We open with a familiar truism: Only give your users what they need, when they need it. Your product and technical content must speak directly to your users’ diverse needs, to their parallel goals, with as little clutter as possible. This has forever been the tech writer’s mantra, but with cloud-based, hosted content delivery systems, it’s easier than ever to achieve. Here at iovation, we accomplish this with a sophisticated mix of disciplined, modular content and cutting-edge content management technology.
When asked to do a research assignment, Rafael , 12M (EJR) went for two topics that have puzzled him. This is the ppt he created as the support for his presentation.
Held in conjunction with World IA Day 2018, this practical session was an introduction to the core skills and methods of thinking that you will use as part of your day to day work in IA.
Topics covered include the foundations of IA, the importance of a ‘content first’ approach, thinking like a user and how to present your work to clients.
The session was led by Jon Fisher, Head of UX at Nomensa, an award-winning UX design agency based in London, Bristol and Amsterdam.
Held in conjunction with World IA Day 2018, this practical session was an introduction to the core skills and methods of thinking that you can use as part of your day to day work in IA.
Topics covered included the foundations of IA, the importance of a ‘content first’ approach, thinking like a user and how to present your work to clients.
The session was led by Jon Fisher, Head of UX at Nomensa, an award-winning UX design agency based in London, Bristol and Amsterdam.
This is a free event recommended for those new to IA or looking for a refresher on fundamentals.
Following the event, Nomensa will be providing pizza and beers for delegates to enjoy and continue networking.
If you register, but are unable to attend, please give us 48 hours notice so we can reallocate your place.
Trends are the natural changes in behaviours or proceedings. We like to be aware of those indicators for inspiration and guidance. At the beginning of every year we look at UX, UI trends and emerging technologies to get that guidance from.
When asked to do a research assignment, Rafael , 12M (EJR) went for two topics that have puzzled him. This is the ppt he created as the support for his presentation.
Held in conjunction with World IA Day 2018, this practical session was an introduction to the core skills and methods of thinking that you will use as part of your day to day work in IA.
Topics covered include the foundations of IA, the importance of a ‘content first’ approach, thinking like a user and how to present your work to clients.
The session was led by Jon Fisher, Head of UX at Nomensa, an award-winning UX design agency based in London, Bristol and Amsterdam.
Held in conjunction with World IA Day 2018, this practical session was an introduction to the core skills and methods of thinking that you can use as part of your day to day work in IA.
Topics covered included the foundations of IA, the importance of a ‘content first’ approach, thinking like a user and how to present your work to clients.
The session was led by Jon Fisher, Head of UX at Nomensa, an award-winning UX design agency based in London, Bristol and Amsterdam.
This is a free event recommended for those new to IA or looking for a refresher on fundamentals.
Following the event, Nomensa will be providing pizza and beers for delegates to enjoy and continue networking.
If you register, but are unable to attend, please give us 48 hours notice so we can reallocate your place.
Trends are the natural changes in behaviours or proceedings. We like to be aware of those indicators for inspiration and guidance. At the beginning of every year we look at UX, UI trends and emerging technologies to get that guidance from.
The Triangle - A universal method of working with digital analytics and marke...Robert Børlum-Bach
The triangular shape is a stable in communicating, simplifying and modelling complex information.
In digital analytics and marketing is used in everything from conversion funnels, user management and abstract modelling - maybe due to its inherent aspects of "action".
This presentation showcases some examples and should be seen as a base for further discussions.
Session held at MeasureCamp Milan, October 12. 2018.
Building Vibrant Communities - Erfolgreiche Einführung von Enterprise 2.0Peter H. Reiser
Datum: Freitag, 24.6.2011
Ort: FHNW, Riggenbachstrasse 16, CH-4600 Olten
http://www.fhnw.ch/kontakt/lageplan/fhnw_hw-ortsplaene.pdf
Raum: wird am Display in der Eingangshalle angezeigt
Moderation: Daniel Ebneter, Carpathia Consulting, Zürich
Programm ( jeweils 60‘ Vortrag, 30‘ Diskussion):
08:45-10:15 Thomas Lang, Geschäftsführer, Carpathia Consulting, Zürich
Trends im E-Commerce und Chancen für Schweizer Anbieter
10:45-12:15 Peter Reiser, Principal Architect, Oracle
Building Vibrant Communities - Erfolgreiche Einführung von Enterprise 2.0
13:15-14:45 Marcus Beyer, Archtitect Security Awareness, iSPIN, Zürich
Awareness schaffen – ohne Waffen
15:15-16:45 Robin Unger, Managing Partner – Consulting, Gartner, Dietikon
Reimagining IT: The 2011 CIO Agenda
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...Stijn (Stan) Christiaens
Learn how to launch your data governance program, by answering three questions:
- What does my data mean: collect and manage business definitions and relations, taxonomies and classifications, business rules and ontologies;
- How can I involve all stakeholders: engage them across business units and geographies, with stewards, data owners, … in a guiding workflow;
- How do I operationalize data governance: link MDM, DQ and BI to the business, use business-driven semantic modelling, achieve end-to end traceabilitiy. During this session we will use examples from different verticals: Finance, Government, Utilities,… .
