Formats for Writing Life Narratives

Q and A.

Best choice when subject is very verbal or there are two or more people being interviewed or taped at the same time. All repetitive statements, umms, ahhs and blatant incorrect grammar are edited out. Natural patterns of speech, coloquolisms and favorite sayings are left in.

JHW. When you started your business in 1934, how did you finance it?

BT. Well, remember my uncle Horace? He was my Mother's brother.

HT. Half brother.

BT.. OK, so half brother, her father remarried after Sybil, my grandmother, died and my mother was a little girl about nine or ten. His second wife, what was her name?

HT.Alice May Jones, her family had moved west to build the dam.

BT.. So anyway, Horace was killed in a train wreck when he was visiting in California and as he had never married, the insurance settlement went to his next of kin, which turned out to be my mother. She wanted to invest the money and came to us and asked our advice. I told her that I had been thinking of opening this repair shop and I thought I could make a go of it. She thought about it long and hard and came back the next day and said she would rather invest in us than any old bank.

HT. But we paid her back with interest. We were able to put the business in the black in only three years.

BT. Of course, we worked our butts off, didn't we?

First person: Best choice when the tapes will need significant editing to make a flowing narrative. It is written as if the speaker were doing the writing. The interviewer simply ghost writes the life story.

I loved being a mother. It seemed as if that was the role God had created just for me. Other women would complain about their children being messy or noisy, and I honestly didn't even care. I just loved to be there when they came home from school. About two o'clock I would start to get antsy, just couldn't wait for them to come in the door, throw down their jackets and books and sit at the kitchen table and talk. I even loved cleaning up after them when they were sick. I know that is hard to believe for some people, but I used to say to myself "well, I would rather have it out here smelling bad than inside of them making them feel bad."

Third Person: Best choice if the subject is having difficulty remembering or if the interviewer has to gain the majority of the facts from records, other family members or others who can add insight and information. Jennie was a fun loving little girl and definitely the apple of Tom B. Bradshaw, her loving father's eye as well as the object of his generosity. But one time, when she was about six years old that generous and loving spirit was put to a test. Active in the first Methodist church, their entire family enjoyed the Sunday school picnics held every summer in the park east of town. On this particular day, the family had no sooner arrived and began eating when a group of little girls came to the table demanding to see the elephant Mr. Bradshaw brought.

Methods of telling the story:

It is best to think of a life as a long strand of pearls with each year or significant event as one pearl.

? An autobiography tells the jest of the whole necklace, usually in a chronological order. Chapters, special events, decades, houses or any other natural division can separate the sections.

? A memoir takes an important section of the pearls and makes a short necklace. You can refer to the other beads, but you don't go into detail describing them but concentrate on the significant period of time you are describing.

? An anthology is a collection of short unrelated stories, essays, anecdotes, incidences etc. that are gathered together in one book The stories may build upon one another or they may be able to stand on their own.

? A photoscribe is a more in depth scrapbook. The stories revolve around a photo or two.

Each page has a beginning, middle and end.

Including photos, graphics and memorabilia

These additions to the narrative greatly enhance the readability and value of the project. However, they also greatly enhance the time needed to do layout, scanning, sizing etc. that will be reflected in the cost of the finished project. One method of saving money is to group all photos in the center of the book.

If you are interested in taking a tele-class on memoir writing please send us an e-mail at Judywright@artichokepress.com and we will set one up. It is a fun way to learn and share from the comfort of your own home.

Keep Writing!!! You are doing an important work.

?Judy H. Wright, Personal and Oral Historian - www.artichokepress.com

tidy up service Glenview ..
In The News:

Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.

Childrens Stories - The Essentials

There is no specific formula for children's fiction. There are,... Read More

The Demon Fear

You have a great idea for a poem, a story,... Read More

Top 7 Writers Sites for 2005

If you dream of turning your book into a best... Read More

A Freelancers Journey, Part One

Today it begins.I have always known I was a freelancer.... Read More

Top Seven Mistakes Writers Make and What to Do About Them

Writers often get stuck because they make assumptions about writing,... Read More

How to Write Words Worth a Thousand Pictures

Our Image-Driven SocietyWe live in a new image-driven society. It... Read More

Writing Tips For Novice Authors

If you are reading this article then you probably have... Read More

The Work Flow Cycle of the Editorial Industry

As an editorial professional, I'm sure you're aware of the... Read More

How to Write Articles, Reports, and Books Quickly

Do you have trouble getting your thoughts and ideas down... Read More

Web Writing: Create Writing Flow With Four Uncommon Connectors

Connectors -- conjunctions, punctuation, and transitional phrases -- allow readers... Read More

Technical Writing for the Terrified

IntroductionSometimes it may be beyond a companies or individuals budget... Read More

Writing Internal Newsletters: How to Build Your Network and Your Reputation

To help build your profile and reputation within a large... Read More

How To Co-Publish For Profits!

The Benefits of Co-Publishing There are a number of publishers,... Read More

Five Common Errors to Correct Before Submitting a Letter or Report

First impressions count in writing too! So it is always... Read More

14 Tips On Writing The Short-Short Story

The short-short story has been likened by some as being... Read More

Getting To Know Your Characters

Interesting characters that readers care about are the most important... Read More

Nobody Likes A Rambler

We all know people who ramble. They include every boring... Read More

Do I Have To Be A Good Writer to Market My Own Business?

Many of the most effective low-cost marketing strategies require writing.... Read More

7 Reference Books for Your Desk

I hate to admit this, but I rarely get an... Read More

Is Someone Plagiarizing Your Work?

About two weeks ago I received an article submissionthat immediately... Read More

6 Ways to Leverage Technical Articles

Technology vendors often contribute bylined articles to trade journals. The... Read More

Using Technology to Improve Your Final Draft

One Saturday afternoon, I sat in a packed conference room... Read More

Review In 29 Steps Plus One

I just finished to read a book. A story for... Read More

Top Seven Ways to Select a Book Topic That Sells

Authors need to write their book according to their target... Read More

You Can Be An Author

"You should write a book." For years, I had been... Read More

maid service near Winnetka ..