Wednesday, June 25, 2008

Software Documentation Process

So you are ready with your product about to be to released in the market. The QA testing is complete and results look good. But hey, hold on a second! You are missing something. What’s that, Oh Good Lord, what’s that? Its user documentation, people!
Agreed you built the coolest product in town that allows your customers to integrate that PeopleSoft Financials accounting system with your Siebel CRM. But how on earth are your users ever going to use the damn product until you have user manuals telling them how?
What follows is a condensed description of the software documentation process followed in most product companies around the world.


Understanding the Documentation Process
The user documentation process ensures that you have a set of standardized support documents to assist your customers use the product. A product not supported by good documentation is a dead product. Therefore, reliable product documentation is not only crucial for your customers, but it also decides the fate of your product in a competitive market.
This article helps you understand the documentation process followed in most product companies across the globe. Although, companies might adopt different flavors of the documentation process, the basic flow remains the same.
Determining Product Readiness
At this stage, make a decision to follow approach 1 or 2.
You might want to choose approach 1 if your product is QA tested and ready to go to the market. Identify a writer and hook the writer up with a Subject Matter Expert (SME). Since you will be at the end of your product development cycle, the writer will have a ready product to play with and learn the product on the job, reducing the learning curve.
If you are at the start of your product development cycle, you might want to choose approach 2. Large product companies identify and train a team of technical writers at the start of the product development cycle. Writers are invited to crucial design meetings and encouraged to review and provide feedback on design documents. In such cases, writers start to work on documentation at the same time when developers start coding the application. Source documents, such as functional and technical design docs form the major source of information for the writers in this model. Writers also interview SME(s) to know about the product.
Reviewing Market Requirement Documents (MRD)
Most companies collect market requirement documents to give a direction to their products. MRDs are a reliable source to understand the philosophy behind the products. Writers can use these documents to create scenarios and highlight product relevance to users.
MRDs also provide the framework for functional and design documents down the stream.
Analyzing Target Audience
The writer along with the SME does a target audience analysis and establishes the profile of the user. MRDs are a great source to understand target audience.
Users of a system are not all the same. The writer must structure the doc to cater for different user tasks and different levels of expertise and experience. It is particularly important to distinguish between end-users and system administrators:
End-users use the software to assist with some task. This may be flying an aircraft, managing insurance policies, writing a book, etc. They want to know how the software can help them. They are not interested in computer or administration details.
System administrators are responsible for managing the software used by end-users. This may involve acting as an operator if the system is a large mainframe system, as a network manager is the system involves a network of workstations or as a technical guru who fixes end-users software problems and who liaises between users and the software supplier.
Determining Documentation Types
Depending on your audience, you can choose to have several types of documentation. If your audience largely consists of novice users with limited experience with a computer, you might want to create an introductory manual, such a Getting Started with the System guide. Documentation deliverables can include, but not limited to:
· User Guide
· Implementation Guide
· API Guide
· Online Help
Creating/Writing the Documents
After you have decided on your documents, set up a team or engage a single writer depending on the volume of work. Best practice at this stage includes drawing a schedule and managing that schedule to ensure that your documents are of high quality, technically accurate, and on time.
There are several documentation tools. Examples include:
· MS Word
· FrameMaker
· AuthorIT
· Epic Editor
· RoboHelp (for Online Help)
If your documents include large number of pages, use Frame Maker 8.0, the most recent offer from Adobe. If you need XML output, use Epic editor. If you want to tear your hair out, use MS Word.
Reviewing Documents
Set up a process to ensure all documents pass through language and content edit. Ideally, language edits are done by language editors based on in-house style and standards guide or widely recognized style guides, such as Strunk, MS Manual of Style, and the Chicago Manual of Style.
Send all documents for technical edit to ensure that the content is correct and syncs with the product functionality. A good user document is one that is referred to as the source of truth by everyone in the company.
Testing Documents
It is a good practice to QA test documents, such as Installation guides and Quick Reference guides. This way, you get to squash the bugs even before they are reported.
Publishing Documents
Once you are done testing and finalizing your document, you need to publish the documents for your users to access. The most common way to publish is to create PDF files and burn it along with the product CD or upload the PDF files on the web.
So there you go! I have outlined a basic documentation process. There are many more components to the process that need attention depending on the size and commitment of your company towards documentation.

