TechWhirl (TECHWR-L) is a resource for technical writing and technical communications professionals of all experience levels and in all industries to share their experiences and acquire information.
For two decades, technical communicators have turned to TechWhirl to ask and answer questions about the always-changing world of technical communications, such as tools, skills, career paths, methodologies, and emerging industries. The TechWhirl Archives and magazine, created for, by and about technical writers, offer a wealth of knowledge to everyone with an interest in any aspect of technical communications.
I am working with a client who uses a variety of network equipment. I'm creating Visio templates that are preloaded with recommended shapes ready to use. Because our network engineers use Visio to diagram network connections to various equipment, they've told me that the canned shapes don't work for their needs. In the past, they've gone online and used different sites (depending on the equipment vendor) and downloaded templates to address their needs.
The person leading this discussion on behalf of the engineers has just gone wherever he wanted to and thought he'd use the templates for branding and other page information.
My job is to bring standardization and consistency to the company by creating templates. We didn't want to download the current equipment templates because they get out of date. The other concerns are:
* Could they be downloading viruses in the template zip files?
* Is there a better way to handle this, like going directly to a vendor's site?
* What do other companies do?
In the past, I've mostly worked with process flow diagrams directly and given the network engineers the templates, but I don't know what they do with them once they get them. However, I've worked at some highly security-conscious companies (like Intuit (TurboTax) and a couple of medical labs, all which have high security due to the personal and financial data they keep. My current company isn't quite as secure as that, although they are trying but coming from behind.
I am wondering if anyone has any suggestions on how to handle this. I appreciate all suggestions.
Please direct responses to me in addition to the list.
Thanks!
Lin Laurie
206.900.1861
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Visit TechWhirl for the latest on content technology, content strategy and content development | https://techwhirl.com