6 Ways to Leverage Technical Articles

Technology vendors often contribute bylined articles to trade journals. The articles are great exposure for these companies but they don't come cheap ? the trades rarely pay for these articles but the vendors spend time and resources to assign pieces, write them, approve them and submit them. Your PR agency can help your clients leverage their investment by wringing top value out of these articles. Here are some possibilities:

  • Reprints

  • White papers

  • Product briefs

  • Booklets

  • Speech outline and handouts

    Reprints

    It's pretty galling to contribute a byline to a publication, only to turn around and spend major bucks for reprint rights. But reprints are good things: they significantly increase your client's exposure to the market. Make sure you use the reprints anywhere you can, including press kits, presentation handouts and conference take-aways. Post them on your site too. Even if you haven't paid for electronic rights you can probably link to the publication's URL, assuming they've posted your article online. (It doesn't hurt to ask.) If you've got digital reprint rights and are posting the article on your client's site, avoid using a scanned hard copy of the printed article ? the resolution is poor and not very readable. Create a .PDF file and use that for posting and downloading.

    White Paper

    Please don't use the published article as is for a white paper -- even if you retain all rights it's shamelessly self-plagiarizing, and if the publication retains all rights it's rather criminal. However, you can use the article text to form the technology section of a white paper. Edit for length as necessary and re-work the text to emphasize your client's product and technology take. Then add white paper elements like a beginning executive summary and a problem statement. Follow these with your technology section, and then add details on how your client's product will solve the problem, a customer case study, and a conclusion on how great the product is. (You can always switch the order by writing a white paper first, then editing the technology section into a bylined trade journal article.)

    Product Briefs

    The article can serve as a great basis for expanded product briefs ? say the front and back of an 8-1/2x11, or a longer technical brochure. Edit the article for length and jazz up the text, and you've got a solid technology basis for the marketing document. (Good marcom can explain what a NAS gateway is, but not by yammering about "enterprise-wide intelligent data management portals." Puts readers right to sleep.)

    Booklets

    One of the best press kits I ever saw included a sharp and informative booklet on the vendor's technology. The booklet explained the general technology's development and background, presented the vendor's product, and listed clear customer advantages. It impressed both journalists and customers in a way a press release or even a white paper wouldn't have done. Booklets are labor-intensive, so use your trade journal article as the basis for writing your own.

    Speech Outline and Handouts

    Use existing articles as the basis for client speeches and presentations. Since trade journal articles are usually vendor-neutral, they'll work as-is for similar talks. When the presentation is about a product you can still use the article outline for the background technology and analysis then add product details, customer case studies, and Q&A's. You can use article reprints as a handout, or turn the outline into speaker's notes and use that instead.

    If your client gulps at the cost of developing a trade journal article, don't leave them gasping for breath ? list all the ways they can leverage it to increase market exposure and profits.

    --

    Christine Taylor is president of Keyword Copywriting, which helps marketing and PR pros leverage their relationships with technology clients. E-mail her at chris@keywordcopy.com, call her at 760-249-6071, or check out Keyword's Website at chris@keywordcopy.com

    About The Author

    Christine writes technical marketing communications for data storage, networking and pharmaceutical clients, including:

    EMC

    Commvault

    Quantum

    StoneFly Networks

    Sybase

    Maranti Networks

    ClariStor

    Fujitsu

    AES

    Obagi Medical Products

    She specializes in trade journal articles, white papers, press kits and online content. She serves as a contributing editor to Computer Technology Review and acts as editor-in-chief for Storage Inc. and Storage Management Solutions.

    Before moving into technical journalism and marketing she served 20 years in the IT trenches, including systems administration at Avery Dennison's Research and Development division.

    chris@keywordcopy.com

    cleaning help near Mundelein ..
    In The News:

    Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
    New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
    A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
    AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
    A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
    New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
    Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
    Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
    Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
    Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
    Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
    Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
    iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
    Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
    FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
    Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
    Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
    Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
    Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
    Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
    New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
  • Learning How To Write

    As a student of Spanish, my goal was to think... Read More

    A Few Brief Tips to Deal with Writing Rejection

    What to do when you get rejected.You've just finished your... Read More

    Writing Requires Self-Control

    The only way to become a writer is to write.... Read More

    6 Ways to Jump-Start Your Writing Day

    1. PLAY A GAME LIKE SOLITAIRE....for half an hour or... Read More

    I Am Biodegradable - My Writing Is Not

    My dad was wrong. I just discovered that I am... Read More

    Six Tips for Creating More Lifelike Story Characters

    Working on my first humorous novel, I started with a... Read More

    Teachers Should Write, During Their Summers

    Before I became a teacher, I was a sports writer.... Read More

    Top 10 Tips to Complete a Creative Writing Project Without Losing Your Creativity

    Have you ever started a creative writing project with great... Read More

    Benjamin Franklin: His Ageless Writing Tips

    If Ben Franklin were alive today, he would be...uh, very... Read More

    7 Essential Letter Writing Strategies

    Based on the feedback that I have been getting from... Read More

    Overcoming Writers Block

    Do you suffer from writer's block? Is there a pending... Read More

    Suspense Novels Need Fast Starts

    Suspense novels, unlike any other genre, need fast starts. Fans... Read More

    How to Use Textpad to Write Articles Faster

    It's a good idea to use TextPad because all opt-in... Read More

    Ghostwriting - Making Money by Being Invisible

    My bookcase take up one whole wall in the family... Read More

    Bird by Bird

    It's easy to feel overwhelmed by marketing. First, there's so... Read More

    Does Your Plot Suit Your Characters And Vice-Versa?

    Creative Writing Tips ?When an idea comes to us for... Read More

    Time to Write

    SO YOU WANT TO BE A WRITER?Many people have entertained... Read More

    Writing Tips for your Journey

    Tips for your writing journeySo, you'd like to be a... Read More

    Create A Dream Diary

    How many times have you forced yourself to sit in... Read More

    Five Keys To A Successful Query Letter

    Do you know what a query letter is? If so,... Read More

    You Can Be An Author

    "You should write a book." For years, I had been... Read More

    Dont Forget That Manual!

    No user manual? Surely you jest!It may seem comical, but... Read More

    Scenes and Structure

    Beginning writers often tend to think of a book as... Read More

    How To Write Your Way To A Fortune

    We've all seen those ads that grab our attention and... Read More

    Four Act Stories and Beyond

    There are various forms of structure, including frameworks, work processes... Read More

    reliable maid service Wilmette ..