Tuesday, June 24, 2008

Zlob DNS Changer

You definitely know you are infected with a virus when you browser gets redirected to a wired looking IP address on its own.

There could be many reasons why that happens, one being, the Zlob DNS Changer. Zlob DNS changer usually comes in as a Trojan when you download video codecs from the Internet.

How do you know its Zlob? Run Spybot and you should know for sure if it is Zlob.
If you are sure about Zlob being the culprit, download the following software:

HijackThis
HijackThis lists the contents of key areas of the Registry and hard drive--areas that are used by both legitimate programmers and hijackers. The program is continually updated to detect and remove new hijacks. It does not target specific programs and URLs, only the methods used by hijackers to force you onto their sites.

ATF Cleaner
ATF is a new, freeware, temporary file cleaner for Windows, IE, Firefox and Opera with a simple, easy-to-use interface.

Malwarebytes' Anti-Malware
Malwarebytes' Anti-Malware is the next step in the detection and removal of malware. Malwarebytes' Anti-Malware monitors every process and stops malicious processes before they even start.

F-Secure BlackLight
F-Secure® Internet Security 2008TM provides a complete and easy-to-use protection against all Internet threats, whether they are known or previously unidentified.

Installing and Running the Search and Diagnosis Software
After you have downloaded the above software, install them on your machine.
Installing HijackThis
To install HijackThis:
Double-click the .exe file you have download in your local machine and HijackThis does the rest of the step to install itself.
Run HijackThis and view the log. Check for registry entries that you think are weird or do not belong in your machine. Always backup your registry before you start removing registry entries. If your log shows entries as shown below, then you sure have something serious to deal with:
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
O17 - HKLM\System\CCS\Services\Tcpip\..\{0F8B5758-CA74-4CFB-BE0E-BE8C21A76C61}: NameServer = 85.255.116.98,85.255.112.6
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.116.98 85.255.112.6
O23 - Service: Windows Tribute Service - Unknown owner - C:\Windows\system32\kdzwn.exe At this stage, you choose to seek help from the professionals at http://forums.spybot.info/ or if you are feeling very confident and lucky, perform the following steps:
1. Run the ATF Cleaner.exe.
2. Double-click ATF Cleaner.exe to open it.
3. Under Main choose, Windows Temp, Current User Temp, All Users Temp, Cookies, Temporary Internet Files, Java Cache.
4. *The other boxes are optional*.
5. Click the Empty Selected button.
6. If you use Firefox, click Firefox at the top and choose Select All.
7. Click the Empty Selected button.
8. NOTE: If you would like to keep your saved passwords, please click NO at the prompt.
9. If you use Opera, click Opera at the top and choose Select All.
10. Click the Empty Selected button.
11. NOTE: If you would like to keep your saved passwords, please click NO at the prompt.
12. Click Exit on the Main menu to close the program.

Installing Malwarebytes' Anti-Malware
1. Double-click mbam-setup.exe and follow the prompts to install the program.
2. At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, and click Finish.
3. If an update is found, it will download and install the latest version.
4. Once the program has loaded, select Perform full scan, then click Scan.
5. When the scan is complete, click OK, then Show Results to view the results.
6. Be sure that everything is checked, and click Remove Selected.
7. When completed, a log will open in Notepad. Please save it to a convenient location. The log can also be found here: C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
8. Please post contents of that file & a fresh HijackThis log in your next reply.