We discuss their main drivers for starting a Data Governance initiative, as well as their pragmatic approach in moving from gradual roll out to support and sustain their Data Governance program.
User Experience Portfolio. Sushmita DuttSushmita Dutt
A Portfolio of User Experience and Information Architecture work delivered to Global, Multinational companies for Digital Technology Products and Services. All rights reserved.
Bridging the Gap Between Business and Development (OOP'07 Keynote)Enthiosys Inc
Luke Hohmann, Enthiosys CEO, spoke on "Bridging the Gap Between Business and Development" as a keynote for OOP 2007 in Munich. He explored the understanding gap between developers and business-side staff by asking that the "ideal developer" would be for each group.
Agile Data Science is a lean methodology that is adopted from Agile Software Development. At the core it centers around people, interactions, and building minimally viable products to ship fast and often to solicit customer feedback. In this presentation, I describe how this work was done in the past with examples. Get started today with our help by visiting http://www.alpinenow.com
Discussion 1 post responses.Please respond to the following.docxcuddietheresa
Discussion 1 post responses.
Please respond to the following:
LG’s post states the following:Top of Form
"When Problem Decomposition is not Easy"
Consider the development of a simple mobile application that displays personal financial management video clips selected from a central repository. Discuss how you would systematically analyze the requirements of this application and identify its problem components.
Using a spiral process of stakeholder engagement which includes understanding the business objectives or needs the application is to provide. Next, looking at the requirements gathering process, whereby sitting with the stakeholders and customers to define those needs, understanding the assumptions and constraints, expectations, and coming up with a conceptual model both from a business and system design. Using the model as a base, the requirements will be developed into a high-level requirement set, where they are broken into the logical grouping, such as business, user, functional, non-functional, and transitional segments. Next, the requirements will be viewed with the stakeholders and customers, to address priority, need vs. want, and addressing any ambiguous requirements to gain clarity for completeness.
Explain how software engineering would help you identify the components and their interconnections.
Software engineering helps identify the components and their interconnections because the approach requires identification of components such as hardware, software, users, tasks, and databases, amongst other pieces to be determined and understand how each will interact with the others. Some boundaries must be known that similar to the scope of a project to help provide a context on what is in or out. It includes things like the activities that will be performed and the entities associated with the activities. Understanding these provide the developers in the design and development process. For example, the above mention contextual design or model can be used or provide a reference to things like architectural design, displaying these components and interconnections on paper (or visual drawing) to help articulate the boundaries, activities, and entities for the system.
Phleeger, S. L., Atlee, J. M. (2009-02-01). Software Engineering: Theory and Practice, 4th Edition [VitalSource Bookshelf version]. Retrieved from vbk://9781323089309
Pochimcherla, A., Pochimcherlahttp, A., & Pochimcherla, A. (2018, January 26). Computer science basics - Decomposition - break a problem into smaller. Retrieved from http://steamism.com/compsci-decomposition/.
SP’s post states the following:Top of Form
"When Problem Decomposition is not Easy" Please respond to the following: Consider the development of a simple mobile application that displays personal financial management video clips selected from a central repository. Discuss how you would systematically analyze the requirements of this application and identify its problem component ...
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
The Triangle - A universal method of working with digital analytics and marke...Robert Børlum-Bach
The triangular shape is a stable in communicating, simplifying and modelling complex information.
In digital analytics and marketing is used in everything from conversion funnels, user management and abstract modelling - maybe due to its inherent aspects of "action".
This presentation showcases some examples and should be seen as a base for further discussions.
Session held at MeasureCamp Milan, October 12. 2018.
