6 Ways to Leverage Technical Articles

Technology vendors often contribute bylined articles to trade journals. The articles are great exposure for these companies but they don't come cheap ? the trades rarely pay for these articles but the vendors spend time and resources to assign pieces, write them, approve them and submit them. Your PR agency can help your clients leverage their investment by wringing top value out of these articles. Here are some possibilities:

  • Reprints

  • White papers

  • Product briefs

  • Booklets

  • Speech outline and handouts

    Reprints

    It's pretty galling to contribute a byline to a publication, only to turn around and spend major bucks for reprint rights. But reprints are good things: they significantly increase your client's exposure to the market. Make sure you use the reprints anywhere you can, including press kits, presentation handouts and conference take-aways. Post them on your site too. Even if you haven't paid for electronic rights you can probably link to the publication's URL, assuming they've posted your article online. (It doesn't hurt to ask.) If you've got digital reprint rights and are posting the article on your client's site, avoid using a scanned hard copy of the printed article ? the resolution is poor and not very readable. Create a .PDF file and use that for posting and downloading.

    White Paper

    Please don't use the published article as is for a white paper -- even if you retain all rights it's shamelessly self-plagiarizing, and if the publication retains all rights it's rather criminal. However, you can use the article text to form the technology section of a white paper. Edit for length as necessary and re-work the text to emphasize your client's product and technology take. Then add white paper elements like a beginning executive summary and a problem statement. Follow these with your technology section, and then add details on how your client's product will solve the problem, a customer case study, and a conclusion on how great the product is. (You can always switch the order by writing a white paper first, then editing the technology section into a bylined trade journal article.)

    Product Briefs

    The article can serve as a great basis for expanded product briefs ? say the front and back of an 8-1/2x11, or a longer technical brochure. Edit the article for length and jazz up the text, and you've got a solid technology basis for the marketing document. (Good marcom can explain what a NAS gateway is, but not by yammering about "enterprise-wide intelligent data management portals." Puts readers right to sleep.)

    Booklets

    One of the best press kits I ever saw included a sharp and informative booklet on the vendor's technology. The booklet explained the general technology's development and background, presented the vendor's product, and listed clear customer advantages. It impressed both journalists and customers in a way a press release or even a white paper wouldn't have done. Booklets are labor-intensive, so use your trade journal article as the basis for writing your own.

    Speech Outline and Handouts

    Use existing articles as the basis for client speeches and presentations. Since trade journal articles are usually vendor-neutral, they'll work as-is for similar talks. When the presentation is about a product you can still use the article outline for the background technology and analysis then add product details, customer case studies, and Q&A's. You can use article reprints as a handout, or turn the outline into speaker's notes and use that instead.

    If your client gulps at the cost of developing a trade journal article, don't leave them gasping for breath ? list all the ways they can leverage it to increase market exposure and profits.

    --

    Christine Taylor is president of Keyword Copywriting, which helps marketing and PR pros leverage their relationships with technology clients. E-mail her at chris@keywordcopy.com, call her at 760-249-6071, or check out Keyword's Website at chris@keywordcopy.com

    About The Author

    Christine writes technical marketing communications for data storage, networking and pharmaceutical clients, including:

    EMC

    Commvault

    Quantum

    StoneFly Networks

    Sybase

    Maranti Networks

    ClariStor

    Fujitsu

    AES

    Obagi Medical Products

    She specializes in trade journal articles, white papers, press kits and online content. She serves as a contributing editor to Computer Technology Review and acts as editor-in-chief for Storage Inc. and Storage Management Solutions.

    Before moving into technical journalism and marketing she served 20 years in the IT trenches, including systems administration at Avery Dennison's Research and Development division.

    chris@keywordcopy.com

    eco-friendly cleaning service Buffalo Grove ..
    In The News:

    A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
    AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
    A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
    New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
    Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
    Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
    Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
    Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
    Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
    Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
    iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
    Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
    FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
    Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
    Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
    Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
    Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
    Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
    New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
    FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
    New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
  • Write Your Story, Put It On A Website, Sell Millions of Copies

    Although he has his own website, John Grisham probably does... Read More

    Writer?s Web Resources

    The Internet has truly revolutionized the careers of writers worldwide.... Read More

    Writer School?

    Here's something from my mailbag. "Dear Michael, do you need... Read More

    Understanding The First Rule Of Writing ? Before You Start The Great American Book

    Chaos and confusion come when established rules and procedures are... Read More

    10 Tips on Writing Effective Dialogue

    1. Become an EavesdropperListen carefully to the way people REALLY... Read More

    Sharpen Your Writing With Structure

    At some point, every serious writer is forced to sit... Read More

    The Author Within

    Just about every marketer on the Internet claims to be... Read More

    A Writers Tools

    If you are like most writers, you're constantly searching for... Read More

    Best Writing Advice I Ever Got

    I've been in the communications business a long time?over 25... Read More

    How Long is a Chapter?

    How long should your chapters be?I can't resist... I have... Read More

    7 Reference Books for Your Desk

    I hate to admit this, but I rarely get an... Read More

    Making Money from Freelance Writing

    Making Money from Freelance WritingIt's the question that every aspiring... Read More

    Getting To Know Your Characters

    Interesting characters that readers care about are the most important... Read More

    Vital Verbs

    Remember back in the dark days of your school years... Read More

    The Makings of a Personal Essay, Really

    Sometimes I can be dense when it comes to realizing... Read More

    Becoming the Total Package

    Being a great writer is no longer enough if you... Read More

    Formats for Writing Life Narratives

    Q and A.Best choice when subject is very verbal or... Read More

    Are You Feeling Dash-ing? Using Punctuation for Effect and Influence

    The dash--that curious mark of punctuation people use in their... Read More

    Extreme Research: 10 Snappy Rules For Success

    So you want to learn to research well, and not... Read More

    Freelance or Staff

    There is no doubt that a staff writer enjoys advantages... Read More

    Essay Types and Modes Youll Need to Write for College

    ~TYPES~You Want Us to Write What? Understanding the Task AssignedWhich... Read More

    6 Ways to Jump-Start Your Writing Day

    1. PLAY A GAME LIKE SOLITAIRE....for half an hour or... Read More

    7 Ways to Turn Readers Into Friends

    Back in my school days, if the teacher demanded a... Read More

    New Authors Publishing Options

    All your publishing options are as follows:--Conventional publishing--Vanity or subsidy... Read More

    How to Relax Your Writing

    Q. My writing sounds stiff and stilted. Help!A. Memories of... Read More

    express cleaning service Arlington Heights ..