM Investment
eSavvy webinar: Top 5+1 Tips of How to Maximize the ROI of a CRM InvestmenteSavvy webinar: Top 5+1 Tips of How to Maximize the ROI of a CRM Investment
eSavvy webinar: Top 5+1 Tips of How to Maximize the ROI of a CRM Investment
 
Requirements Management
Requirements ManagementRequirements Management
Requirements Management
 
Initiating a Successful Project for VoIP in 2016
Initiating a Successful Project for VoIP in 2016Initiating a Successful Project for VoIP in 2016
Initiating a Successful Project for VoIP in 2016
 
Twin Cities Salesforce.com Developer User Group Presentation April 2012
Twin Cities Salesforce.com Developer User Group Presentation April 2012Twin Cities Salesforce.com Developer User Group Presentation April 2012
Twin Cities Salesforce.com Developer User Group Presentation April 2012
 
Finding the right authoring tool - STC Carolina Event 2018
Finding the right authoring tool - STC Carolina Event 2018Finding the right authoring tool - STC Carolina Event 2018
Finding the right authoring tool - STC Carolina Event 2018
 
Bnak of England insight day
Bnak of England insight dayBnak of England insight day
Bnak of England insight day
 
How to apply alm to enterprise business analysis
How to apply alm to enterprise business analysisHow to apply alm to enterprise business analysis
How to apply alm to enterprise business analysis
 

Más de Dilum Bandara

Más de Dilum Bandara (20)

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Time Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in PracticeTime Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in Practice
 
Introduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCAIntroduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCA
 
Introduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive AnalyticsIntroduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive Analytics
 
Introduction to Concurrent Data Structures
Introduction to Concurrent Data StructuresIntroduction to Concurrent Data Structures
Introduction to Concurrent Data Structures
 
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-MatrixHard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
 
Introduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with HadoopIntroduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with Hadoop
 
Embarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel ProblemsEmbarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel Problems
 
Introduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersIntroduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale Computers
 
Introduction to Thread Level Parallelism
Introduction to Thread Level ParallelismIntroduction to Thread Level Parallelism
Introduction to Thread Level Parallelism
 
CPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching TechniquesCPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching Techniques
 
Data-Level Parallelism in Microprocessors
Data-Level Parallelism in MicroprocessorsData-Level Parallelism in Microprocessors
Data-Level Parallelism in Microprocessors
 
Instruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware TechniquesInstruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware Techniques
 
Instruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler TechniquesInstruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler Techniques
 
CPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An IntroductionCPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An Introduction
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
 
Introduction to Content Delivery Networks
Introduction to Content Delivery NetworksIntroduction to Content Delivery Networks
Introduction to Content Delivery Networks
 
Peer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingPeer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and Streaming
 