Building Vibrant Communities - Erfolgreiche Einführung von Enterprise 2.0Peter H. Reiser
Datum: Freitag, 24.6.2011
Ort: FHNW, Riggenbachstrasse 16, CH-4600 Olten
http://www.fhnw.ch/kontakt/lageplan/fhnw_hw-ortsplaene.pdf
Raum: wird am Display in der Eingangshalle angezeigt
Moderation: Daniel Ebneter, Carpathia Consulting, Zürich
Programm ( jeweils 60‘ Vortrag, 30‘ Diskussion):
08:45-10:15 Thomas Lang, Geschäftsführer, Carpathia Consulting, Zürich
Trends im E-Commerce und Chancen für Schweizer Anbieter
10:45-12:15 Peter Reiser, Principal Architect, Oracle
Building Vibrant Communities - Erfolgreiche Einführung von Enterprise 2.0
13:15-14:45 Marcus Beyer, Archtitect Security Awareness, iSPIN, Zürich
Awareness schaffen – ohne Waffen
15:15-16:45 Robin Unger, Managing Partner – Consulting, Gartner, Dietikon
Reimagining IT: The 2011 CIO Agenda
Successfully Kickstarting Data Governance's Social Dynamics: Define, Collabor...Stijn (Stan) Christiaens
Learn how to launch your data governance program, by answering three questions:
- What does my data mean: collect and manage business definitions and relations, taxonomies and classifications, business rules and ontologies;
- How can I involve all stakeholders: engage them across business units and geographies, with stewards, data owners, … in a guiding workflow;
- How do I operationalize data governance: link MDM, DQ and BI to the business, use business-driven semantic modelling, achieve end-to end traceabilitiy. During this session we will use examples from different verticals: Finance, Government, Utilities,… .
We discuss their main drivers for starting a Data Governance initiative, as well as their pragmatic approach in moving from gradual roll out to support and sustain their Data Governance program.
User Experience Portfolio. Sushmita DuttSushmita Dutt
A Portfolio of User Experience and Information Architecture work delivered to Global, Multinational companies for Digital Technology Products and Services. All rights reserved.
Bridging the Gap Between Business and Development (OOP'07 Keynote)Enthiosys Inc
Luke Hohmann, Enthiosys CEO, spoke on "Bridging the Gap Between Business and Development" as a keynote for OOP 2007 in Munich. He explored the understanding gap between developers and business-side staff by asking that the "ideal developer" would be for each group.
Agile Data Science is a lean methodology that is adopted from Agile Software Development. At the core it centers around people, interactions, and building minimally viable products to ship fast and often to solicit customer feedback. In this presentation, I describe how this work was done in the past with examples. Get started today with our help by visiting http://www.alpinenow.com
Discussion 1 post responses.Please respond to the following.docxcuddietheresa
Discussion 1 post responses.
Please respond to the following:
LG’s post states the following:Top of Form
"When Problem Decomposition is not Easy"
Consider the development of a simple mobile application that displays personal financial management video clips selected from a central repository. Discuss how you would systematically analyze the requirements of this application and identify its problem components.
Using a spiral process of stakeholder engagement which includes understanding the business objectives or needs the application is to provide. Next, looking at the requirements gathering process, whereby sitting with the stakeholders and customers to define those needs, understanding the assumptions and constraints, expectations, and coming up with a conceptual model both from a business and system design. Using the model as a base, the requirements will be developed into a high-level requirement set, where they are broken into the logical grouping, such as business, user, functional, non-functional, and transitional segments. Next, the requirements will be viewed with the stakeholders and customers, to address priority, need vs. want, and addressing any ambiguous requirements to gain clarity for completeness.
Explain how software engineering would help you identify the components and their interconnections.
Software engineering helps identify the components and their interconnections because the approach requires identification of components such as hardware, software, users, tasks, and databases, amongst other pieces to be determined and understand how each will interact with the others. Some boundaries must be known that similar to the scope of a project to help provide a context on what is in or out. It includes things like the activities that will be performed and the entities associated with the activities. Understanding these provide the developers in the design and development process. For example, the above mention contextual design or model can be used or provide a reference to things like architectural design, displaying these components and interconnections on paper (or visual drawing) to help articulate the boundaries, activities, and entities for the system.
Phleeger, S. L., Atlee, J. M. (2009-02-01). Software Engineering: Theory and Practice, 4th Edition [VitalSource Bookshelf version]. Retrieved from vbk://9781323089309
Pochimcherla, A., Pochimcherlahttp, A., & Pochimcherla, A. (2018, January 26). Computer science basics - Decomposition - break a problem into smaller. Retrieved from http://steamism.com/compsci-decomposition/.