Installing F-Secure BlackLight
1. Load F-Secure Blacklight into a new folder C:\Program Files\Blacklight.
2. Start in this folder fsbl.exe and close all other programs.
3. Accept the agreement and click Scan.
4. After the scan is finished close the window.
5. The log will be fsbl-XXX.log in the Blacklight folder. In place of XXX there will be some numbers.
After you run HijackThis, open the log file. The log file should display registry entries similar to the ones shown below:
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
O17 - HKLM\System\CCS\Services\Tcpip\..\{0F8B5758-CA74-4CFB-BE0E-BE8C21A76C61}: NameServer = 85.255.116.98,85.255.112.6
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.116.98 85.255.112.6
O23 - Service: Windows Tribute Service - Unknown owner - C:\Windows\system32\kdzwn.exe

To remove these entries, start HijackThis, close browsers and other windows and Click fix checked.
Creating and Executing Batch File
1. Open notepad and then copy and paste the bolded lines below into it. Go to File > save as and name the file fixes.bat, change the Save as type to all files and save it to your desktop. (If you are still unsure on how to do this there is a little tutorial with pictures here)
@echo off
sc stop "Windows Tribute Service"
sc delete "Windows Tribute Service"

2. Double-click on fixes.bat file to execute it.
Viewing Hidden Files (Vista)
1. Open Folder Options by clicking the Start button, clicking Control Panel, clicking Appearance and Personalization, and then clicking Folder Options.
2. Click the View tab.
3. Under Advanced settings, click Show hidden files and folders, and then click OK.
4. Delete following file if found:
5. C:\Windows\system32\kdzwn.exe
6. Reboot the system and run Blacklight again.

These steps should remove Zlob DNS Changer completely from your machine. For additional security, ensure your Java Runtime Environment is updated to 6.0 or the most recent version available. Also, reset and re enable your system restore and download SpywareBlaster.

Monday, June 23, 2008

Pick of the Week: Magadha Riviera

When you cut the marketing hoo-ha and look into the real deal, Magadha Riviera seems quite a neat property buy. At Rs. 3000 per square yard (negotiable) and loads of other freebies thrown in, this project is worth a deal.

Magadha Riviera is situated 15 km from the Shamshabad International airport. Although most of the approach road is yet to get that expressway look, the prospects of this project as a future residential locality seems quite promising.

Currently, Magadha has several 1000 to 300 square yard plots available as shown on its website.

Website: http://www.magadhaprojects.com/SLGallery/index.html

Contact: Neeraj [neerajag@gmail.com]
Mobile: 9866999220.

Highlights
DTCP approved
Immediate registration facilities provided
Landscaped gardens
Tree lined vistas
State-of-the-art street lightning
Underground drainage
Black topped roads with sidewalks
Jogging track
Solar fencing
Round the clock security
Club house
Aircondition gym
Spa
Tennis court
Swimming pool
Library
Party hall
Cafe
Lounge
Children recreation zone
Guest rooms
(WI-FI)Wireless Internet

Friday, June 13, 2008

Instructional design - The Good, the Bad, and the Ugly

Came upon this set of instructions somewhere. Me thinks this is an excellent example of the good, the bad, and the ugly in instructional design:
USER-FRIENDLY
C:\ DUR
Command not found. Try retyping
USER-HELPFUL
C:\ DUR
I don't understand DUR. Do you mean DIR ?
USER-UNFRIENDLY
C:\ DUR C:\ DUR C:\ DUR C:\ DUR
USER-HOSTILE
C:\ DUR
Ha! A mistake! I'm sure you meant to say FORMAT, so that's what I'll do.
USER-INDIFFERENT
C:\ DUR DUR?
USER-PATRONIZING
C:\ DUR
Now, that's not quite right is it? Let's try again; this time, use the manual that the nice salesperson gave you when you bought me.
USER-OBSEQUIOUS
C:\ DUR
I'm so very, very sorry but I don't understand that. I'm sure it was my fault, but if you would please try again I'll do my best.
USER-SARCASTIC
C:\ DUR
Well, Look who's made a mistake then. Very unusual, I don't think.
USER-INSULTING
C:\ DUR
Fuck off
C:\ DIR
Fuck off
USER-SMUG
C:\ DUR
No
C:\ DOR
Nope
C:\ HELP
No C:\ PLEASE
Not unless you give me a 300Mb hard disk to live on
C:\ BASTARD
Abuse will get you nowhere
USER-ANALYTICAL
C:\ DUR
What makes you say that?
C:\ A TYPING MISTAKE
How long have you been making these mistakes?
C:\ BANANAS
Do you like bananas?
C:\ I LOVE THEM
Why do you bring up the subject of love....etc?
USER-McDONALD
May I help you please?
C:\ DUR
I'm sorry but that command is not available at this time. Have a nice day.
C:\ DIR
Will that be an MS-DOS directory?
C:\ YES
To read here, or for printout to take away?
C:\ HERE
Thank you. Have a nice day.
USER-MEGALOMANIAC
C:\ DUR
Don't bother me with trivial requests. I'm busy.

