From a prompt in chapter 10 (“Correspondence”) in Baehr and Cook’s book The Agile Communicator: Principles and Practices in Technical Communication (2015), I decided to take a closer look at all the emails I sent one day. A...
I was asked to choose a set of four texts that best represent the field of technical communication. Choosing only four (or ten, or 50) is of course extremely reductive, but it allowed me to really focus on the aspects … Continue reading →
Due to my being a full time technical writer and PhD student, I didn’t have as much time as previous years to write blog posts. Additionally, I have found that the LinkedIn Pulse posts are more convenient for shorter, industry-related &helli...
This blog post is in reaction to the USENIX/Google research titled “Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness.” https://www.usenix.org/conference/usenixsecurity13/technical-sessions/prese...
As I have mentioned in previous posts (analysis of hacking responses and Kickstarter PR response), as more PR and marketing communications concern technical issues (either directly regarding a technology or technological information about a produc...
What happened? “Important Kickstarter Security Notice” https://www.kickstarter.com/blog/important-kickstarter-security-notice What happened in summary? Last week on Wednesday (this date is relevant) Kickstarter’s website was hack...
This post is a long time coming. I began compiling a list of the technologies I used and how I implemented them while in my Master’s of Technical Communications program last year. First my thesis took all my time and … Continue readin...
The WordPress.com stats helper monkeys prepared a 2013 annual report for this blog. Here’s an excerpt: A New York City subway train holds 1,200 people. This blog was viewed about 6,300 times in 2013. If it were a NYC subway … Continue...
The purpose of this post is to provide some of the content for my thesis that I completed July 2013. The full text of my thesis is available through ProQuest (UMI): http://search.proquest.com/docview/1448886102 The programs that were inc...
What happened? Avira and AVG: http://www.pcworld.com/article/2053380/network-solutions-investigating-dns-hijack.html Avast: http://grahamcluley.com/2013/10/vigilance-avast-anti-virus-website-pwned/ Adobe: http://rt.com/usa/adobe-hacked-krebs-hold-...
Blog: [[rss url="http://ferswriteshoe.wordpress.com/feed/" link="true" number="3"]] http://ferswriteshoe.wordpress.com