SP’s post states the following:Top of Form
"When Problem Decomposition is not Easy" Please respond to the following: Consider the development of a simple mobile application that displays personal financial management video clips selected from a central repository. Discuss how you would systematically analyze the requirements of this application and identify its problem component ...
Similar to The Multiverse Theory of User Needs (14)
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
By Design, not by Accident - Agile Venture Bolzano 2024
The Multiverse Theory of User Needs
1. LavaCon
Tanner Volz | Technical Content Manager, iovation
October / 2016
The Multiverse Theory of
User Needs
2. AGENDA
2
Content is Noise
Who are Your Users, and Why?
Designing a Modular Content
Experience
Managing Modular Content
Through the Wormhole
3. 3
The Niceties
W h o a m I a n d W h y A m I H e r e
Work stuff
18ish years into tech writing & info architecture
Designed & built numerous enterprise-scale info systems for product documentation
& training
Personal stuff
Musician and occasional film-maker
Nose typically buried in films
Contact info (sell me to spammers and I will find you)
tv@tannervolz.com
503-803-3201
6. 6
Every day we all wade
through many thousands
of words and images
2009 UC study
estimated Americans
consume 34 GB of info / day
In 2013, studies suggested
that average social media
users encounter up to 54,000 words & 443 minutes of video per day
We are contentblind
Our Thesis: Content is Noise …
Yo u r u s e r s c o m e f r o m d i f f e r e n t u n i v e r s e s …
7. 7
We look for
keywords, but need
help seeing them
Linguistic and design
challenge
Users buy products to solve
specific problems; anticipate those problems and tailor
content, keywords, and design
… Until We Find What We Need
S o h e l p t h e m n a v i g a t e y o u r u n i v e r s e
9. 9
A deceptively difficult question: Who are your buyers and, more
importantly, why do they buy your products? If multiple products,
which?
Buyers & users share business problems, but information needs
may differ.
For example:
Buyer personas: Sign the checks. Sales & Marketing pitches speak to
them. Content must persuade. Tech savvy buyer may read tech docs.
User personas: Implement & validate satisfaction of business need.
Technical documentation is roadmap when implementing the solution.
Who Are You and Why Did You Buy?
W h a t p r o b l e m d o e s t h e p r o d u c t h e l p y o u s o l v e ?
10. 10
At iovation, writers develop user persona breakdown w/
Product, Sales, Marketing, Client Support. Personas
include:
Fraud analysts study and understand fraud and crime
Fraud or risk managers design implementations to address these
trends
User experience and web designers balance improved
authentication experiences with risk of bad users gaining access
Web software engineers code the iovation integration into their
web or mobile apps (or both)
Example: High Level iovation User Personas
W h a t p r o b l e m d o e s i o v a t i o n h e l p y o u s o l v e ?
11. 11
Design parallel information experiences for each persona.
Each persona brings litany of use cases; before you can design a
successful content multiverse, build a user needs taxonomy to understand
use cases.
User needs taxonomy maps user personas to specific problems that they
need to solve
Develop a User Needs Taxonomy
M a p p r o d u c t u s e c a s e s t o u s e r p e r s o n a s
User
Use case 1
Use case 2
Use case 3
12. 12
User Needs Taxonomy
lays out:
Business needs / pain
points
Relevant variables, such
as industry vertical
Common challenges
Win / loss & financial
analysis
Cross-department
dependencies / effects
Anatomy of a User Needs Taxonomy
O r , a t a x o n o m y … t a x o n o m y
Use case 1
Industry
Region
Business
needs
Pain 1
Pain 2
Challenges
Time
Resource
s
13. 13
Fraud team lead at an online retailer needs help with:
Chronic problem with criminals using stolen credit cards…
To submit purchases…
Resulting in expensive charge-backs or penalties.
User Experience or Web Designer at a financial institution needs to:
Help the Fraud team reduce account takeover…
While improving a poor authentication experience…
By reducing painful login steps such as captchas.