Friday, June 06, 2008

How to File RTI Applications

If the application is related to a state govt, you need to file it in the respective department. Anything related to central govt can be filed in GPO.
Procedure:
1. Approach the nominated information officer in the department.
2. Get the RTI form (if any) from the officer.
3. Normally the form asks five simple questions including - info requested, period for which info is requested, your name, your address & reason for requesting the information(not mandatory).
4. In case the department doesn't have any application form, submit the request on a plain paper with the above 5 information.
5. Along with the application, submit a "postal pay order" of Rs. 20. (Karnataka govt has reduced this further to Rs. 10; not sure about A.P.)
6. Take a copy of the application and have it attested by the information officer - with date of submission on it.
You should get appropriate info within a month, else you can raise the issue to Chief information commissioner.
Watch this space for all the details on Right to Information Act (RTI).

Thursday, June 05, 2008

Turning Off that Beep in Dell D620 Laptops

You are in a library. Silence all around and people engrossed in books or feeling each other up. You installed this cool new software and need to reboot. So you power down and then power up. If you have a Dell 620, you might be clasping your hands against your ears in anticipation of that loud beep. And ear phones too? You are probably looking at 15 days before you go deaf.

So here's how you can disable that beep:
1. Open Computer Management and click Device Manger.
2. From the Console menu select View > Show Hidden Devices. You can only see this option once you have selected Device Manager.
3. A new item appears in the Device Manager Panel: Non-Plug and Play Drivers.
4. Expand the menu, find Beep and right click.
5. Select Disable.

Go back to living a normal life!

Resolving PDF Problems!

You need to send that PDF file by close of business to your product manager/SME and the file won't just print. What do you do?

Listed here is a set of common PDF issues and solutions:

Pain: When you right-click a Microsoft Office file to convert to Adobe PDF, the application returns the message, "Missing PDFMaker files," and does not create an Adobe PDF file.

Solution: Remove Adobe PDF from the Disabled Items list in the Microsoft Office application.
To manage your Disabled Items list in a Microsoft Office application:
1. Open the Microsoft Office application (Word, Excel, Publisher).
2. Choose Help > About [the application name].
3. Click Disabled Items.
4. Select Adobe PDF from the list, and clickEnable.
5. Quit the Microsoft Office application, and then restart it.

If the error message continues to appear after you enable Adobe PDF, then check the security level for macros in Word:
1. Choose Tools > Macro > Security.
2. In the Security dialog, click the Security tab.
3. Choose Medium or High.
4. Do one of the following:
-- If you chose Medium, then click OK.
-- If you chose High, then continue with steps 5 through 7.
5. Click the Trusted Publishers tab.
6. Check Trust all installed add-ins and templates.
7. Click OK.

PDFMaker and the right-click context menu should function again.

For more, see http://kb.adobe.com/selfservice/microsites/microsite.do

Pain: Images look fine in MS Word, but after converting to PDF, image quality is poor.

Solution: Save your image in JPG or TIFF format and embed the image into your Word document to publish using Adobe PDF printer. PNGs are not suitable for word to PDF conversion, TIFFS work much better. Use high quality print setting while converting to PDF. Also, standardize the resolution settings of your desktop (1024*768) and the DPI setting in your screen capture software.


Watch this space for more!

IBN Top Headlines

Ads

Search the Web:

Need more targeted traffic?
Join TrafficSwarm for FREE!