Mobile Services
Mobile ServicesMobile Services
Mobile Services
 

Último

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 

Technical Writing for Consultants

  • 2. What We Do as Consultants? • Conduct a need analysis  Meetings, presentations, document analysis, phone calls • Prepare a proposal  Describe motivation & test/assessment procedure to be used  Terms of Reference (ToR)  Payment terms • Conduct a solid test, assessment, investigation, or design  Based on industry best practices & our own expertise • Prepare a comprehensive report  Test/assessment procedure used  List findings  List recommendations based on expert judgement • Follow up meeting or presentation  Call for action  Help during action 2
  • 3. Exercise • Think about a test or assessment you did for a client  Penetration test, security assessment, digital forensic investigation, evaluate quotations, etc. • Write a summary of the test or assessment including  Test/assessment procedure  Key findings  Key recommendations • Just write  Don’t worry about spelling, grammar, or punctuation  Don’t edit, just write • 10 min max 3
  • 4. Technical Writing • Writing that  “transfers information about a situation, product, service, or concept… to audiences of varying levels of technical knowledge, so that each member of the audience clearly understands the message.” • Word “technical” means skilled, specialized, & strict • Technical writing follows rules & protocols 4 - The Institute of Technical Communication (workshop) June, 1998 Source: www.zaetric.com/technical-writing/
  • 5. Business Writing • Writing style appropriate for a business setting • Generally “persuasive” writing • Purposes  To convey information  To explain/justify actions  To influence reader to take some action  To direct action  To deliver good or bad news • Includes  Business Letters, E-mail Transmissions, Memo, Reports, Contracts, MoUs, & Manuals 5
  • 8. How To Do It? • Write for at least 2 levels  CIO, COO, IT Manager  Sys. Admin, Developer • Include all key points  Findings & recommendations  Clear scope  What they need to provide to start project? • Aim for precision  Get straight to the point  Don’t use unnecessary words or waffle  Make every word count • Unless you are a confident writer, best to avoid over-long sentences  Aim for a mixture of long & short sentences for variation & rhythm 8 Executive Summary Bullets & Numbering Tables Diagrams Details Domain specific words Annex with detailed results Tips & References
  • 9. How To Do It? (Cont.) • Avoid overly elaborate language  Use technical language & words specific to your discipline, where appropriate  When using words that aren’t technical or domain specific, use simple words in place of obscure words that have the same meaning  Using overly elaborate language can make your writing seem pretentious  “Write to express not impress” • If there is any uncertainty about a particular point, use cautious language  e.g., ‘may’, ‘might’, ‘could’, ‘potentially’ • Avoid repeating the same words 9
  • 10. How To Do It? (Cont.) • Avoid vague terms  Very high vulnerability, very high overhead, extremely important • Use words efficiently  Firstly, Secondly  First, Second  Utilization  Use  On the other hand  Alternatively  Already existing, completely eliminate, basic fundamentals • Write with verbs and nouns  Active voice  First person • Appropriate format to improve readability • Review  Spellings, grammar, & style  Peer review 10
  • 11. Use Your Word Knife • Readers are overloaded • Use your limited word budget to get most attention • Types of readers  Skimmers  Read quickly  Look for key words, bulleted information, graphs  Summarize key points at beginning & end  Skeptics  Read every word  Looking for logic flaws or reasons to disbelieve or say no  Provide plenty of examples, details, & supporting statements 11
  • 12. Examples • Per our conversation, I am enclosing herewith a remittance of $125 for the balance due on my account. • As we discussed, here is the $125 remaining on my account. • Here is the $125 remaining on my account. • The relationship between the access to free contents and loss of privacy in social networks is extremely important to everyone including employees, businesses, government, and general public. • The conflict between free access and privacy in social network concerns many employees, businesses, government, and general public. 12
  • 13. Examples (Cont.) • Despite winning the game, the Sri Lankan team made several errors in the field. • Sri Lankan won the game, despite making several errors on the field. • Same observations are made from the Head Office network also. • Similar set of observations are to be made from the Head Office Network. • Slow response times are observed during different times of a day while much higher delays are noted during peak hours. • Higher response times are observed not only during peak hours but also throughout the day. 13
  • 14. Examples (Cont.) • We will utilize an efficient, top down root cause isolation process to resolve the performance lag in the system. • We (will) use a top-down process to diagnose performance issues in the system. • Proposal submitted for the Hosted Firewall by XXX PLC does not satisfy the technical requirements, and does not satisfy the pricing structure. • The proposal submitted for the Hosted Firewall by XXXX PLC does not satisfy the technical requirements. • The Application allows XXXX employees to use the mobile work load management system application on their day to day work activities without coming to the brach it self. • The Mobile App enables XXXX employees to access the workload management system for their day-to-day work activities while on the filed. 14
  • 15. Exercise • Read write up you wrote earlier (slide 2) • Think about how to apply what we learned • Edit/rewrite a summary of the test or assessment including  Test/assessment procedure  Key findings  Key recommendations • 10 min max • Let’s review write ups from 2-3 volunteers 15
  • 16. To Be a Good Writer You Must Read

Notas del editor

  1. Pretentious - attempting to impress by affecting greater importance
  2. COO - Chief operating officer
  3. Pretentious - attempting to impress by affecting greater importance