For these examples, these specifics help us recommend:
Where we integrate, and how
What initial configuration steps are needed
Who will contribute to implementation, and how
User Needs Examples
i o v a t i o n e x a m p l e s o f p a r a l l e l u n i v e r s e s
14. 14
Neighboring Content Universes
i o v a t i o n e x a m p l e s o f p a r a l l e l u n i v e r s e s
Subscriber 2:
Finance
Subscriber 1:
Retail
API Reference
Account takeover scenarios
are shared
High friction authentication
unique to Suscriber 1
Fraud prevention concepts
mostly apply to Subscriber
1, but overlap with
Authentication concepts for
Subscriber 2
Web integration is largely
identical; Subscriber 2 also
includes Mobile SDK
All API reference material is
100% common
Mobile
SDK
Account
Takeover
fraud
scenarios
Iovation Fraud
Prevention
concepts
Iovation
Customer
Authentication
concepts
Auth
friction
Web
integration
Use cases
Concept
s
Integration
Reference
15. 15
What Does a User Needs Taxonomy Look Like?
N o b o d y s a i d t e c h w r i t i n g w a s e a s y
17. 17
Content modules are like single lego pieces; each is one part of a
kit.
Similarly, each content module serves one goal:
Procedural: How to do something (“Walking to the Bakery”)
Conceptual: What something is (“What is a Bakery”)
Process: How something works (”The Lifecycle of a Scone, From Sugar to
Sewer”)
Reference: List of facts (“Scone Ingredients”)
Content Modularization: What and Why?
T h e f i n e a r t o f r e c o m b i n a t i o n
18. 18
A topic, or article, collects related modules focused on a single content goal.
Each module is about one aspect of the topic’s goal.
Accomplish this, and you can recombine content modules (aka, cutely, chunks) to
serve many different user needs.
Modularization: How Does it Work?
A K A T h e F i n e A r t o f R e c o m b i n a t i o n
Image credit: http://www.eurobricks.com/forum/index.php?/profile/2351-whitefang/
19. 19
Take an article that’s a mess of intermingled content types…
Tagging Disorganized Content
I t ’ s a b i t l i k e o r g a n i z i n g a h o a r d e r ’ s g a r d e n s h e d
Procedure
Reference
A bunch of
concepts
Some unrelated
reference content
Process
Random collection of
proceduresProcess diagram that
probably should have come
first
20. 20
Break it down, tag it, and reassemble it into chunks
Unrelated content belongs in another topic
Ruthlessly kill repetition
Write once, then reuse, reuse, reuse
Creating and Assembling Modular Content
C o n s o l i d a t e a n d r e d u c e
Series of related
procedures
Introductory concept
Supporting
reference
material
Process overview with
“how it works”
diagram
21. 21
Focus: Each module answers a single question.
Don’t repeat: Say everything once.
Short and sweet: If it takes more than a few sentences to explain a
concept, you may be trying to explain a second concept. Create another
module.
Label all modules: Use ridiculously obvious headings that speak to user
needs.
Mix it up: Some content needs complex process diagrams. Some need
simple reference tables. Use all of the tools available to you.
Templatize: Content, like formatting, benefits from templates. What content
should a concept include? Figure it out and make it a template.
The Art of Writing Modular Content
T h e r e a r e c o u n t l e s s b o o k s a n d c l a s s e s o n t h e t o p i c
22. 22
A new topic on reducing Account Takeover fraud includes
the following modules:
“What is Account Takeover” - Conceptual module that defines Account
Takeover. Use it anywhere we talk about Account Takeover.
“How Business Rules Help Stop Account Takeover” - Process module
about features we will use (iovation business rules) to solve the problem,
with a diagram to illustrate.
“Defining Business Rules to Stop Account Takeover” - Procedural
module that walks through setting up the business rules.
“Account Takeover Parameters Reference” - Reference module with all
the technical details needed to set up the rules.
iovation Example
B u i l d i n g a t o p i c o n a c c o u n t t a k e o v e r
23. 23
These tenets are all inherited from established structured writing practices.
They emphasize semantic tagging of content, strict modularization, reuse,
multi-lingual content management, and on-demand content assembly. Read up
on these.
Information Mapping: http://www.informationmapping.com/en/
DITA (Darwin Information Typing Architecture): https://www.oasis-
open.org/committees/dita/faq.php
Structured Writing Resources
S e e a l s o …
25. 25
Slice / dice content forever but without a way to manage it, this is what awaits you:
Modular Content is Nothing Without CMS
T h e h e r b m i x m e t a p h o r w o r k s b u t w e ’ r e s t i c k i n g w i t h L e g o s
26. 26
What is Content Management?
To o l s y o u n e e d t o b u i l d w o r m h o l e s a c r o s s u n i v e r s e s
Image credit: Jeff Pellettierhttp://photos.hgtv.com/photos/viewer/lego-storage-/basement-lego-lounge-
with-built_in-storage-system_1
27. 27
Just some of what a good content management system provides:
Topic and asset management including versioning and publishing
workflows
Authoring with both WYSIWYG and code editing support
Extensibility to incorporate web-standard technologies
Content reuse down to the modular level
Variables for brand names, verticals, etc.
Content conditions for different scenarios, such as different outputs
(HTML v PDF) or classes of users
Semantic tagging of content, and separation of content from formatting
SEO management, particularly important for public content
Defining Technical Content Management
A b o t t o m l e s s t o p i c ; t h e s e a r e a f e w t h i n g s t h a t m a t t e r t o u s
28. 28
We use MindTouch, a SaaS solution with robust content creation tools,
availability and performance, and structured authoring features
Keyword metatags enable us to track both content type (such as
“procedure”) and substance (such as “Managing Users”); It’s very easy to
find the content we need, when we need it; also ensures excellent SEO
flexibility if we take any content public
Our stylesheets (CSS) handle all of our formatting for HTML and PDF; the
authoring experience is entirely focused on content
We heavily reuse content to serve different purposes, with variables to
manage terminology changes
Permissions allow different users to see only what they need
Overview of Content Management at iovation
W h a t w e d o , i n 5 b u l l e t s
29. 29
We store reusable content (topics and modules) in a dedicated area; all of this can be
reused anywhere within the content hierarchy
This is one of the most powerful tenets of the content multiverse: the same
content can exist, in parallel, in many places at once
Reusing and Transforming Content
A l l o w c o n t e x t t o d e t e r m i n e w h a t u s e r s w i l l s e e
30. 30
With simple variable statements, brand names change on-the-fly in topics that
are reused across product lines.
Reusing and Transforming Content
A l l o w c o n t e x t t o d e t e r m i n e w h a t u s e r s w i l l s e e
31. 31
Using privileges to manage the end-user experience:
MindTouch provides great tools for showing different content to different users
Groups of users can be set to see only specific hierarchies or part of topics
User who subscribes to one product only sees content for that product
Using Permissions to Hide Content
R e d u c i n g n o i s e b y e n t i r e l y e l i m i n a t i n g i r r e l e v a n t c o n t e n t
Hidden
content
33. 33
Now that you have:
Profiled your
different types of
users
Anticipated the
unique content
needs for each
Broken your content
down into reusable
chunks
You can build your
content universes.
Designing Parallel Information Universes
R e u s a b l e m o d u l a r c o n t e n t w a s m a d e f o r t h i s
34. 34
Assemble chunks into information universes for all user types:
Use variables to target text to use cases – brand names, verticals,
features, etc.
Use big bold headers and organizers that target business needs
and make navigation RIDCULOUSLY EASY. For a universe of blue
legos:
ORGANIZING BLUE LEGOS INTO BLUE BOXES.
Or for a universe of green legos:
ORGANIZING GREEN LEGOS INTO GREEN BOXES.
Use permissions to hide topics that a given user doesn’t need, and
combine permissions with variables to hide inline content.
Designing Parallel Information Universes
R e u s a b l e m o d u l a r c o n t e n t w a s m a d e f o r t h i s
35. 35
An integration engineer follows distinct paths depending which product the organization
bought from iovation. This is what it looks like to an author. We see all universes at once.
Assembling Universes
A s s e m b l i n g i n t e g r a t i o n c o n t e n t f o r d i f f e r e n t u s e r t y p e s
Customer Auth concepts
Fraud Prevention
concepts
Customer Auth workflow
Shared
procedures
Fraud Prevention
workflowFraud Prevention
procedures
Shared reference content
Reusabl
e content
iovation content repository
Customer Authentication Integration Guide
Fraud Prevention Integration Guide
Help system / knowledge base
36. 36
And this is what it looks like to an engineer working with the Fraud Prevention
product.
Users only see their own universes
T h e n o i s e w e t a l k e d a b o u t e a r l i e r ? G o n e
Fraud Prevention Integration Guide
As far as the user is concerned, there is only one universe. It’s linear, easy to
follow, and free of noise.
37. 37
At iovation, this is just the
beginning.
How to incorporate
content hosted in entirely
separate systems, with
very different delivery
models?
At what point is designing
for reuse more complex
than is beneficial?
What’s Next?
E x p a n d i n g u s e c a s e s t o v e r y d i f f e r e n t u s e r m o d e l s